Posts

Managing Your Online Reputation

You’ve been “Googled.” No matter how small a speck you think you are in this universe, you have without a doubt created an online footprint that is attached to your name. Chances are high that someone out there has followed this footprint of yours via a Google search.

http://www.dreamstime.com/stock-images-online-risks-sign-road-banner-image34668294Whether by a business colleague, family member or even a significant other, it’s reasonable to assume that your name will be “searched” online for personal information about you. But, what are the results of these searches? Are you comfortable with what they might have discovered?

Online reputations are a part of everyday life that should not be taken for granted; they can be key factors in finding (and keeping) a job, not to mention personal and professional relationships.

Make sure your online reputation isn’t tarnishing your personal image. First step: search yourself! You can use any or all of the popular search engines, such as Bing and Google. You will want to make sure to view the search results when you’re logged in and out of your browser, as this can alter the outcome. Results can be different depending on many factors including the type of web browser, geographic location, web history or data center that is serving up the search results. You may be surprised to find that there is negative information you’ll want to get rid of.

If this is the case, and you want to remove some damaging results, you can use this link for Google and this link for Bing to request the removal of particular search results.

Use these tips to ensure your online reputation isn’t susceptible to generating negative search results:

  • Set your social media accounts to private to prevent unwanted retweets, shares, likes and posts (and think before you post).
  • Review the privacy settings for your social media accounts so that people aren’t seeing things you don’t want them to see.
  • Review all of your avatars. They are the world’s first impression of you, even if it’s obviously not you (e.g., an image of an evil dictator).
  • Review photos of yourself. Duck-face mirror selfies and party pictures are a major red flag. Remove any other unfavorable pictures that may lead to negative search results.
  • Remove any insulting or otherwise negative comments you may have made.
  • Now add in some information that elevates you.
  • Never drink while posting. While PUI’s are legal, you could regret it.

There are also ways to build up your online reputation:

  • Check out online portfolio sites such as meAbout.me and Seelio. These can help you to build your digital identity through a single website that showcases all of the positive information from your varying social media accounts.
  • Signing up with services such as Youtube or Flickr where you can promote your skills can also be a big reputation boost.
  • Another option is to create your own personal website domain, where you can represent yourself or your brand in whatever light you choose.
  • Look into online reputation management companies. Expect to pay some dough, but there’s nothing like having all that bad stuff swept under the rug.

Whether it is through posts, updates, or even mobile phones tracking location, just about every part of your daily life is somehow tied to your online profiles. This influx of time spent connected makes managing your online reputation a clear necessity to ensure the face-to-face image that you project into the world, matches the one linked to you online.

Robert Siciliano is an Online Safety Expert to Intel Security. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!

Time to tighten up Google Privacy Settings

There is good news for the tech-unsavvy out there: Google has made their privacy settings easier to work with. This day has not come a moment too soon. “My Account” is Google’s new dashboard.

ggWhen you use any Google account, the giant company collects information on you. The new dashboard will reveal what information this is. My Account also has other privacy related features; check it out first chance that you get. It has the following three sections.

Security

  • If you get locked out of your Google account, Google will contact you via the phone number and e-mail address you’ll see in this section, and you can change them, too.
  • You can look over a list of apps, websites and more that have access to your Google account info. You can place restrictions on permissions.
  • Lists devices that have connected to your Google account.
  • You can change your password.

Privacy

  • Google collects information on you including what you watch on YouTube; this section reveals which information on you is saved.
  • This section controls what phone numbers people can reach you on Hangouts.
  • Additionally you can adjust your public likes and subscriptions on YouTube.
  • Third, you can alter the information that you share on Google+.

Account Preferences

  • Here you can select the language for your Google accounts.
  • Here you can delete your entire account or some of it.
  • You can adjust the accessibility features.

Think of how great it would be to view a list of all the information that Google has collected from your computer, tablet or smartphone…and then delete whichever items you choose. You now no longer have to use the excuse, “It’s too techy for me,” to avoid delving into the privacy settings and making adjustments to your liking. You have a right to know what Google gets on you and what everyone else on the planet can see, too.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention. Disclosures.

Catphishing is a Heartless Scam

When someone online presents as a different person than their true self, this is called catphishing, and it occurs on online dating sites.
heartbleed

  • Google the name of the object of your interest. Obviously, “Kelly Smith” and “John Miller” won’t get you far, but “Jaycina McArthur” just might. What comes up?
  • See if they have social media accounts, as these suggest they’re a real person. But the absence doesn’t prove they’re a phony, either. Not every legitimate person is into the social media thing.

Here are warning signs:

  • More than one profile on a social media site.
  • Few friends or followers on social media (but then again…this doesn’t prove they’re a catphisher. Remember, Hitler had a million followers, and Christ had only 12!).
  • Photos don’t include other people.
  • Photos are headshots rather than of activities.
  • They find a way to contact you other than through the matchmaking service.
  • They quickly show neediness and request money.
  • They quickly proclaim “you’re the one” despite never having met you in person.

Additional Steps

  • Right click their photos to see where else they are online. Is it them on other sites or some model’s or real estate agent’s picture?
  • Copy and paste excerpts from their profiles and see if they show up elsewhere.
  • It may seem counterintuitive, but if you’re interested, ask for a face-to-face correspondence early on in the relationship (like a week or so into it) so that you don’t waste time getting dragged down by what ultimately turns out to be a catphisher.
  • If the person doesn’t use Skype, ask for a local meeting in a crowded public spot (assuming it’s a local person).
  • If they back down from a face-to-face meeting, be suspicious. They’re not necessarily after your money, but that 6-2, 180pound stud might actually be a 5-7, 240 pound guy who’s 10 years older than what his profile says.
  • Don’t reveal private information like where you work. Make sure there’s nothing revealing about your location on your social media profiles. A catphisher will want this information.
  • Be highly suspicious of someone who wants to know a heck of a lot about you—like if your parents live in town, what kind of home you live in, how much you earn, etc.

Trust your gut. If he or she sounds too perfect, they’re probably fakes.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Tips to being anonymous Online

One of mankind’s greatest inventions (besides the wheel) is the Internet.

10DUnfortunately, with this marvelous invention comes the drawback of privacy—or shall we say, lack of.

The Internet is a wonderful tool, but users must fight to remain as anonymous as possible, because getting too much of yourself “out there” could lead to trouble. In fact, it’s a big business all in itself: tracking users’ data and selling it to advertisers. Now this may sound rather benign, because no matter how much or how little of you is “out there,” you’re always going to see ads anyways.

But it’s the idea that other entities are tracking you, and also the idea that you don’t know who. All the time, information about you is being swooped up without your knowledge.

  • IP tracking. The “IP address” of your computer stands for Internet protocol. The IP address is issued by your Internet service provider and is unique to every user. An IP address can be tracked, revealing the user’s home address. Law enforcement will track an IP address of, for example, someone making threats via e-mail to bomb a school.
  • ISPs insist they don’t track IP addresses. But there are cases that make this hard to believe, such as when someone downloads a copy of a new movie. Not long after, they get a letter warning they’ve violated copyright law. This means their browsing habits were shared with a private company.
  • Cookies. Visit a site. It has cookies or data pieces that will record that you visited it. This is why when you visit the site again a week later, you’re automatically taken to the page you were last on. Cookies can also build a pattern of your web habits, so that before you know it, ads are popping up everywhere relating to sites you’ve visited.
  • Social media. Sites like Facebook will track your browsing habits with cookies, leading to the targeted advertising.

So how can you remain as anonymous as possible?

  • Open new links in an incognito window. When you right-click, a selection box will appear; choose “open in incognito window.” The incognito window means you will not leave behind cookies or browsing history. However, this doesn’t mean you’ll be the Invisible Man. But at least it’s a way of cutting down on how much of your browsing habits are revealed and shared.
  • You can download Hotspot Shield. It will put a stop to third-party tracking and encrypt data that you share with sites. You may also want it even more for its ability to mask your IP address. There is a free version and a premium version that costs $29 bucks.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

How to plan for Digital Disasters

In this day and age, we should never hear someone proclaim, “Oh my God, my computer crashed! I lost everything!” You can’t lose something that’s been properly backed up.

11DSo many people, including ones with businesses that rely upon cyber communication, continue to avoid backing up their digital data.

Nobody is exempt from the No. 1 rule of backing up your data. Anything could happen:

  • Hard drive crash
  • Accidental deletion
  • Water damage
  • Fire
  • Theft (offline)
  • Ransomware

The planning for digital disasters begins with first going through all of your files to clear out any “junk” or data that you know for sure you no longer need. Then delete it.

Next, make sure all of your files are organized, not scattered haphazardly, and properly labeled. See if you can consolidate some files.

You then must commit to regular backups, and this may be every day for some files. There are programs that can make the hassle of backing up much easier. They will automatically perform backups on everything, keeping a spare copy of all your files.

But what if your computer is physically stolen? A lot of good the prior-mentioned backups will do. And carrying around with you a flash drive is cumbersome and you may forget it at home—the day your computer is stolen—along with the flash drive.

This same principle applies to fire or water damage. The flash drive could be destroyed or lost. Furthermore, it’s not realistic to think you would place your computer in a fireproof safe every time you log off, though maybe every time you go out, that’s more realistic.

You could keep your computer located in a safe place that’s least likely to be damaged by a flood or fire, but that’s a thin layer of protection.

It may seem that the obvious tactic is to back your data up in a cloud service. And you’re right; this would be part of a multi-layer plan. A cloud service may also offer incremental backups.

As for that flash drive, it will sure help to make it a habit to back everything up every day—just the files you changed for that day. What are the odds that your flash drive will get stolen or burned to a crisp?

Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing  identity theft prevention.

What is a Cache?

Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should you do it? A cache is a folder of recently visited webpages, which is stored on your computer’s hard drive, and maintained by your Internet browser.

1DThe purpose of a cache is to speed up the loading of webpages. Your computer’s hard drive collects data from websites that you visit, so that when you visit them again, certain aspects of the previously visited pages (such as graphics) don’t have to be reloaded the next time, and this makes the loading time a little bit shorter.

But the space your cache has on your hard drive is limited, and over time, it can get congested. Data that hasn’t been accessed for a while gets tossed out to make room for new data from the new pages that you visit.

And sometimes, the cache process doesn’t work properly. The result is an incompletely loaded page, or a page that looks odd because it’s supposed to load new content but it’s showing old content. (Sometimes, page loading problems aren’t caused by a faulty cache, but this is such a common cause that you’ve probably heard people say, “You need to clear your browser’s cache.”)

So, now you know what a cache is, here are some specific steps to clear it on different browsers:

How to clear your cache in Chrome:

  • In the upper right of the browser click the little icon that says “Customize and control Google Chrome” when you hover over it with your cursor
  • Click History
  • Click “Clear browsing data”

How to clear your cache in Internet Explorer:

  • In the upper right of Internet Explorer, click the gear icon or “Tools”
  • Click Internet Options
  • Under “Browsing History” you’ll see a delete button; click that.

If you use another browser, and there are a few, search online for instructions on how to clear your cache.

Another option you have is to use software (free or paid) designed to clean the clutter from your computer and devices. These programs often work well, but sometimes they work too well and clean more than they are supposed to. It’s always a good idea to backup your information before cleaning your computer.

Robert Siciliano is an Online Safety Expert to Intel Security. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!

How to keep a Clean Online Presence

At any given time, someone, somewhere, is probably googling you. This could be a former classmate, a neighbor, someone you’re trying to do business with, a relative, who knows?

1PAre you confident that whatever they find will be information that’s truly representative of you? Maybe if you have a really common name, it may be lost in cyber muddle, but the more unusual your name is (or how the first name is spelled), the easier it will be to find you. If you want a clean online presence, there are things you can do.

  • Search yourself on Facebook, Twitter, LinkedIn, etc.
  • Google yourself and see what comes up within the first two pages of results. Make sure you’re logged out of Google or other browser you’re searching on. The results can be different vs being logged in.
  • Log back in and search your name again to see how the results look.

But how do you get rid of negative information and make yourself look better?

If you’re the creator of negative information, it’s a cinch. Just go into your Facebook account or wherever the unflattering information is, and delete it. Also adjust the settings for privacy, such as limiting post or image visibility to select visitors.

  • Search engines. Ask the search engine to remove the page result. For Google go here. For Bing go here.
  • Google+. Hide what you don’t want others to see. Check out the privacy settings.
  • LinkedIn. Make sure your profile is updated.
  • Twitter. Make the account private to prevent retweets. If you’re new to Twitter, think very carefully before you tweet, as tweets really do get around.
  • In addition to these tactics, try online reputation management firms. They aren’t cheap, but they work, mostly.
  • Go through all of your account profiles and upgrade them. Make them crisp, clear and free of fluff or anything that doesn’t flatter you. Add information that makes you more impressive. And use a good photo for your profile or avatar. Really, some Facebook profile pictures are ridiculous and unflattering, some not even making any sense.
  • Replace racy or otherwise negative images of you with more respectable ones. Or just delete them, period, like endless selfies that shout, “Ooh, look at me in this one!”
  • Be very careful what photos you put up on Facebook and Instagram. If you’re soliciting for donations, don’t have a photo of you eating lobster.
  • Sign up with a nameplate site like about.me, seelio or flavors.me where you can say good things about yourself and list your skills.
  • Get your own domain, even if you think your name is taken (use a variation), then use a reliable hosting company and put up your work.
  • Link all of these accounts so that visitors to one will be driven to the others.
  • Sign up with services to show your skills such as YouTube and Vimeo. See what’s out there for your various talents (e.g., Flickr for photographers).
  • Follow the cardinal rule: Don’t put anything in cyberspace that you wouldn’t want to reveal to 50,000 people at the coliseum.
  • Oh, drinking and posting don’t mix. Just don’t. Stop it. Really.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

What is the Cloud?

You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there?

http://www.dreamstime.com/stock-images-online-risks-sign-road-banner-image34668294The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an online service. You may be familiar with “cloud services” offered by companies such as Google and Adobe.

The term “cloud” comes from cloud computing, which is essentially using a group of computer resources to maximize their effectiveness.

The cloud is now comprised of millions of servers worldwide, and chances are you access it on a regular basis. For instance, you may have uploaded a picture from your smartphone to Instagram, which stores images in the cloud, or you could be using cloud storage service.

Because the cloud allows you to upload and access data and services from any Internet-connected device, it’s certainly convenient, but that doesn’t mean that it’s always safe.

Many worry about hackers getting into clouds, especially ones in which the services do not offer two-factor authentication. (This is when you need two different components to gain access to an account, such a something you know, like a password, and something you have, like a unique fingerprint.) Another potential vulnerability is that hackers might intercept data as it’s being sent to the cloud, especially if that data isn’t encrypted, or scrambled, to keep it from being read by unauthorized third parties.

Cloud customers must have faith that the service provider is doing all it can protect their prized data.

Not all cloud providers operate the same way, with the same security, but there are minimum standards, which they must meet. It’s important to know about the different levels of security, so you can make the right choices about your service providers.

A few cloud service providers:

  • Windows Live
  • iCloud
  • Google
  • Amazon Cloud Drive
  • Dropbox

Lots of storage can be obtained for free. Rates vary and getting cheaper by the day.

Cloud providers have everything to lose and nothing to gain be being insecure. It is well known that poor security can damage a brand. However, cloud security generally begins with the user and not the cloud itself. If your devices are old, outdated, poorly utilized, or don’t have the proper security, you could be the weak link.

So, make sure that your devices and security software are up-to-date and look for cloud providers that offer advanced security options such as encryption and two-factor authentication. And, if you really want your sensitive information to stay secure (such as tax returns and other financial and personal information), you might consider saving those files on a backup hard drive rather than putting it in the cloud.

Robert Siciliano is an Online Safety Expert to Intel Security. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! Disclosures.

Tips to destroy and shred

You can’t be too neurotic about shredding sensitive documents to smithereens. For example, some people make a career out of “dumpster diving,” digging through trash in search of bank account information, credit card preapprovals, medical bills, mortgage statements, etc., and then they commit fraud, including creating new accounts with the found information—accounts in the victim’s name.

2PAnd by the way, anything with your signature can be a gem to the dumpster diver, as your signature can be forged.

Diving for Dollars

  • Dumpster diving is legal if the trash can is in a public spot including the big trash bin at your apartment complex.
  • Dumpster divers aren’t necessarily homeless men dressed in rags looking for discarded food. They may be professional identity thieves, and if they’re extra smart, they’ll dress like a vagrant to fool people into thinking they’re looking for food scraps.
  • Your trash can is a goldmine for an identity thief; think of what’s on all the paperwork you toss out, week after week—all sorts of tidbits about your life, from your favorite stores to your kids’ names.
  • A lot of personal details about you come simply from empty envelopes with their return addresses.

Shredding

  • Buy a shredder. There are different kinds that shred at differing dimensions as well as various strengths (some shredders will slice and dice CDs).
  • Don’t buy a “strip-cut” type, as the shreds could be reconstructed. The “micro-cut” shreds at the smallest dimensions.
  • Believe it or not, there are crooks who will take the time to put back together a shredded document, including with the help of Unshredder, a computer program.

Burning

  • Keep a cardboard box handy that you continually fill up with shreddables.
  • Just toss documents that are on deck for burning into this box as you go throughout the day. Then incinerate the box.
  • A large stack of documents will not completely burn, so don’t place these in a motley arrangement so they aren’t “thick”.

Miscellaneous

  • Don’t leave boxes that contained expensive merchandise in plain view at your curb; this is almost the equivalent of sticking a sign there with bright red letters stating: “I just purchased a giant flat screen TV; come on in and steal it.” Destroy/shred

Ask yourself this question: If someone “stole” your trash, would that be a problem? If you say yes, then you toss too much data. For me, I don’t care, nothing I toss is of any value to anyone.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

The most horrible Craigslist Killing ever

Beware. This is tough to read. An expectant woman had spotted an ad on Craigslist asking for baby clothes, so she contacted the ad placer—a woman—then went to her Longmont, Colorado house alone.

2HThe woman stabbed the would-be seller and removed the seven-month-old fetus. The baby died but the victim survived.

When police arrived, the 26-year-old victim was there but the fetus was gone. The 34-year-old psycho supposedly did not know the victim. She had her husband drive her to the same hospital that the victim went to, claiming that the fetus, which she had with her, was a miscarriage.

Oddly, the stabber has two kids already, and her husband is not a suspect.

Six weeks prior, Craigslist got negative attention when an elderly couple was murdered after responding to an ad for a car.

It’s a novelty to point out that these ads were placed on Craigslist, but there is nothing inherent about this medium for advertising that makes it dangerous.

The root of the problem is that of meeting strangers alone in secluded or barren locations. Making this worse is when the ad responder is physically compromised, such as from elderly age or pregnancy. What on earth are they thinking?

One solution is the so-called safe zone, a designated trading spot where Craigslist sellers and buyers meet, out in the open, around other people, such as at a police station parking lot.

Currently there are safe zones in 22 states; they are listed on the Safe Trade Stations website.

If your state doesn’t have one, or if the one in your state is far away, then the next best thing is to arrange to meet the seller or buyer in a public spot full of people such as at a busy café, if the item they’re selling is small enough. And bring someone with you.

If it’s a car or other very large item for sale, this makes things more challenging as far as location of the meeting. Bring two people with you, and try to arrange the meeting in a public spot, if at all possible. If you can’t find anyone to accompany you, and the item for sale can’t be transported to a public spot, then pass up the deal.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.