fbpx
Created By Annie Jennings PR, National Publicist  

Should You Post Pictures Of Children Online?

Most people give no thought whatsoever to posting pictures of their children online. They are proud of their kids, they love them…so why not show the world how wonderful they are so others can enjoy each milestone too? Plus, Grandma and Auntie [...]

Kids And Smartphones: How Old?

How old is old enough for a kid to have a smartphone? Right out of the gate, I’m saying 16, and I know there’ll be some backlash from that. Some will say it all depends on the kid; others will argue there’s no right answer. Here’s why [...]

What Is Scareware?

When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One of these tricks is to scare us into thinking that our computers or smartphones have become infected with malware to get us to purchase [...]

Would You Use Facebook To Catch A Bad Guy?

In Oklahoma, the OK state, an elderly couple was home invaded and held at knifepoint, and the woman was knocked to the ground. During the ensuing abuse, their home was robbed and the predator got away. Not OK. The police were notified and a [...]

Fighting The Bad Guy…And Winning

If someone were to jump on you and start whacking away, what would you do? Would you fight back? Run? Curl up into a ball and beg for mercy? Do you have a plan? Have you even thought about what your reaction would be? When I ask my audiences [...]

5 Rules For Using Coffee Shop WiFi

In order to compete with the likes of the chain coffee shops and now fast food joints, just about every coffee shop or small restaurant is supplying its clients with free WiFi. Unfortunately, there are people who don’t understand the rules [...]

Prepare Now For Device And Data Theft

Digital device theft is a big problem. I’ve seen numerous stories about iPhones being stolen right from a person’s hand while the user was talking on it. Others have reported sitting in a coffee shop while having a conversation and having [...]

Unsecured Wireless Video Baby Monitors Hackable

Baby monitors have evolved from simple one-way radio communications based on older radio waves to highly evolved IP based, internet-connected cameras that can be viewed on a smartphone or tablet. Back in the day, when cordless phones were 900 [...]

High-Tech vs. Low-Tech Locks

High technology doesn’t necessarily mean better, stronger or faster. It does usually mean more convenient, as the word technology is defined as “including the use of materials, tools, techniques, and sources of power to make life easier [...]

6 Tips On Securing Your Home From Those You ‘Trust’

There are going to be times in your life when you will need to simply trust people who you let into your home for various reasons. People such as: House cleaners: House cleaners get in the nooks and crannies of your home and have to be trustworthy. [...]

Selling Your Smartphone? Beware Of Stowaway Data

Upgrading your mobile device? It has become standard practice to upgrade to a newer device every one to three years. And when doing so, people often sell, donate or discard the old one. The goal is often to sell the old one to make up the difference [...]

Passwords: Fingerprint, Heartbeat Or Brainwaves?

There is no such thing as a truly secure password; there are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your accounts. But passwords are a mess. We have too many; [...]

Streamlined ‘Passpoint’ WiFi Coming

WiFi connects us everywhere, such as in parks, subways, airplanes, coffee shops and public WiFi hotspots. The WiFi Alliance says there are more than a million hotspots worldwide, and a report by market research company Informa Telecoms and Media [...]

I Really Want My Phone to Be My Wallet. Don’t You?

Wallets suck. Seriously. Mine hurts my butt when I sit down. I have to remember to take it with me, and then I’m always afraid of losing it. There’s nothing fun about it. And…well…it’s dirty. It really is—money is dirty, and the [...]

NFC App On Androids Facilitates Automation

Near field communications (NFC) is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. In the case of a mobile wallet [...]

5 Home Security Tactics Of The Uber Rich

The uber rich have many reasons to invest in uber security. I met a woman who won a $300 million lottery, and she had some unfortunate stories about how low people go to get at and to moneyed individuals. So to protect life and limb, the uber [...]

New App Stores House Or Car Keys Online. Is It Safe?

Ever lock yourself out of your car or home? I’ve done each at least once this year; that’s about my average. After the last time I got stuck on the cold side of my front door, I decided to go with keyless locks for my home, specifically [...]

7 Scary Privacy Issues To Be Aware Of

We are all too aware of the National Security Agency breaking encryption. The NSA has frequently been known to be implanting back doors on various servers, networks and within numerous social sites, email providers, mobile networks, mobile [...]

Hackproof Your Facebook Account

With over one billion people connected to Facebook, we have to assume that many of them are criminals. (Criminals are people with friends too!) But the criminals we need to be concerned about are the ones who create all kinds of scams designed [...]

Good Heavens! Churches are Big Targets for Burglars

Is nothing sacred? Well, no. Not even churches. Really, especially churches. The problem with churches, like any public place, is that by design, they are open for anyone to come in and worship at any time. But in the case of a burglary, they [...]

Why Mobile Security is a Must

Smartphone use continues to increase. More than one third of Americans have dropped landlines and only use mobiles. It is very possible that within the next 10 years, the landline will be obsolete and we will all be wireless. And when there’s [...]

12 Biggest Home Security Mistakes

We all make mistakes; the key is to make them once or twice and learn from them. If you keep making them, bad things happen—and home security mistakes are not ones you want to repeat. Here are a dozen mistakes that you don’t want to make [...]

Apple Makes Life Harder For iPhone Thieves

You probably know that iPhones are high on the wish list of thieves all over the country —so much so that data from the New York City Police Department reveals that iPhone and iPad thefts have soared 40 percent compared with the same period [...]

Socint: Disseminating Cybercrime Through Social Intelligence

People talk—A LOT. They can’t stop talking. Talking, getting something off your mind and out there feels good. Talking takes the pressure off one’s mind; our mouths are like relief valves for our heads. The problem has always been that [...]

Laptop Theft Leads to Identity Theft

Ever lose a mobile device? Have one stolen? Know someone who has? Device loss and theft is a common issue when it comes to identity theft and results in data breaches. Some studies have shown as many as 2.5 million laptops are stolen annually, [...]

Standard Door Frames Make Burglary Easy

Stop what you are doing. Walk over to your front or back door. Open it. Look down at the doorjamb where the holes are—you know, where your doorknob and deadbolt locks (hopefully they are Schlage) go into the frame. Those 3/4-inch-ish holes [...]

Mobile, Wearable And Now…Implantable Technology?

It began with the laptop. The laptop was the first portable internet-connected device that freed up millions to create a mobile workforce. Next was the smartphone, which didn’t really take off until Apple opened it up to developers and allowed [...]

Cellular Base Station Range Extenders Vulnerable to Attack

Low-powered cellular base stations are often found in residential homes and small businesses where mobile coverage is scant. The device, which also known as a femtocell, connects to DSL or cable connections and extends cellular coverage to a [...]

Top 5 Home Security System Scams

When a home security salesman comes a-knockin’, beware, pay attention and know what you are getting into. He might not be who he says he is, or he might have tactics under his belt that will cost you big time. WZZM reports, “For a couple [...]

Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?

We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture of Kimye’s baby North (who I thought would be called Kadence, but I’m not in the know, which is why I’m on the search engines [...]

Identity Thieves Go After the Deceased

There are a reported 2.5 million cases of identity theft among the deceased every year. Theft of deceased people’s identity happens partly because of the availability of public records coupled with the time it takes for credit bureaus, [...]

4 Ways To Share Paid Hotspots

There are a number of scenarios you might be in where friends, family and colleagues need to jump on a (read: your) wireless connection, but they’d rather not pay a connection fee. So if you have the goods right in front of you and they can [...]

What’s The Point Of $1 Million In Insurance For Identity Theft?

Honesty is the best policy, right? I’ve spent my life being honest, and do you know what is the most important lesson I’ve learned is? The truth hurts. And when you (meaning me too) says it like it is, someone somewhere isn’t going to [...]

Danger: Wireless Toilets Next On Hackers’ List

Just about anything wireless is hackable today. Everything—from PCs to mobiles to tablets to home automation devices to pacemakers to insulin dispensers and even cars—are hackable. And now “smart” toilets. CNET reports, “[Smart] toilets [...]

Card Issuers Losing $562 In Costs To Grey Charges

Hey merchants, yes you, BillGuard released a report that examined the grey charge problem among US debit and credit cardholders and the service costs impacting card issuers and retailers. The report revealed 11 types of deceptive ‘grey charges’ [...]