Help Support my Blog!

Virgin Mobile USA
Glasses USA
Amazon
Newegg
VPN4ALL
Netflix
Hulu
CafePress

 

Subscribe to Paul’s Tech Talk Affiliate Marketing Blog

Subscribe to Paul’s Tech Talk Science Fiction Blog

Subscribe to Paul’s Tech Talk Scams Blog

  • Acer 11.6
    Acer 11.6" Laptop 2GB 16GB | C710-2856
    Acer

    Currently  in process review this Acer Chrome book and boy is it nice!

Navigation
Sponsors

Entries in Security (24)

Friday
Jan172014

5 Minute Guide to Making your iPhone more Secure

An iPhone is an incredible device but don’t think that it is secure enough that no one can access your important information. It is not a security fortress and is prone to the same risks as other cell phones. However, following these simple guidelines can help you make your iPhone a secure device and protect it from those who want to lay their hands on your information.

Use a passcode:

This is literally the first thing any mobile phone user should do. You should use a passcode to access your phone. Though it is not the strongest security measure you can take, it will help ward off those who want to access your phone and everything in it. You can even set your iPhone to erase all data stored on it automatically if someone tries to unlock it with a wrong passcode for ten times. Passcodes can also be set on many individual apps.

Don’t use unnecessary features:

It is very important that you turn off all the features and services that you are not using. Turn off Bluetooth, WiFi, voice control, email syncing, location tracking and such as they can let anyone with some knowledge of phone hacking could exploit the flaws in these services and access your information and data.

Update:

Apple releases firmware updates on a regular basis. These are meant to update your iPhone against any security loophole and performance hiccups that you encounter in your daily use. You should update your phone immediately after an update is available. These updates can also bring some new functionality to your phone.

Tinkering with your phone:

Tinkering with your phone’s protected software, or jailbreaking, can be risky. This allows users to bypass Apple’s security layer and change settings in the phone’s software. It will also allow you to install apps that are not downloaded from Apple’s App Store. This is a potential security risk as you can’t be sure if any such app is secure or not, and whether it is accessing your private info or not.

Privacy settings:

The iPhone allows you to protect your information in many ways. One of those is to use the privacy settings in Safari, found in settings menu. Safari is iPhone’s web browser and allows you to connect with the internet. It is crucial that you review your privacy settings and tune them to your needs. Otherwise, you could leave your information unprotected and at the risk of being hacked. You could become a victim of iPhone spyware, malware and other malicious codes without even knowing.

Use ‘Find my phone’ feature:

Another cool feature of iPhone is its ‘Find my phone’ option. This practically allows you locate your phone in case you have lost it. You can lock your phone, make it ring, show warning information, and erase your data to make in case you cannot retrieve it or it is taking too long to retrieve it.

Erase your data before return, repair or resale:

One of the common mistakes that most users make is that they do not erase their data when they return, repair or resell their iPhones. This way you are actually handing out your information to the

person you are giving your phone to. Make sure you have erased all your data, including messages, contacts, call logs, images and videos, notes, calendar entries and other important information, when you return your phone to the seller, send it for repairs or resell it to someone.

Follow these simple security tips and make your iPhone a secure device to use.

Author Bio: Jessica Carol is a tech writer who has written articles based on developments and new trends in the world of tech for Mobistealth. She can be reached at @Jcarol429.

Thursday
Jan162014

How to Avoid Social Media Scams

Photo credits: Nate & Tilly Ritter

Social media networks can be a lot of fun - not to mention useful - but you really need to make sure you take steps to stay safe. Knowing how to avoid social media scams is an important skill to have in the Information Age. The good news is that it’s not that difficult to avoid them if you use common sense and are careful when you’re online. We’ve put together a list of several specific tips you can use to make sure you don’t run into any problems.

How to Avoid Social Network Scams

Here’s a look at some specific ways that you can avoid scams no matter what social media network you visit frequently.

  • Privacy Settings - The first thing you’re going to want to do is spend some time learning about the privacy settings for whatever site you’re on. For some - like Facebook - this can take quite a bit of time before you understand, but it’s essential if you want to protect yourself from scams.

  • Know Your Friends - While you may want to get as many “friends” as you can, this isn’t really that smart. Try to only allow people you really know in real life to be part of your social circles online.

  • Ignore Unknown Links - If you see a link from a source you don’t recognize, ignore it or delete it if possible. Following links from strangers online is usually not a good idea on social media sites.

  • Avoid Public Computers - Like public bathrooms, you should avoid using public computers as often as possible. You never know if one is infected with a keystroke logger that will allow others access to your social media accounts.

  • Be Cautious - This is common sense, but it can be easy to get caught up in the moment online. Learn to take your time and not get involved - by clicking links - until you know exactly what’s going on and that you’re dealing with someone who can be trusted completely.

  • Software and Firewalls - You should also make sure your anti-virus programs are up to date with their definition file. Additionally, you might think about installing a firewall so that you can add another layer of protection between you and the bad guys online. Luckily, you can usually find free software that will help protect you. Just make sure you set it up correctly.

By following the advice above, you’re going to be able to avoid the scams while still being able to keep up with the fam. You don’t need to avoid social networks completely, but you should be very selective about which sites you visit and how you interact with people you might not know personally.

Written by: Maegred Mithi is working in copper industry. Her job is to buy ethanol and remove the rust from the raw copper. She is also studying on line reputation management, because she has special interest in online world algorithms that affects the search engine results.

 

Wednesday
Jan152014

7 Privacy Tips for Safer Social Media

Photo credits: U.S. Army RDECOM

If you’re not worried about your privacy online when interacting on social media sites, you should be. These days, it’s easier than ever before for bad guys to get ahold of your personal information. Even large corporations are having problems. For example, in December 2013, Target was targeted by hackers and lost just under 100 million credit card numbers and other identifiable information about their customers.

Seven Privacy Tips for Social Media

To help you stay safe online and protect your personal information, here’s seven specific privacy tips for when you’re on social media websites.

  1. Know the Settings - The first thing you want to do is make sure you study a website’s privacy policy - including how to change the settings. Unfortunately, most websites make this very difficult to do. The more information you share with Facebook and others, the more money they can make off of you.

  2. Watch for Changes - Privacy policy changes may or may not be announced, so you want to make sure you keep your eyes open for changes that occur. Hopefully in the future legislation will be passed to make it more difficult for companies to make wide changing changes without a lot of notification and options for users.

  3. Sign-Out - While this can be a pain, make sure you log out of your social media accounts when you’re not using them. This is one of the best ways to make sure Facebook or Google isn’t tracking your every move online.

  4. No Phone App - Try NOT to install the Facebook or Twitter app. Or, if you do install it to use occasionally, make sure you log-out whenever you’re not actively using it. While using the Facebook app may seem convenient, you’re giving them quite a bit of information that they’re going to sell to the highest bidder.

  5. Use a Device Password - Make sure you set up your smartphone so that it requires you to enter a password to unlock it and use it. Unfortunately, not a lot of people take the time to do this, which is a big obstacle to privacy.

  6. Use Encryption - Whenever possible, make sure you’re using encryption. Most operating systems have software that will encrypt and protect your sensitive data.

  7. Unfriend Strangers - While getting your friend count to some crazy number might sound like fun, you should try to NOT friend anyone who you don’t know in real life.

Following the advice and tips above will help make sure you maintain your privacy when you’re using social media websites. Do you have your own method of staying safe on social media websites? Feel free to leave a comment and let us know what you do to maintain your online privacy.

Written by: Shorna stiksal likes smartresumewizard because it’s so easy to use. She helps her company with reputation management and has been paid very well for her assistance.

 

Wednesday
Jan012014

Why your Facebook account got hacked and how to secure it!

You’ve Probably seen:

Help me!!! the house was broken into lastnіght, i caught the theіves stealing our stuff on our securitу cameras! Do уou happen too recognize them?  (Some link such as Tumblr)

I know it is the hardest thing to understand but when it comes to getting your Facebook account, getting into your account is the most valuable for them.   Most of the time it is used to mine data such as your personal information or so they can become you but that it’s always the case.   It is sometimes the case that a spammer wants to get those click’s from your friends and you be the one who gets in trouble with Facebook.   It isn’t always the case though.   More than anything hackers or some call the crackers want to get your account to make money somehow.  99% of the time that is the case the other 1% is someone who wants to just be a wise guy and show you he did it!

Well it happened!

You probably like the rest of the people asking how do I prevent this in the future first thing first.  You need to change your password on your Facebook account.  Once you have your account back you will then need to end all activity on your facebook account besides the device your logged into and that means you will need to update your password on all devices.   

The Easiest way to end all activity on your facebook account is:

Settings — > Account Setting —>  (Click) Recongnized Devices —> (Then) End All activity

Before you start putting the password in to all those devices maybe it is time to use a good Password manager to do just that, I recommend Lastpass because it is has everything you need to help keep hackers out of your account.   You should use a minium 20 character length and make it as random as possible.   This is what I have used to keep people from guessing my password although it is good way to help prevent Phishing attacks from sites such as Facebook, Twitter, and other social media outlets!

Setup a 2 Authentication factor!

In some ways this has been the hardest for people to understand and to want to use because it slows down people logging into their account but it also makes it that much harder for someone to get into your account because they have to know your validation code.   This will help you keep your privacy and security safe.  There is a great tutorial on how to do it, and I use it with the Google Authenticator myself!

Review your Timeline!

It might not be needed but you never know what the hacker posted on your timeline or your activity and you should carefully check it out from the time you thought you got compromised to now.  You never know what has been posted or said about your until you do a complete inventory of damage control.  Delete any posts that you didn’t do and remove those from your time line.   Just look for a little X on the upper right corner.

Finally Review your security Settings!

Go back through your security settings and make sure the hacker didn’t enable something that you might regret later on.   For instants your timeline being public or your phone number or something that you don’t want anyone other than friends or family to know.  There are few places where you should check and maybe change if need be and they are:

Settings —> Privacy Settings

Settings —> Account Settings —> Timeline And Tagging

Settings —> Account Settings —> (-)Blocking

You never know what the hacker did to either unblock someone or change something that you had put private.   So this is what I call damage control.   This will keep you safe and secure, but remember the only way to truly be safe is watching what you do online and keep that information private as long as possible.

Wednesday
Nov202013

Best Security Apps for your iPhone (Guest Post)

Security has always been an important concern for smartphones. With these gadgets coming with features that enable us to easily access our e-mail, bank accounts and many other private features, it is mandatory that you have security features that keep your personal information from falling into the wrong hands. There are a few apps that help you to prevent strangers or malicious software from accessing your phone. Here is a list of some useful apps for the iPhone.

Click to read more ...

Saturday
Sep282013

Android Vulnerabilities and Exploits in the Wild! 

Android garden

Time to Do what?

When I was researching this on the web I didn’t expect to find so much stuff, but I do think IOS has more vulnerabilities then Android but it isn’t as bad as Apple IOS problems!

I am not going to talk about all of them but just a few that have peaked my interest!

The ‘Master Key’ Exploit

A simple but yet easy way to fool your Operating System and gain more access than it should.  The name doesn’t mean they actually have the master key to your device.   It is using what all Android devices use in the APK.  The MANIFEST.MF, which if done right, will have two more copies in the APK (Zip file).   When the Android OS installs this APK it will use the the last MANIFEST.MF and thus it can gain more access than you once thought.   Be able to communicate with a server  or copy your contacts.   I’ve pretty much come to the conclusion that 3rd party apps are dangerous now and I will not use anything but Google or Maybe even Amazon US app store!  

The ‘Webview’ JAVA Exploit

If you don’t use JAVA you will need to consider disabling it in Android.  While this one is a little more trickier and harder to avoid if you use Java, you best bet is to install Dolphine Browser, FireFox, and/or Chrome.   Then install a java an Addon or and Extension that does not allow Java to be used unless you specify.   This exploit can send SMS, or send out emails from you to spam your friends and family.   So this is one that you must start worrying about to a point.

The ‘Scarevertising’ Exploit

This last one I have seen become very prevalent and thus you should be on the lookout for this!   They claim in either a push notification or in some kind of inside application banner that basically tries to scare you into thinking you have a virus.   I’m not sure which advertising networks are being used but you can bet this will be a constant problem.   Some rules of thumb are install only from the Google App Store and never install any third party apps, which some call side along install.  

If your worried and you want to protect your Android Device, here are a few free applications that will help and hopefully keep you safe:

The last thing I can say is there are more than 100 different anti virus apps out there but it all depends on the end user (you) to know and trust vendors who are reputable and you can trust.   If you don’t know the Anti virus Company than maybe they shouldn’t be used.   I do hope I have helped you find what your looking for and we will discuss more in the future on Android Exploits!

 

Monday
Aug192013

Is internet Privacy a Right or Privilege? Your help is needed!

Privacy Day at Carnegie Mellon University

Privacy and You!

When I was talking to someone on twitter saying they think this is a right.   I did not know if it was supposed to be a Right or if it was just to be a privilege and this is why I created a poll.   To help figure out which one is right.   I know we have the right to free speech and to have some civil liberties but my question for this is how much of this is actually a right and how much is this a privilege.   Does owning a gun say we have a right?  Some people can not legally own a gun because of what they have done.

Take this poll!

I am asking people on my blog this question because I am really curious as to what people think and what they consider about Privacy and what you think about it.   it is a simple question that can be a difficult thing to answer.   I am sure i am not the only one who asked this question but I intend to keep asking to find out the answer!

I’ll share the results of this poll later on next month but I am quite curious to see what people say!

Saturday
Aug032013

Introduction to PGP and Securing your emails!

Coupon Code “savenow15” and Save 15% on the lifetime of your account!Pretty Good Privacy!

I thought we should talk about PGP and how it can make your emails a little more secure.   I found the terrific podcast thanks to Iyaz Akhar and thought I could at least give you some great video to help you get ready for the next Security Now (Episode 416).  

What is PGP

According to Wikipedia it basically means “Pretty Good Privacy and is a way to encrypt all your emails and in turn decrypt emails from people who you have public-keys with!

Encrypting your Emails can be a little hard for some and others it can be as easy as 1-2-3.  I already talked about a few but in the coming weeks I will talk about it even more.   Because i will have had time to read some of the books that I’ve borrowed from the library:

  • Invitation to Cryptology — Not the best book to read kind of hard to understand because some of it is almost wrong and others parts didn’t explain very well.
  • Cryptography Demystified — I started with Invitation to Cryptology and I must say this one is a whole lot easier.   I have only started the first few pages but it seems to be more understanding that the previous book.
  • Understanding Cryptography: A Textbook for Students and Practitioners — This  is the next book I intend to read but I first have to complete the Cryptography Demystified.  It does look promising but I won’t know more until I delve into this book.
  • Cryptography for Dummies — I must say I am going to read this one last because I believe I have more brain power than it gives me credit for.   I however am not leaving any stone unturned to understand PGP and understand encryption and how Public and private keys work.

I am confidient that after I get the books read and read again, I will understand PGP and encryption a little more better.   I just have to work through some of the books and you should have some Algebra and some math skills to understand some of these book.

Hopefully by the time Security Now talks about PGP I will have an even better understanding of encryption and how it applies to PGP.

Monday
Jul292013

Webhost Deathmatch: Linux Vs. Windows

When you choose a desktop operating system, there is a pretty significant difference between Windows and Linux. The user interfaces are vastly disparate, many applications are designed for one OS or the other and the underlying kernels are worlds apart. The same concept applies for Linux VPS hosting and Windows hosting. While the differences in user experience tends to be lessened because you’re typically working through control panels, and not the operating system proper, you still have features, scripts and technology that one server OS supports that the other doesn’t. Here’s what you need to know.

Script Support

The script languages supported by Windows and Linux differ greatly. Perl and CGI are both difficult to support on Windows, while Windows technologies aren’t supported on Linux servers at all. While the latest Windows server operating system supports PHP, you aren’t guaranteed to have that version of Windows on specific hosts, so confirm the OS version if you want PHP scripts to work properly on a Windows server. Always keep essential script support in mind when you choose the server operating system. Scripting really is the primary decision maker for choosing Windows or Linux, as the two operating systems don’t share a lot of cross-platform scripting support.

Pricing

Linux distributions are generally free and are all open source operating systems. Some distros do require a paid commercial support package, but the pricing and overhead is less expensive than comparable Windows servers, due to Windows’ licensing costs. Windows also depends upon more hardware resources to run properly, requiring a more powerful server than you would otherwise use. Keep your price point in mind, and be aware of the capabilities you’ll get with Windows compared to Linux.

Microsoft Technologies

If you’re using FrontPage extensions, ASP, ASP.NET or .NET, you are essentially locked into a Windows server. Microsoft doesn’t make it easy to use this technology on Linux, BSD or OS X servers, although some emulation is possible. However, performance is not optimal, and it tends to take a lot more time and energy than just getting a Windows server on hand.

Database Technology

Database-driven scripts are common in web applications, and Linux database support covers MySQL technology. It does not, however, cover Access databases or Microsoft SQL. Enterprise-level applications use extensive database technology, and Access is great at handling high volumes of fields and information. If you need a specific type of database, confirm it is compatible with the server operating system you are choosing.

Security

Linux is widely considered a more secure operating system than Windows, mostly because the Linux architecture is not as easy for virus creators to program for. The lack of executable support in Linux prevents standard viruses from working, and security holes are plugged up by the many programmers looking at the open source code. Windows gets attacked by hackers on a consistent basis, and users have to wait for Microsoft to develop and deploy patches.

Which do you prefer for web hosting: Linux or Windows? Tell us in the comments.

Gregory Adams

Greg is a technology and mobile trend freelance writer with a penchant for rollerblading.

Saturday
Jul272013

Reviewing VPN4ALL and why you should care!

They the people at VPN4ALL, gave me a trial service and I must say “I have been nothing but happy with the service for about the last few weeks”.  Some of the things I love about this is they actually have an app for your to use on your Android device.  So you don’t have to know any code, which goes back to to their slogan “VPN made easy”.  You know I’ve talked in the past about other VPNS, and securing your device.  It isn’t always that simple with free Wifi Hotspots.   I should know, I visit them almost constantly and that is because I am constantly on the move.  I have tried the free VPN’s and I must say this service is even better than you could get with any Free service.

Mobility!

This is the key reason I decided to use this service because I am constantly going place and using other free wifi hotspots and I know it is always going to be insecure because of connections.  I will say I always worry about who might see my password or see my personal information and try to take  my identity.  I will say with the ease of use with the VPN4ALL mobile app, I can connect to a VPN in minutes and not need to know any technical data.  You will need to buy an Mobile VPN4ALL Account to use this(minimum 5$ a month).  Great value for your buck and you don’t have to worry about all those people watching you.

Reliable Service

Speed and reliability are always going top of the security tree.  I will always need to have a service where there is no interruption and this seems to fit the bill quite nicely.  I can connect to any server I want and see if it is faster or slower.  I can also set it up to switch IP(internet Protocols) every Minute to hours, if I so desire.  Could give people headaches if they were trying to watch me!

Discounts:

If you are like me and looking to save money, use my coupon code “paulstechtalk15” at VPN4ALL to save 15% on either or both Mobile and regular VPN service.  See what else I have said about this service on my other post, If you want to keep your privacy, look no further!  Give this service a try and you won’t regret it!

Monday
Jul222013

How Much Tin Foil is too much? Why do we need to worry?

100_7548

Tin Foil is all the rage!

I started this process, we we asked all sorts of questions about your Privacy and you.  One of the questions that was ask was about How much Tin Foil and how much do you need to wear on Security Now. I tried to listen to all of it and absorb as much as I could and I must say that we do not know how much data is actually being leaked to the NSA!  I don’t know how much you can prevent the NSA from getting your personal information and if you decide to do what this poor guy does, I have to wonder just how well this will work.   So I thought we should at least touch ground on this the episode and trying to figure just what you could do to get some peace of mind.

Opting Out!

I don’t think it is possible to opt completely out of the NSA wiretapping and have them over look you.  Likewise I don’t think they will ever leave you alone even if you did nothing wrong in the first place.  The question though that must be asked is how do I protect my civil liberties and make sure they follow the rules.  Again, I really don’t know the answer to this question but I believe VPN4ALL is one way to tell them that you don’t want to be tracked and spied upon.  Whether they listen and only do it to those they deem possible terrorist, I can not say.  I will say though, they are a sponsor on my blog because they have paid for one year of service for me and every time someone click on that link and orders their prouct, I get a little revenue.   

FAST & EASY VPN HIGH SPEED 1000+ IPs 50 Locations Worldwide Windows, MAC, Mobile 24 x 7 Support Buy Now Only 9.95

I really wish we could see the process and know just how much they collect on every US citizen and who over see’s this.  There is of course a process an I am unsure as to how well that is being used or if it is in the process.

GNU Privacy Guard!

I’ve started to use this GnuPG.org and It isn’t bad but I am sure it isn’t the only thing that we can do  to protect our privacy and try to keep out personal from getting to NSA.  We still need come have a way to get our emails to being sent even though your encrypting the message the meta data is being sent in the clear and thus the NSA still knows who you are and when you sent it.   We have to wonder who will force companies to allow sending email through SSL and not just in the clear.   This would greatly make it harder for anyone to get that sensitive data and your information would still be safe from prying eyes. 

I’m going to look for a service that does just that but I am not sure who I would trust with my personal information, hopefully a company out there will become available.  How Much Tin foil do you use to protect your privacy?  I’d love to hear your answer in the comments section!

 

Friday
Jul192013

If you want to keep your Privacy, look no further! 

 

Privacy and the NSA!

When I first said something about NSA wiretaps the Internet, you probably thought I was joking.   Well, it looks to be a real issue now a days and that is a problem!  So we have heard about the NSA will consider any encryption being at risk, so they will be keeping those encrypted data for later inspections. Privacy is everything in my book and this is a continuing series for those who want to know how to protect their privacy from thief and criminals.   

Programs to protect your Privacy!

There are programs out there to help keep people from snooping on you.   Although it has gotten a lot easier because of Firesheep and most web sites now offer secure connections but not all.  This is where I suggest you use something like VPN4ALL and I’m not saying that because they paid me to say it.   I am saying this because they have become a sponsor for me for the whole year.  I get paid every time someone uses buys a subscription and they are affiliate links!   They’ve given me a free 1 year account and I really am impressed at how well they get around the library restrictions and that they are a OPENVPN provider.  There are others such as SecureVPN and CyberGhost VPN and even ProXPN VPN.  Each one has their merits and I have nothing against any of them.   I just have had a better experience with VPN4ALL and I think you will to.

Streaming Music and Videos

I’m no advocate for people getting around international borders to watch BBC and other such videos but you could if you wanted to and be able to watch Netflix and Hulu from outside the USA.  This is one of the many reasons I like this service because you don’t have to pay for watching a show that is being played over seas.   

Online Activity

Keep your online activity safe from prying eyes and people who are looking to cause trouble.  It isn’t going to be bulletproof but it will at least help with coffee shops and if you use it all the time at home also.   You don’t have to look over your shoulder as much, figuratively, and wonder who is see the insecure connection.

Mobile Devices!

 

Another reason, I love this service is that you can take your Tablet, like my Acer 200 to a free wifi hotspot and not worry because they even have a very good PPTP(Point-to-Point Tunneling Protocol) that allows you to use your device anywhere you may go and keep people from spying on you while you on an un-encrypted free wifi hotspot.   So you can sit back and watch or do what you want and no one will know or see your actions.  You can use this for Mobile Phones also but that is totally your call.   I use it strictly for my Acer 200!

30-day money-back guarantee

Although this has some conditions, and I will be honest with you it is really always a full refund.  You have to have use under 100 megabytes of data or have some other issue that has been document with a support ticket and usually they will refund your money but it is still a better way to go then not to have any privacy or risk your identity from being taken.   You owe it to yourself and others to protect your privacy and identity and give yourself and others peace of mind.  Give VPN4ALL a try and Save 15% with Coupon Code “savenow15”, and I am sure you will be as happy as I am when I’m at a insecure location.  

 

 

Thursday
Jun272013

If You Cherish Your Identity, Start Paying Attention...

Identity theft is a growing concern for many consumers, especially we increasingly conduct business online and share our personal information on social media. Pittsburgh’s WPXI reports that identity theft occurs at the whopping rate of once per every three seconds. Even for people who keep much of their personal information as private as possible, recent security breaches at several major organizations show that no individual is safe from a loss of personal data, regardless of their personal habits.

For example, a security breach at the national payroll company ADP recently exposed the names and social security numbers of nearly 5,000 Houston government employees, and the U.S. Department of Veterans Affairs recently settled a case in which the names, social security numbers and dates of birth of 26.5 million veterans and their families were stolen. Situations such as these are, unfortunately, out of consumers’ hands.

However, there are ways people can protect themselves and their family members from identity theft, even if their personal data is somehow compromised. Several companies are rolling out additional identity theft protection services every day.

Banking Trends

One industry implementing its own identity theft precautions is banking. Most banks offer customizable account alerts, but many consumers may never look into the advanced area of their control panels. Consumers who do want to take advantage of account alerts may be surprised to see what they can control. Account holders can get texts, emails or even calls in the event of suspicious activity or low account balances. Many banks can also alert clients if there are transactions larger than specific amounts on their accounts.

Credit Reports

The three major credit reporting bureaus all offer credit score and credit report monitoring services. These agencies can alert you to any inquiries to your credit reports or any adverse actions noted on their credit reports. Consumers can also freeze their reports in events they believe their personal information has already been compromised. Credit reports should be requested on an annual basis from each of the three major credit reporting bureaus, to make sure there is no suspicious activity.

Options for High-Risk Consumers

Certain consumers may be at higher risks of identity theft. These consumers include those who do a lot of transactions online or otherwise have high levels of exposure. If this is you, consider using an identity theft protection service such as LifeLock for added security. This protection service detects any threats on an individual’s identity and sends alerts if anything suspicious occurs. It also helps consumers track their credit scores and allows them to view their reports at any time.

Do you use any identity theft protection yourself? Tell us your preferred services in the comments.

Get a 30-day free trial of LifeLock Ultimate and save 10% off your final purchase!

Heidi Diamond

Heidi is a grad student working on a Ph.D in linguistics and communication. When she’s not studying and blogging, you can find her jogging on the beach with her beloved golden retrievers.

Tuesday
Jun252013

How to protect your privacy online and from the NSA!

Code Pink NSA protest at Sen Dianne Feinstein's house

Who watches the watcher?

That phrase has always made people think and I think it is high time we think really hard to ask those tough questions.   A few weeks ago we had Edward Snowden release statements on the NSA, and it got me asking questions that I am sure you are asking to.  Some of the questions I have are:

  • What can I do to protect myself?
  • What does the NSA actually know about me?
  • What programs, and ways can I keep my privacy private?
  • Why Do I need to keep my privacy private?

As you can see this is going to be a pretty big multiple posts.   To start it off with we need to lay a few building blocks and hopefully it will help you to understand the problem at hand.

The Internet and You!

When your on Facebook, or any other social network.   You have to understand that what you put out on the network.   More than you can see.  Although it shouldn’t be a surprise to my readers, you may want to at least consider that what you put out on the networks, might come back and bite you on the behind later.  

So obviously when you visit a site and maybe you are using an Android Device.   You probably don’t see the long outlandish URL and that can be problematic at best and at worst it can be used against you.  If you know anything about URL’s you know that nothing is sacred on the browsers and every link you click someone is tracking you.   Whether it be your ISP to an Affiliated Link, or it could be a bad guy just waiting for you to give out your personal information to him!

Privacy and you!

So now we come to the question of why protect it if we have no privacy?  Just because we have no privacy doesn’t mean we can’t keep what we have a secret.   I know all to well that people say or do stuff that they doesn’t want others to see.   It can be a make or break a person depending on who and what they see from a post on Facebook and other social media sites.  

If you were to walk into an interview unprepared then you will not get the job.   You can bet that most hiring managers will do a quick name search on your name on Google and other social media outlets.   Just to get ready for that interview.   Now we all know that if it is a really important position you can bet they may want to know all your profiles.   I don’t know if it is legal or not so that is up to you, it may help and it may harm.   You see the point in this, and why it should be kept private until you think it should be public.

In the coming weeks I will talk about rest of this but for right now.   You can sit back and reread this and absorb what you can from my post.   It might be a good idea to subscribe by email for the updates!  You never know when I will post more about my favorite topic…Security!!

Saturday
Jun222013

PRISM and Edward Snowden scandal!

Prism Reflections  1877

Prism Scandal?

Some of you would wonder if the Surveillance scandal of 2013 will be remember in 2050?  I really can’t say for sure in the past few hours the US Government has issued an arrest for Edward Snowden.  It really looks quite suspicious that the government uses this tactic.   It seems almost like they want to blame someone who wanted to let the world and the his fellow US citzen the right to know what they are doing.   This is getting quite scary as some of you would like.   With Obama on his last term as president, we have to wonder what will happen for the next 3 years.   Will he make our privacy just as bad as China?

Tech Giants are the ROOT to this!

Most Tech giants are afraid of the government and what will happen to their reputation if they were to be truthful.   I really doubt the government would do anything but slap them for saying no.  They afford so much of this blame that seems to be going around and around in circles.   One company blames another company and it is an endless blame.   Just like the US government is blaming Snowden for leaking this information, you wonder why all the fuss about leak.   He didn’t leak any personal information such as people and social security numbers.

Tempora program and The British Secret Service!

While we are on the subject of PRISM, we have to at least show that it has been going on in other governments around the world and good old James Bond likes his Tempora Program “Shaken, Not stirred”.  We’ve see that the US isn’t the only one doing the serviceable of their people.   Quite scarey isn’t it?   The Tempora program is a co-operation between the NSA and Britain exchanging information about what people do.

What can I do?

If you wondering about cloud backup, you can try Malwarebytes Secure Backup Pro and that will at least encrypt all your data before it is stored in the cloud.   I won’t say that is the only thing you can do.   You can also use a VPN Service such as VPN4ALL The Best Protection Online AES-256 RSA 2096bit (Military Grade) Encryption for all your internet traffic. Unlimited and Metered VPN Plans starting 9.95 / month which is what I am using now so It will help keep your privacy a little more safe. There are no guarantees that government has keys but at least it is one more step to privacy that shows them that you want to be “Do Not Tracked”.   One last way to help keep your information a little more private is Secured Texted on the Android phones.   Looks nice and it is opened source so you have little worry about who has access to your text messages.   In the last 30 days, this app has been getting popular.  

 

Tuesday
May212013

Internet Security 2013 Scareware and You!

Interesting Story

My Brother-in-Law had this come up on his computer and he needed help getting it removed.  Some of the symptons were it would constantly say the file being executed had a virus and it would prevent you from loading any and all programs.   Anything you do with your computer whether trying to remove this from your desktop was a hassle.   I did have to do some things to remove it but I will talk about that in a few minutes!

Malwarebytes And SuperAntispyware!

If it was for Malwarebytes and SuperAntispyware, this would of been even harder remover than previous.  I must say when I first install these a few years back, I didn’t know how well these guys worked and kept my system clean.   I decided to try these two on my broather infected system to try to remove this scareware.

Removal of this virus!

If you are like me you probably used Google to find out how to remove this virus but I think the virus makers are getting smarter because it wasn’t as easy as it was a few years ago.   They made it virtually impossible to find the answer with the computer you have that is infected.   So you have to hope that you have another system to do the searching for the answer of the removal.   Here is what I did to help remove this malware and scareware:

 

  • Startup in Safe Mode [LINK]
  • Login as Adminstrator
  • USE MalwareBytes and do a FULL SCAN, this will take a while and once done remove what you see.
  • Do a System Restore [LINK].  The Earlier the Better.  

 

Once you have did those restart your computer then you should be able to install Malwarebytes to all users.  When you can do that you are basically home free.   Just install it again and do a full system scan, to help make sure you get rid of this scam and scareware malware.  Once you do all this, if Malwarebytes did what you needed, it might be time to upgrade to Buy Malwarebytes Now!

I really am glad I had a full version of Malwarebytes to remove this annoying little scam and scareware.   My brother is happy and I am happy.  

Paul Sylvester

Wednesday
May012013

How password security will change in 10 years!

Passwords are going out the Window!

We’ve seen in the past where people have used such words as ninja, jesus, 12345678, and password!  I’ve talked about Lastpass in the past and I really believe they are the best possible combination of the two. With the recent questions of Password Length and Password Strength, I have come to the conclusion that in the coming years.   People will be doing a 3 factor authentication and having the passwords as a back up.   It really would be nice to have two ways to authenticate and not have to put in a password.

3 factor authentication!

I know your Password! Click image to see!Three factor authentication is a simple concept.   Since we have a password we can simply use two other ways to authenticate for example a cell phone and maybe a Yubi Key.  The password will be the backup for one or the other.  If you lost your phone and still would need to authenticate you password would be one you can use in an emergency. Thus it really becomes a 2 factor authentication but since we could use all three to authenticate it would make it that much harder for a hacker to brute force an attack and get your sensitive data.

2 factor authentication!

Although most people don’t think of this but having a limited number of possible access to the important data can make it just that much harder and maybe get the hacker to go somewhere else.   What about social networks?  Do we really need that for social?  I am thinking maybe and it just depends on how you login in the first place.   I would love most of them to to maybe let me authenticate with Google and come back to them but that leaves a large hole.   It just depends on how valuable your social status is and what the possible outcome of someone getting a hold of that social network.  

Elite passwords!

Some would call it “leet” speak,  and I’ve heard people say this is something we should do in reguards to making a password.   I tell you know, we already have a 2,000 most common passwords and I am betting it has some really good leet passwords already.  So what makes a hacker no try those to hack your account.   I would think these would be tried after the primary just because this would also be the easiest way to gain access to an account.

In Ten years!

I am pretty confident in ten years we will see something like this happen and we will no longer be depending on a system that was developed in the late 1990’s.   We have to be ready for change and keep it.  I just hope it happens sooner rather than later and that most companies should jump aboard and help us get this implemented.   I don’t know how hard this will be but it will be nice to not have to worry about a password anymore with my bank or other financial institution. 

Paul Sylvester

Saturday
Apr272013

Library administrators just don't get it and that just bugs me!

Blocking Proxpm

At the Library!

You hit the road for your favorite library and you decide you want to protect yourself from all those snooping people who like to watch what you do.   The problem is you have an unprotected and unencrypted network.   You try as you might to get a VPN setup and you just can’t connect.  So you try to find other VPN’s that woul work and your instantly blocked.  They’ve installed websense into their serves to prevent people from using a VPN.  

Not all VPNS are bad!

When I found this out, I was really irked by them preventing me from visiting such website.  I suspect they are worried someone will use a VPN to visit porn sites or research something bad.  It wouldn’t be so bad if they woul allow people to use VPN or ones they trust but this is a blacket attempt to prevent people from using them.  

Ways they can help people wit h security!

If they want to prevent this an still monitor traffic.   That is also fine with me, I understan this.   I just don’t feel comfortable using a public wifi without some privacy protection.   What if somone gets my credit card while I am using their public wifi.  Would they be liable?  More than certain, they have some clause to prevent this.

All they would have to do is make all open wifi spots encrypted with a way for guest to login to.   They wouldn’t have to have a different password for every person login in.   A simple guest password would suffice and make every wifi connection secure to prevent someone from snooping over the air transmissions.   libraries probably won’t do this but I am asking they look into this problem and come up with a solution to help us security minded people.   If they do nothing, then nothing will be solved.  

Paul Sylvester 

 

Wednesday
Apr242013

Why using the Reverse Pin number won't work!

Seems to circulating around!

I got this email about this and wanted to clarify something about this and I wasn’t sure if this was a hoax or not.    Wikipedia is not helping this myth if it is but I will talk about the reasons why it won’t work and explain to you in detail the reasons!

Privacy!

In the Privacy Act of 1974, No business or organization can release personal information about you without your direct consent or without a court order.   Although this isn’t strictly followed by all Online business or organization.   In order for ANY ATM To disclose your location of the ATM you are at or even your financial information would be against the Privacy Act!

Terms of Service would be need to updated!

All banks would have to change their TOS just to cover their butts in case something would go wrong.  You would see bank after bank making sure you knew about the changes in their services when it comes to ATMS!  This would be one of the requirements to be able to do this!   

The Algorithm!

Let’s face it if this software was available, it would be a screaming security nitemare!  Every bank uses their own Algorithm and HASH in association with each account.   In order for an ATM to give out money from any institution it would be required to provide the currect security code which would be the PIN code.   So the bank would have to create both front door passcode(PIN NUMBER) and a back door passcord(Reverse pin number) to access your personal information and also what money you have on your account.   This two PIN approach would make your account much easier to hack and or guess your pin, if implemented!  Since the ATM would not know which pin is correct until it connected with the bank server, it would not know if the pin entered is correct or reversed until the bank granted access and thus it would be impossible to implement this!!

Safety and Such!

It would just cause more problems than it is worth.   Just think if you had to put in your pin in reverse wouldn’t it be more trouble and possibly cause more violence than it would solve.   I know I have ADHD and I wouldn’t be able to do it very easily.   If the robber wants the money he will get impatient and maybe even hurt the victim even more.   This is why it will never be implemented because in the long run.   It doesn’t stop violence or death it just is more inconvenience than anything.   Think about how long it would be before the police actually got to that ATM.  On average it takes 20 mins just where I live and I know the robber won’t stay their very long if at all!  Once he gets what he wants, your either dead or very lucky!   Just some stuff to think about!

Paul Sylvester

Wednesday
Mar062013

Why companies don't consider Security and how to decode a Barcode!

Weak Security is NO security!

I am working with a company of late that few months and I must say their security is weak to say the least. They use Barcodes to establish who they are and what jobs they are doing.   It seems kinda simplistic to some but to me they are just asking for problems.   Now a days, 90% of people who work have access to some kind of smart phone, whether it be Android or IOS each one has their unique problems but I am not here to talk about their problems but to point out that each one can literally scan a barcode and decode it in a matter of minutes!

How to decode a Barcode!

If your looking to decode a barcode for Android, I can help.  Here are a few that I've found to work really well with any and all barcodes you might have a need for!

  • Google Goggles -- This app for the Android is so interesting, I have installed on my phone just to see what would the world be like if we had those on Google Glasses which I suspect is coming soon!
  • Barcode Scanner  by ZXing Team -- This is a good little app for those of you who just want to see what the code is and so forth.   It can does 1d, 2d, and QR Codes.   This is also a really useful app for those of you who want to see what the barcode at work really says about you!
  • Barcode Scanner by TACOTY CN -- Another one that does basically what others do and it can decode any barcode that you might have to see what it really says about you.   
  • Scan by Scan, Inc -- Here is a good tool for reading barcodes.   I really can't say much more than this because they are do basically the same thing 1d, 2d, and QR Codes.   Works really well though!
  • ClearImage Free Online Barcode Reader / Decoder -- Although this isn't a app for Android it can be very useful for anyone who has a camera and would like to decode a barcode this way.   No need for a smart phone, just a camera will do that can take digital pictures.

The Problem!

The company I am contracted with thinks this is convenient and probably even thinks no one will abuse this.   I hate to think of who might use this to gain personal information about another worker or even get them fired.   It isn't hard to imagine that someone may go so far as use someone else's barcode just to get them in trouble.   So why use barcodes in business?  This is a constant problem that needs to be fixed ASAP for any business that does this might want to consider changing over to something a little more secure.   In the coming weeks, I'll probably talk about this in more detail but until I fix the problems with this company I can't go into much more detail.   

Paul Sylvester