Pages

Tuesday, February 23, 2016

Finger print as your password is a big no no!



If you are like most people your smart phone or tablet contains your whole life. We do our banking, email, calls, contacts (all the people we know), social media, investing, entertainment and many other things that are important to you. So the question is why are you using a password (finger or thumb print) as your password? I know it is much easier than having to type in a passcode or to have to remember a passcode but if you are using a finger print as your passcode/password then your password/passcode is literally all over your phone, car, coffee cup, home and office. Literally everywhere you touch. Essentially you are leaving the keys to get into your life everywhere.
Although your fingerprint is unique spoofing your finger print is easier than you think. If you still don’t believe it then please google “how to bypass fingerprint authentication on an iPhone or Android”. You will find several different ways including step by step videos that demonstrate how to do it. Now I know you do not leave thousands of post it notes with your password(s) on it so please either do not ever leave your finger prints behind or take easier route and do not use your finger print as your password.

Wednesday, April 15, 2015

Attacks From All Directions



Top 10 Imposter Scams from 2014

Scammer's work hard to make you believe that you’ve won something or you have an unexpected problem. Here are the top ten imposter scams as reported to the Federal Trade Commission in 2014.
IRS Scams:
Fake IRS agents try to scare you into thinking you owe back taxes, etc.
Prizes:
Calls saying you won a prize and only need to pay a small processing fee.
Microsoft Tech Support:
Tech support calls claiming there is dangerous software popping up and request a fee to fix.
Fake FBI:
A fake FBI agent contacts you with a supposedly legitimate prince that wants help moving money out of his country
Kidnapped Computers:
A malicious link in an email will lock you out of your files. Attackers demand a ransom for the password.
Medicare Sham:
A fake government representative with Medicare or another agency threatens your medical benefits to get personal information or fees.
Homeland Security:
Threats to immigrants with deportation notices, offering for a charge to certify their immigration status.
“Federal” Agency
You’ve won a grant for thousands of dollars! You just need to pay the “taxes.”
“Professional” Help:
The con artist will try to convince you that your computer is on the fritz. They will try to convince you that your computer has a serious and urgent technical problem.
Caller ID:
An emerging imposter scam involves misusing caller ID. They make it seem that the caller ID number is your telephone number, to get you to pick up the call.            

Friday, April 25, 2014

Did Someone from Microsoft call you?



Wow, who knew that Microsoft has that kind of customer service? The truth is, they do not, it is a scam designed to separate you from your money. This is what is referred to as Social Engineering. (One aspect of Social Engineering is to take advantage of known human nature for the purpose of manipulating the marks (YOU) behavior. There are several variations of this scam but they are usually a variation of the following:
First, an email arrives in your inbox saying that there is a problem with your computer that requires immediate attention. These emails are ignored by most people and are just deleted. The sender of the email knows that the email will be deleted so why send it? Well, The second step of this low tech hack is to actually call the person. “Hello my name is John from Microsoft. We sent you an email earlier about a security issue with your computer. I can help you fix the problem. Please go to www.xxxxxxxxxx.com and I will walk you through the process” The process goes on for a couple of minutes and then they inform you that your computer is now fixed. Sounds great right?
Now what actually happened, First neither the email or the caller was from Microsoft nor any issues your computer may or may not have had is unknown by them. During the phone call with the fake Microsoft tech you granted him/her access to all of your passwords and financial information. At some point after the call you will be ripped off and most likely now have a malicious software infection on your computer that will allow remote access by the bad guys for future use.
More information and details about this scam can be found on the actual Microsoft website: http://www.microsoft.com/security/online-privacy/avoid-phone-scams.aspx

Saturday, January 4, 2014

Do you know what else you are posting every time you put a picture online or in a message?

Your online pictures expose you to more than just what appears in the photo.  Almost all of today’s digital cameras and all smart phone cameras that we all use on a frequent basis actually contain more than just the photo that we can all see. Each of these pictures also contains “Meta Data”. From Wikipedia, the free encyclopedia: Metadata (metacontent) are defined as the data providing information about one or more aspects of the data, such as:
  • Means of creation of the data
  • Purpose of the data
  • Time and date of creation
  • Creator or author of the data
  • Location on a computer network where the data were created
  • Standards used
  • Exact GPS location where photo was taken
So you may be saying so how does this affect me? Well it may or may not depend upon your actions. With this in mind knowing that a picture you post of yourself or others stating or suggesting that you are in one place when in reality you are not can be discovered by looking at the metadata. Even something as simple as posting pictures of your vacation or other trip while you are actually away from your home can often have negative consequences.
Posting a picture on the 21st of June of your vacation or trip to the mall that has Meta data that shows the same date time and location of your trip lets those who would do you harm know for a fact that you are not home. With this knowledge it is now safe to rob your house.

The lesson here in protecting your privacy and security is to think mindfully before you ever post a picture online or send a picture via any digital means.


Brad Boynton

Wednesday, December 4, 2013

What is your Smart Phone telling others and what can lose because of it?

It seems as though in modern society we as human beings cannot live a normal life without our smart phones. It is more than just phone calls and text messages; we need to be connected in multiple ways with multiple applications just to find our way through life. The key to this connectivity is Wi-Fi and Bluetooth.
Question: Is the Bluetooth and Wi-Fi service enabled and turned on even when you are not using it? Do you even know? If you are like most everyone the answer is YES. I know this from firsthand experience. When I find myself at an airport, mall or other location where there are a  large number of people gathered I like to check to see just what kind of information is flowing invisibly through the air. If you knew what I see you would be shocked which is why I am going to tell you all the fun stuff I see when I am out and about. Keep in mind that I am not one of the Bad Guys but if I were imagine what I could do.
BLUETOOTH on your phone is LEFT ON. Bluetooth is often left turned on because people want to be able to answer their phones hands free or listen to their music in the car or some other place. Guess what, your Bluetooth is not just a one way connection. By utilizing your open Bluetooth connection the bad guys can access your phone and the data that resides on it.
Wi-Fi on your phone is LEFT ON. Wi-Fi is often left turned on because people want to be able to access the Internet to check their mail, update Facebook and Twitter, shop or just watch YouTube videos. Guess what, your Wi-Fi is not just a one way connection. By utilizing your open Wi-Fi connection the bad guys can access your phone and the data that resides on it as well as see the data you are sending and receiving.
Imagine, all of your contacts, text messages, emails, pictures/videos, access to your bank accounts and all of your passwords all there for the taking simply because you chose to leave your Wi-Fi and or Bluetooth on when you did not need to. Your entire identity and finances are there for the taking

P.S. Bluetooth and Wi-Fi running also reduce the battery charge on your phone