Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Wireless Security

Why go with a Wireless Security System?

…after being out for a while. You have kids and must be away when they return home from school and you want to check in on them. An elderly relative lives with you and you want to make periodic realtime checks. Three Types of Wireless Connections Landline. A wireless system can run through a landline, which means they are not dependent upon the Internet or a cellphone signal. It will stay activated during a power outage. Landline is cheaper than…

Don’t’s and Do’s when using Public Wi-Fi

…ic Wi-Fi Spot Look around before you settle into a nice spot. Sit somewhere so that your back is facing a wall. Assume all Wi-Fi links are suspicious—kind of like assuming all drivers are drunk whenever you go out driving. A wireless link may have been set up by a hacker. See if you can confirm that a given Wi-Fi link is legitimate. Assume that if the connection name is similar to the Wi-Fi spot, that this could mean that the hacker was clever….

Keyloggers log wirelessly

…t, you’re correct. It could be sitting in someone’s lap one table over from you at the Internet cafe and recording your keystrokes. Your only protection then would be to use a keyboard that requires an electrical cord, or, a wireless one that’s not from Microsoft. Kamkar’s device works only with Microsoft because of the technological compatibility that Microsoft’s wireless keyboards have with the gadget. It is likely however that devices such as…

It’s a Security System and More

…. However, security systems can create a pattern of on-and-off light use when you’re away, simulating that someone’s actually home. If you still have an old-fashioned wireful security system, it’s time to switch to wireless. Wireless eliminates the possibility of a burglar cutting the wires. Furthermore, a wireless system can include a small remote that can activate and deactivate the system, like when you want to go outside at night with the…

5 Ways to prevent Airline WiFi from Hackers

…hey don’t support video streaming. Still, not cool. How can airline passengers protect their data? When you’re not using WiFi, when it’s time to nap or read some nonsense about the Kardashians in a print magazine, go to your wireless manager and disable the WiFi connection with a right-click. Your laptop may also have a keyboard key to do this. If you must absolutely use public Wi-Fi for activities involving highly sensitive information, make…

The Futuristic secure and Smart automated Home is here

…nd windows to retrofit a messy, hardwired security system. These alarms were so expensive that they were mainly used by businesses and rich people. Since then, home security systems have dropped in price. They are now mostly wireless, right down to the cellular phone signal. But what makes home alarms even more exciting is that the majority of the functions are intuitive and smart. Here’s how you can put together a home security system without…

21 ways to Prepare your Credit Cards for Overseas Travel

…ll not likely want personal information, and instead will want you to confirm past transactions. Whenever using free public WiFi have Hotspot Shield installed on your wireless device to prevent data snooping and encrypt your wireless data. A fraud-hold on your card cannot be cleared until you contact the card company or bank to straighten things out. Make sure you know what the phone dialing patterns are for the country you plan on…

How to see and boot off Someone using your WiFi

…ed…” and go to “TCP/IP.” Point browser to the address; enter your login details. If you’ve never changed the default settings, the login should be a combination of “password” and “admin” or blank fields. Locate a section for wireless status or connected devices. Here you’ll find a table with details including the IP and MAC address of all devices currently connected to the router. To find moochers, check that list against your gear. To find the…

6 Ways to Protect your Internet of Things from Hackers

…ing annoyed by it and clicking “later” or cancelling it. The updated version may contain patches to seal up recently detected security threats. Cautiously browse the Internet. Don’t be click-happy. Make sure whenever using a wireless connection, especially those that are free public WiFi use Hotspot Shield to encrypt your data in transit. Don’t feel you must click on every offer or ad that comes your way, or on links just because they’re inside…

Researchers say your Mobile Carrier’s Network isn’t all that Secure

…within its proximity (since 4G is IP based), all while the carrier has no clue. The hacker could infiltrate a desired network, access the 4G network, then have a nice, easy launching pad for the crime. If a hacker uses weak wireless APN connections for his activities, this forces the smartphones in use to rely upon an ongoing network connection. This will make batteries wear out faster. Furthermore, jammed-up signals may lead to denial of…

8 Ways to bullet proof your Social Accounts

…he page you are connecting to is HTTPS, which the “S” makes it a “secure” page. Otherwise on open unsecured, unencrypted wireless, connect only using security software such as Hotspot Shield which encrypts all your wired and wireless communications. #7 Easy Passwords. The easier a password is for you to handle and remember, the easier it is for a hacker to crack. Stop using “princess” and 123456 as your passwords. Use a gibberish of characters…

15 ways to prevent Travel related Identity Theft

…blic Wi-Fi means anyone can snatch your personal information out of the air because this kind of Wi-Fi does not include encryption (which scrambles data). Use Hotspot Shield on your PC, Mac, tablet and mobile to encrypt your wireless communications. The ability to snag your private information requires only a basic knowledge of computers plus a simple plugin, and voila—this person can spy on your browser activities. Try to use only WEP, WPA and…

What is Wardriving?

…hile it may sound odd to worry about bad guys snatching our personal information from what seems to be thin air, it’s more common than we’d like to believe. In fact, there are hackers who drive around searching for unsecured wireless connections (networks) using a wireless laptop and portable global positioning system (GPS) with the sole purpose of stealing your information or using your network to perform bad deeds. We call the act of cruising…

WiFi world wide a Big Security Issue

…gue wireless points of access that fake out users as being valid connection points. The participants were also shocked to learn that their exchanged information was not encrypted. FBT did another experiment using its private wireless network and numerous mobile applications. FBT was easily able to use the apps to invade other smartphones on the same network. One of these apps was a setup to get the participants to use the “attacking” smartphone…

Protect your Cards from Multiple Kinds of Skimmers

…he card reader goes undetected by the consumer, unless the consumer is well-versed in this kind of crime and knows what to look for. The crooked employee gets your information, then sells it. Thieves can now get the data via wireless technology like Bluetooth, eliminating the risk of getting caught at the machine. Pinhole cameras can be placed anywhere close by, such as in a brochure holder. A crook may place a data capturing device over the…

Hidden Covert Cameras found in Woman’s Home

…continuing to make unwarranted comments or advances even though you’ve told them to stop? Who has access to your home even though you don’t trust them? Set up a home security system. They’re now wireless, cheap and portable. Wireless IP cameras can connect to your Internet and you can watch your home via smartphone. Shield your hotel room’s peep hole with paper. A creep can get a “reverse peep hole” and watch you from the outside in. Get a…

7 Ways we leak our Private Data

…computer and mobile too. Using free WiFi. Every time you log into free WiFi you are either giving your data away through the carrier who logs your device or criminal hackers are sniffing out your information via unencrypted wireless. Never log into free WiFi without a virtual private network (VPN ) like that offered by Hotspot Shield. Using a public computer to log into a private service. When you access one of your accounts on a computer at a…

7 Lies You tell Yourself about Your Wifi

…on’t think that WEP (wired equivalent privacy) can keep out hackers. It’s outdated. Its encryption abilities are flawed. Avoid WEP. Use WPA or WPA2. If you are on a free Wifi get Hotspot Shield VPN which protects your entire wireless session. #2 “My ISP set up my wireless network, so it must be safe.” Do you really think that big stupid cable company that’s can’t get a simple customer service call right really has your back? Many ISPs and…

How To Stop Criminal Hackers In Their Tracks

…been able to access my drive and files and even plant a virus on my device. But I wasn’t worried because I use a virtual private network software that allows me to surf on an unsecured connection. Amtrak also knows its free wireless is risky for its users, so before you can use it, you have to agree to the terms and conditions of the Wi-Fi’s use that indemnify Amtrak. Protecting Your Business Free wireless is everywhere, because Wi-Fi brings in…

WiFi Security Truths and Falsehoods

Security truths evolve—meaning, they change, and you must keep up with this, particularly with wireless security. Advice for wireless security can quickly become outdated. There are actually three big wireless security myths swirling around. #1. Limit the IP address pool to restrict number of devices that can connect. Even if your cable company tech recommends this, it’s no good. The unfounded idea is that when the range of allowable IP…

Small Business Protect Your Wifi

…s his or her own password and username. Enterprise prevents snooping and hijacking among your organization’s employees. Personal: To enable personal mode WPA2 on a wireless router, create a passphrase on access points or the wireless router. Type the IP address of each AP or router into a web browser to log into the control panel of each AP or router. Then enable WPA2-Personal with encryption/cypher type by finding the wireless security…

How do I protect Myself engaged in the Internet of Things?

…access, ID and authentication, legislative boundary constraints and other issues must be considered. And should data be stored publically or privately, is another big question to answer. Unprotected wireless. Making sure any wireless connections are protected by a VPN is essential. Hotspot Shield VPN is a great option and it’s free. At this point, nobody really knows how all of this will pan out. Regulation and legislation will be very…

Corporate BYOD puts Client Data at risk

…ike e-mail. 5) Samsung Knox. This system is for Android devices, managing with a multi-tiered security approach. One’s network will be protected from malware, hacking, viruses and non-approved access. 6) Protect your BYOD on wireless networks. Use VPN if you’re on a portable wireless device. Hotspot Shield VPN is free, though its paid version is more e expanded and faster. First launch Hotspot before you use your PC laptop, iPad or iPhone to…

11 Ways to prevent your Email from getting hacked

…a VPN solves that problem. Hotspot Shield VPN service is a great option that protects your entire web surfing session, securing your connection on both your home internet network and public internet networks (both wired and wireless). Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning…

Crack Your WiFi Password To Protect Yourself

…gainst Reaver attacks.” What this hacker does is explain how the attack works, seeing the vulnerabilities users can use to reverse engineer this process to protect themselves. Whether on your own network or on someone’s free wireless network, a VPN such as Hotspot Shield VPN will mask a user’s IP address and protect all wireless data from thieves. But if a router is hacked, that vulnerability may still allow for an attacker to plant code on…

Employees putting data at risk on WiFi

…’s access to certain activities. Having each device equipped with a VPN (virtual private network) like Hotspot Shield VPN is an effective way to encrypt the devices’ WiFi communications when on unencrypted public WiFi. Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America….

Hackproof your facebook account

…minals to sniff. Set up encryption on your home or office router. At a minimum, use WPA or WPA2 encryption to secure your data. Use a VPN (virtual private network) such as Hotspot Shield VPN that locks down and encrypts your wireless communications. Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security…

School WiFi Often Open and Insecure

…tion. If it’s labeled WEP, it also has encryption, but at a substandard level that is hackable. Want to be safe? Use a private VPN! Logging into public WiFi without any encryption puts all your information at risk. Install a wireless VPN such as Hotspot Shield. Hotspot Shield VPN is a great option that protects your entire web surfing session, securing your connection on both your home internet network and on public internet networks (both wired…

4 Ways to Share Paid Hotspots

…nds and colleagues—will be, too. Each of these connectivity options should contain a degree of encryption on its own. However, a virtual private network, such as Hotspot Shield VPN, is a free option that can encrypt all your wireless communications. Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security…

Streamlined ‘Passpoint’ WiFi coming

…inding they have to upgrade their data plans so they don’t go over their limit. With Passpoint, data usage will go down when WiFi connections happen effortlessly. This is all great news for millions of people now using their wireless digital devices exclusively. But always keep in mind that no matter what you are using—a laptop, tablet, reader or mobile phone—wireless is inherently insecure and until Passpoint becomes as ubiquitous, a VPN such…

Unsecured wireless video baby monitors hackable

…s, software or firmware may need updating if vulnerabilities are found. Always check with a device manufacturer’s website to ensure the latest software/firmware or critical updates are installed or available to install. Most wireless vulnerabilities start at the home/office wireless network and not on the devices themselves. It is essential to encrypt wireless with at least the WPA standard built into your router’s software. Just like you need…

Cellular Base Station Range Extenders Vulnerable to Attack

…our cellular base station’s model number to see if there is a patch—and install it. Otherwise, anyone connecting to cellular base station should employ a virtual private network software such as Hotspot Shield VPN to encrypt wireless communications. Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security…

Danger: Wireless Toilets Next on Hackers’ List

…esome power of the Satis (toilet) could fall into evil hands. All a hacker would have to do is download the My Satis app, get in range, pair it to the toilet using the code and flush away.” Scary! As we rely more and more on wireless communication, it is important to keep your wireless devices secure from hackers bent on flushing your data out. (That was bad.) Anyway… Be smart about what kind of data you transmit on a public wireless connection….

Cybercriminals Camping Out on Hotel WiFi Using Evil Twins

…are often traps set to ensnare anyone who connects to it. Wireless users who connect to an evil twin risk their data being scraped by a criminal who captures all of their unencrypted communications that are going through his wireless router. Each and every wireless data packet is sniffed and captured by a software program that will later piece together all the information in order to steal identities. Unsecured, unprotected and unencrypted…

New Smartphone Owner? Pay attention

…software. Whether built into the OS or downloaded as an app from a third party, get software that will remotely locate your device if it is lost, then will lock it if needed and wipe the data. Protect your wireless. Not all wireless is created equal. Your carrier’s 3G/4G has a level of encryption that’s crackable, but unlikely to be cracked—whereas any open or free WiFi connection can expose your device and its data to criminals. Installing…

Why Should You be Careful When Using Hotspots or Free Wi-Fi?

…s layer (SSL, hence the S after HTTP), is a more secure option set up by a website owner who knows security is essential. Look for “HTTPS://” in the address bar to signify you are on a secure page. Even on an open, unsecured wireless connection, HTTPS is more secure than HTTP. Tips to Protecting Your Home Wireless Connection: Password protect your Wi-Fi connection. You can set your router to allow access only to those users who enter the correct…

Security Measures for the Wealthy vs. for the Rest of Us

…h, anyone can protect his or her identity with identity theft protection. For almost free, everyone should get a credit freeze. I do both and recommend you do the same. Wireless security: The beauty here is that protecting a wireless connection can be free via a free VPN service from Hotspot Shield. And for another few bucks, you can get a paid version that’s ad-free and faster—and you don’t need to be wealthy to afford it. Robert Siciliano is…

5 No-brainers for Keeping Your Email Safe

…is risky and, frankly, irresponsible. #2 Use a VPN over wireless. Wireless was born to be convenient, not secure. Sniffers can read wireless communications over free public WiFi and get usernames and passwords. Always use a wireless VPN, such as Hotspot Shield, that encrypts your wireless access. #3 Log out of your device when not in use. Staying logged in 24/7/365 is risky. Anyone that has access to your computer or mobile device at home or…

Securing Your Mobile in Public Places

…less VPN such as Hotspot Shield. Hotspot Shield VPN is a great option that protects your entire web surfing session, securing your connection on both your home internet network and on public internet networks (both wired and wireless). Hotspot Shield’s internet security solution protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads, etc.) are secured through HTTPS—the protected internet protocol….

How to Get Free and Secure Wireless Anywhere

…e susceptible to hackers using sniffing hardware and software to steal your information. When you’re hopping on free WiFi, make sure to download and install Hotspot Shield VPN on your mobile, tablet or laptop to encrypt your wireless communications so evildoers can’t see your data or install a Trojan on your device. Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your…

What is Mobile Banking? Is it Safe?

…ure you are visiting the real bank every time and not a copycat site. Connect to your bank’s mobile site or app securely by making sure that your wireless network is secure. Never send sensitive information over an unsecured wireless network, such as in a hotel or cafe. Use a virtual private network software that protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. My…

How Secure is My Mobile Carrier’s Network?

…dent of the United States, then they need to be on a secure, protected network. But you, on the other hand, aren’t the NSA and don’t really need that. While there is no such thing as 100 percent secure, your mobile carrier’s wireless is pretty much as secure as it can be due to the way it is setup, and the security technology is built into the way the network communicates with the hardware in your mobile device. There are numerous encryption…

Avoid Risky Web Searching on a Mobile Device

…ption that many of us use to preview URLs on computers doesn’t work yet on most touch screen mobile devices. Wireless internet also contributes to risky web searching. Unsecured, unprotected, unencrypted and sometimes shared wireless internet communications over WiFi in your home, office or any publicly connected WiFi (such as at a coffee shop, airport or hotel) are vulnerable to sniffers. On wireless connections that aren’t properly…

10 Million Mobile VPN Users Can’t Be Wrong

…a VPN solves that problem. Hotspot Shield VPN service is a great option that protects your entire web surfing session, securing your connection on both your home internet network and public internet networks (both wired and wireless). Hotspot Shield’s free proxy protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads, etc.) are secured through HTTPS—the protected internet protocol. Further, Hotspot…

6 Tips for the Family PC Fixer

…mmunications from data sniffers. Hotspot Shield VPN is a great option that protects your entire web surfing session, securing your connection at both your home internet network and on public internet networks (both wired and wireless). Hotspot Shield’s free proxy protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads, etc.) are secured through HTTPS—the protected internet protocol. Robert Siciliano…

How Mobiles Have Become a Big Target for Corporate Networks

…latest patches and invest in antivirus protection for your phone. Use a free VPN service such as Hotspot Shield VPN, to protect your entire web surfing session. Hotspot Shield secures your connection, no matter what kind of wireless you are using—whether you’re at home or in public, on wired or wireless internet. Hotspot Shield does this by ensuring that all web transactions are secured through HTTPS. It also offers an iPhone and Android…

How to Use Foursquare to Get Free WiFi

…other words, they move around a lot. They also thrive on, and feel the need to connect to, some form of wireless, either on their mobile or their laptop. As a result, Foursquare has become a great tool to find either a free wireless connection or one that requires a password, and that password is available in the comments on Foursquare location listings such as those for coffee shops and restaurants. Frankly, I don’t use Foursquare like others…

What are the risks of BYOD?

…d or iPad and then connect it to the corporate network. Now the IT guy has to worry if that last app you downloaded will infect other computers on the network. No matter what you do, make sure whenever you use your BYOD on a wireless network that the device is protected. I use VPN specifically when I’m on my portable wireless devices. If I’m on my PC laptop, iPhone or iPad and I’m traveling on business, I know I’m going to be connecting to…

How do I protect mobile devices while traveling?

…Shield VPN. A free, ad-supported program, Hotspot Shield protects your entire web surfing session by securing your connection, no matter what kind of wireless you are using—whether you’re at home or in public, using wired or wireless Internet. Hotspot Shield does this by ensuring that all web transactions are secured through HTTPS. It also offers an iPhone and Android version. Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN….

Your W-Fi Router Might Be Easy to Hack

…y that’sthen plugged into your computer or gives off your wireless connection. Anyway, a recent study saidresearchers “have discovered critical security vulnerabilities in numerous small office/home office (SOHO) routers and wireless access points. We define acritical security vulnerability in a router as one that allows a remote attacker to take full control of the router’s configuration settings, or one that allows a local attacker to…

How to Protect WiFi When Flying

…your device into automatically connecting. Once you’re hooked, all of your information travels through his device and he captures every packet of wireless data. Protect yourself. #1 When WiFi is not in use, head over to your wireless network manager and right-click to disable your wireless network connection. Some laptops have a switch and others have a keyboard key. #2 If you plan to connect to in-flight service, you need to protect your…

To VPN or Not to VPN, That is the Question!

…movies, music and software; your employer may be similarly vigilant and criminals are trying to steal your identity or the identities of all your clients. So, to VPN or not to VPN? I VPN specifically when I’m on my portable wireless devices. If I’m on my PC laptop, iPhone or iPad and I’m traveling on business, I know I’m going to be connecting to various free public WiFi clients at the airport and in my hotel. Before I connect to any WiFi, I…

New Alarm Systems are Cost Effective and High Tech

…ra of clunky black-and-white video monitors and recording devices crammed here and there, of blinking lights and keypads galore, has given way to slick, low-cost technology that homeowners control with just a few clicks—from wireless surveillance cameras that are monitored remotely, to door alarms that can be activated hundreds of miles away.” Systems today have wireless cameras, remote-controlled thermostats, remote-controlled/timed light…

How Protected is My Tablet on WiFi?

…l, airport or coffee shop, you may first have to read a Terms and Conditions (TC) statement and click “I Agree” before you logon and connect. If you actually read the TC, you’d realize the organization providing you the free wireless is telling you point blank that its wireless is unsecure, your data is visible to the world and it is not responsible for your data being stolen. On the other hand, if you are connecting to WiFi that employs WPA or…

How Can I Ensure My Social Network Interactions are Secure on Wireless?

…n/read (or “sniffed”) if a hacker has the right tools. Keep in mind that not all hackers are criminals; some are what are called “penetration testers” who use software specifically designed for seeking out vulnerabilities in wireless networks or in websites themselves. The problem here is some of the tools penetration testers use can also be accessed by criminals, making your information vulnerable to a bad guy. Back in 2010, a (non-malicious)…

College Students Need to Protect Wireless on iPads

…, which adds additional risk factors to their profile. These factors combine to transform the generation that grew up using the internet most frequently into the generation that’s the most vulnerable online. Hotspot Shield a wireless VPN has been downloaded more than 100 million times on PCs, Macs, iOS and Android platforms. The company experienced explosive growth in 2012 and, according to Quantcast, is among the top 35 online destinations…

10 Tips for a Safe and Secure Spring Break

…hey can take advantage of you, there are criminal hackers looking to swipe your wireless data and access your accounts to steal your identity. Download Hotspot Shield VPN for your iOS, Android, PC and Mac to encrypt all your wireless internet traffic. Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security…

Stop, Think and Connect on Public Wi-Fi

…our web communications: “Encryption is the key to keeping your personal information secure online. Encryption scrambles the information you send over the internet into a code so that it’s not accessible to others. When using wireless networks, it’s best to send personal information only if it’s encrypted—either by an encrypted website or a secure WiFinetwork. An encrypted website protects only the information you send to and from that site. A…

FTC: Identity Theft Top Complaint Once More

…nd critical security patches updated. Consider getting a credit freeze and/or identity theft protection. Shred—don’t just throw away—personal information. Lock down your wireless network with WPA2 encryption. Protect data on wireless devices, particularly when using a public WiFi network, with a free VPN such as Hotspot Shield. By following these guidelines, you will keep your identity safer. You know who you are; don’t let anyone else think he…

What Kind of Wireless is Secure…and What Isn’t?

…more secure than other options. Cover all your bases by installing Hotspot Shield. A free, ad-supported program, Hotspot Shield VPN protects your entire web surfing session by securing your connection, no matter what kind of wireless you are using—whether you’re at home or in public, using wired or wireless Internet. Hotspot Shield does this by ensuring that all web transactions are secured through HTTPS. It also offers an iPhone and Android…

3 Wi-Fi Myths That Put Your Data at Risk

…d by default it might be called “Linksys,” “Belkin,” “Netgear” and so on. Or some people customize the SSID and name it “My Neighbor Should Clean His Yard.” Lots of security articles will tell you that one way to secure your wireless is to hide it or turn off its broadcasting. But really, this doesn’t help. There are a plethora of tools that can detect your hidden wireless network, so this presents a false sense of security. Broadcast your…

5 Ways To Protect Your Data On Public Wi-Fi

…turn off all file sharing when heading out. Depending on your operating system, use these instructions from Carnegie Mellon to find out more. #3. Don’t automatically connect to Wi-Fi networks. When initially connecting to a wireless network, we are often faced with a checkbox or option to “automatically connect” to the network in the future. Uncheck this and always manually connect. If your home network is “Netgear” and you are somewhere and…

6 Ways You Are Vulnerable On Wi-Fi

…are vulnerable to sniffers. Sniffers read the wireless data as it travels through the air and converts it so other computers (and those who administer them) can read it in words, numbers and computer code. #3. Poorly secured wireless. Protected Wi-Fi that employs WEP, or Wired Equivalent Privacy, is vulnerable. WEP, introduced in 1997, is the original version of wireless network security. Over the past decade and a half, however, WEP has been…

What’s a Wireless “Sniffer” and Why Should I Care?

…o determine the security of a network, bad guys also use them to see your data as it travels from your device to the router communicating the wireless internet signal. Unsecured, unprotected, unencrypted and sometimes shared wireless internet communications over Wi-Fi in your home, office or any publicly connected Wi-Fi (such as at a coffee shop, airport or hotel) are vulnerable to sniffers. A sniffer employed by a criminal can be used to spy on…

13 Digital Security New Year’s Resolution Tips for 2013

…curity system. Hire honest employees. Unfortunately, too many people lie, cheat and steal—and when they come to work for you, they drain company resources until they are fired. It’s best to use prescreening services. Upgrade wireless. If your wireless router is more than 2 years old then it’s time to buy new. Security standards continue to be upgraded and old is often not secure. Don’t’ worry about any of the above! Seriously! Now I didn’t say…

10 Tips to Safe Online Shopping

…card number and it will give you a number that you can use for a specific purchase. Any use of that one-time credit card number will be automatically flagged or not approved by your bank. Do not use a public computer or free wireless connection to shop online—If you are using a public computer, strangers may be able to access your browsing history and even your login information. To protect yourself, do all of your online shopping from your home…

New Mobile Security App for Android Smartphones

…f a risky website or download a potentially unsafe app. Once the device is infected, malware allows the collection of data from the device such as a location information, financial information, and login credentials. Verizon Wireless has always protected devices on its network using sophisticated network intrusion and data analysis tools. Now they will extend their network security to customers with the introduction of Verizon Mobile Security,…

How Do I Protect Myself When Using Wi-Fi?

…ired networks. Today, with criminal hackers as sophisticated as ever, if you are using an open unsecured network on your mobile device, you risk exposing your data. There are many ways for hackers to see who’s connected on a wireless connection, and to gain access to your information including passwords, emails, and all the data on your device. To protect yourself and your data when using Wi-Fi, you should: Turn it off: the most secure Wi-Fi is…

Your New Best Friend May Not Protect You

…remember, don’t “save” your information so that you can automatically log in the next time—if your mobile is lost or stolen, someone else can easily access your accounts or files. Turn off WiFi/Bluetooth: If you aren’t using wireless services, shut them down. Open, unattended wireless connections are easy targets for criminals. Don’t get scammed: Any emails or text messages you receive requesting personal information are usually scams. Unless…

FCC and Carriers to Create Stolen Phone Consortium

…fort consortium to identify, catalog and dead end stolen mobile devices. I said never, no way, won’t happen, they make too much money off the contracts to turn down a stolen phone. But now that lawmakers have stepped in, the wireless industry will want to have a say before any laws are passed that tie their hands. PROTECT is a good thing. It helps create awareness – people still don’t get that they need mobile security. In the coming months we…

Use Cases for NFC in non-payment scenarios. Where else will we see this technology flourish?

Near Field Communications (NFC), is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. In the case of a mobile wallet application, those devices would be a mobile phone and a point of sale device at a checkout counter. NFC handsets are set to increase to about 80 million next year. Gartner estimates that that 50% of…

Wireless Security:Wi-Fi Hacking Burglars Busted

…they used sophisticated electronic equipment to break through networks using a 12-year-old security algorithm — Wired Equivalent Privacy, or WEP protection. Right out of a Mission Impossible movie these burglars hacked wireless networks and stole employee and client data. Their burglaries involved stealing laptops they used those laptops to crack payroll accounts and steal banking information. Once they turned the data into cash they…

Safe Banking On Your Mobile Device

…ata, do not take precautions to secure their phones. So, here are some tips for mobile bankers of all ages to keep you safe while banking on the go: Connect to your bank’s mobile site or app securely by making sure that your wireless network is secure. Never send sensitive information over an unsecured wireless network, such as in a hotel or café. Download your bank’s mobile application, so you can be sure you are visiting the real bank every…

Cloud Home Security is Here

…retrofit a messy, hardwired security system. These alarms were so expensive that they were mainly used by businesses, rather than in private homes. Since then, home security systems have dropped in price. They are now mostly wireless, right down to the cellular phone signal. But what makes home alarms even more exciting is that the majority of the functions are cloud-based. I have the “ADT Pulse,” which marries home security with automation….

Neighbor Gets 18 Years for Hacking Neighbor

…did not wage this campaign in the light of day, but rather used his computer hacking skills to strike at his victims while hiding in the shadows.” It’s a pretty frightening story that should scare you into locking down your wireless internet. When setting up a wireless router, there are two suggested security protocol options. Wi-Fi Protected Access (WPA and WPA2) which is a certification program that was created in response to several serious…

Most Unwanted Criminals: Dumpster Divers, Sly Spies, and War Drivers

…le sharing turned on, she can browse your PC’s folders and files, and even plant a malicious program that gives her backdoor access whenever you connect to the web in the future. Never choose an “ad-hoc” computer-to-computer wireless network that may imitate a legitimate wireless connection. It’s best to invest in a cell-based Internet, requiring a username and password. Always wait until you’re on a secure network before doing any banking or…

Another Reason To Secure Your WiFi

…ob, and your standing in society. Anyone using an open unsecured network risks exposing their data or having it used as a portal for committing crimes over the web. There are many ways for a bad guy to see who’s connected on wireless and to gain access to their information. When setting up a wireless router, there are two suggested security protocol options. WiFi Protected Access (WPA and WPA2) which is a certification program that was created…

The Rise of Smartphones

…to purchase and run applications. Smartphones are generally equipped with voice, data, Wi-Fi, Bluetooth, and GPS functions. Operating systems include Google’s Android, Apple’s iOS and Windows’ Mobile 7. Most function on a 3G wireless connection and can switch to Wi-Fi when it’s available. Newer models are being built to accommodate the upcoming nationwide deployment of 4G wireless networks. “Worldwide mobile phone sales to end users totaled 417…

Mobile Payment is Coming

Near Field Communications, or NFC, is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. This year, over 70 million mobile phones will be manufactured and sold with NFC built in. NFC can be used in other ways beyond credit card transactions. It can integrate with hardware, such as your car, to unlock a door. It can…

Hacking Wireless for Identity Theft

…available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-time high. Wireless Internet is amazing. But is it safe? The short answer is: no. Wi-Fi was born to be convenient, not secure. Unsecured, unprotected wireless is everywhere. When a device connects to unprotected Wi-Fi, all the data…

Crime Is On The Decline. I Didn’t Notice

…tem was not turned on. These kind of stats just makes me mental. Even though property crimes have declined, there are still over 2 million burglaries. Here are some tips from a police department Be proactive with the help of wireless home security. New interactive smart home solutions go beyond traditional home security to provide a new level of control, accessibility and connection. Wireless home security provides with anywhere, anytime access…

Criminal Hackers: The Soldiers of the Web Mob

…e media spotlight this year, we should all be aware of these risks. To protect yourself from the bad guy, make sure your PC is fully updated with critical security patches, antivirus software, anti-spyware software, a secure wireless connection, and a two-way firewall. Check your online account statements frequently, and consider investing in identity theft protection that monitors your credit reports and monitors your information on the…

Wireless Security

Wireless Security” is an Oxymoron, But There is Hope

…in the previous system, Wired Equivalent Privacy. Wired Equivalent Privacy was introduced in 1997 and is the original version of wireless network security. There are a few things you should do to protect yourself while using wireless. Be smart about what kind of data you transmit on a public wireless connection. Only transmit critical data from secure sites, ones where “HTTPS” appears in the address bar. These sites have additional encryption…

Google Street View Security Issues

…that they planned on using to collect data on “Public Wi-Fi Hotspots” . The code pulled more the just hotspots. There could have been enough data pulled to steal someone’s identity. Protect yourself by making sure your wireless router is protected with a password. When you have an unsecured wireless connection, it’s just like leaving the front door to your home open and inviting the world to come inside to take a peek. Google says…

2 Million Homes Are Burgled Every Year

…are home security alarms . Studies show as many as 25% of all American homes are equipped with a home security system. Additional security measures such as home security cameras are far less expensive and easier to install, wireless alarm systems and window film that makes it difficult to break glass. Today’s door locks are better than ever too. Certainly a person can buy and install budget locks, but they can be easily picked or compromised…

Home Security: People Are Being Very Disappointing

…orders, personal checks, Western Union, MoneyGram or cash that require you to send money to a stranger in response to money they have sent you. This is an advance fee scam. Home security tips : If you have to meet someone at your home consider keeping the meeting outside. If you have to meet inside then have someone standing next to the home security alarm ready to press the panic button or have a remote control for your wireless security alarm…

How to Mess With a Burglar’s Head

So you follow set guidelines for home security tips and installed all the necessary technologies like a wireless alarm system to prevent the bad guy from breaking in. But Murphy’s Law dropkicked you and all failed for whatever reason and th e bad guy is in your home while you are away on business or at work. Here’s a do it yourself cheap way to have a home security camera system to spook the jerk and possibly get him caught . This is easier…

Building Out a Home Security System

…dow sensors. The alarm panel should be installed in a relatively secure enclosure and in a relatively secure room within the house. The alarms communicat ions go to the monitoring company and the local police can be wired or wireless or both. Wired are best and a cell wireless back up is even better. Additional layers of protection include the stickers that come along with the alarm that are installed on doors and windows. Make use of any…

How to Spend More Money on Home Security

…. Panic or Safe Rooms : A safe room provides a space whe re you can survive a tornado, hurricane or home invasion with little or no injury. Residents can hide out in a relatively bullet proof, well stocked room equipped with wireless communications and wait for law enforcement to show up. 16 or 32 Camera Surveillance System: Once you go beyond 8 cameras prices start to rise. However 16 or even 32 cameras will provide you with a bird ’ s eye view…

Most People Don’t Understand Cyber Threats

…oft’s Internet Explorer is clunky and the most hacked software on the planet. Mozilla ’ s Firefox is less hacked and more secure. Maintain the default settings keep the pop-up blockers and phishing filters on. 5. Secure Your Wireless : If you are running an unsecured wireless connection at home or the office, anyone can jump on your network from 300-500 feet away and access your files. Serious. The router has instruction on how to set up WEP or…

Apartment Security 101

…munity is by buying the local newspaper. The police blotter over a one month period is telling. Ask if you have permission to install an in-apartment home security system with motion detectors. This should not be negotiable. Wireless home security systems are non-invasive and not expensive. Require a peep hole on your door. If the doors are glass paned opposed to solid core doors, then your potential landlord isn’t concerned about your security….

Why is Child Pornography on Your PC?

…nection have always been essential processes on my networks. My main concern has always been to protect my bank account by keeping the bad guy out. In my presentations, I’ve always stressed the importance of making sure your wireless connection is secured, to prevent skeevy sex offender neighbors or wackos parked in front of your business from surfing for child porn and downloading it to your PC. Once a predator uses your Internet connection to…

Big Time Identity Theft Hackers Indicted

…orts according to the indictment, Gonzalez and his conspirators reviewed lists of Fortune 500 companies to decide which corporations to take aim at and visited their stores and used a technique called “wardriving” to monitor wireless networks. The online attacks took advantage of flaws in the SQL programming language, which is commonly used for databases. Threat Level, by Wired magazine, reported that Gonzalez had lived a lavish lifestyle in…

Spying is Alive and Well…and Leads to Identity Theft

…gedy. There are plenty of tools to facilitate spying. There are more ways of gathering intelligence than ever before. An online search for “spy shop” or “spy store” turns up a vast collection of small wireless cameras, listening devices, software, and hardware that can help the customer collect enough data on their target to do some damage, or uncover sensitive information. Spyware is commercially available software that…

Protecting email While Traveling From Identity Theft

…é could have spyware or a keylogger installed. This type of hardware or software can record everything you do on a PC. If you use your own laptop on an unsecured public wireless connection, your data could be intercepted via wireless packets in the air. You could also accidently log on to an “evil twin,” a wireless network that appears to be a legitimate WiFi spot, but is actually being broadcast via a router or computer, allowing a…

A 'Whac-A-Mole' Approach to Preventing Identity Theft

…s, and the websites you visit. Use Firefox. Internet Explorer is clunky, and the most frequently hacked software that exists. Mozilla’s Firefox is more secure. Secure your wireless. If you’re running an unsecured wireless connection at your home or office, anyone can jump on the network and access your files from up to 500 feet away. Your router should have instructions on how to set up WEP or WPA security. WPA is better. If this is…

TJX Identity Theft Costs Another 10 million, Protect Yourself from WarDriving

…ification program that was created in response to several serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy. Wired Equivalent Privacy was introduced in 1997 and is the original form of wireless network security. Wireless networks broadcast messages using radio and are thus more susceptible to eavesdropping than wired networks. It’s one thing to access your own wireless connection from your home or office….

Your Online Bank Account'; Criminal Hackers Hacking It

…are on the planet. Mozillas Firefox is less hacked and more secure. The jury is still out on Googles Chrome browser, but it’s sweet! Maintain the default settings keep the pop-up blockers and phishing filters on. Secure Your Wireless; If you are running an unsecured wireless connection at home or the office, anyone can jump on your network from 300-500 feet away and access your files. Serious. The router has instruction on how to set up WEP or…

Identity Theft Expert and Speaker on Personal Security Cites Research in Call for Organizations of All Kinds to Improve Their Mobile Computing Security Measures

…although data from the report suggested that attention to laptop security is on the rise, findings from the report also revealed that “40 percent of respondents have either not secured, or only partially secured, their wireless networks” and that “only 11 percent have any kind of security system in place to govern” the use of portable storage devices. “Wireless networks, portable storage devices, and the like are…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in