mobile privacy: Keeping Your SMB Bring-Your-Own-Devices Secure - 09/10/21 09:26 AM
If you have a small or medium sized business, it is likely that you have staff who are bringing their tablets, phones, iPads, and laptops to work every day. However, all of this puts your business to risk as they can also bring malware into your network.
On top of this, any of these devices can be lost, misplaced, or stolen. Since its extremely likely that your staff are using these devices for their work, think about all of the information that could be on there about your company…and it happens because Joe in accounting left his cell phone on the counter … (8 comments)

mobile privacy: Make your Mobile a Tough Target: Strengthening Your Mobile Device - 07/24/21 12:14 AM
Do you pay attention to how secure your mobile phone is? Most of us do not do this, which makes it very easy for a hacker to get in and target us. Here are some tips that you can use to protect your phone from becoming a target:
Always Set a Passcode
One of the best things you can do to strengthen your mobile device’s security is to make sure you have a passcode on it. All mobile phones have a passcode option, and some phones, like the iPhone, even allows you to remotely lock it if you believe the phone has been … (5 comments)

mobile privacy: How to Kick Your Mobile Phone Addiction - 04/08/20 09:30 AM
Most of us know about the tricks that advertisers play when trying to get our attention. What you might not realize, however, is that our mobile phone and other digital objects are doing something similar, and you are probably falling for it every time.
One thing that designers do is use the color red for notifications. Why? Because red triggers a natural emotional response, and that makes us want to swipe or click. This also can easily make us feel “attached” to our phones, and addiction to phones and things like social media, are very real. Don’t get caught up in this; … (2 comments)

mobile privacy: How a Wi-Fi Hacker Snoops on Your Laptop and Mobile - 01/30/20 07:42 AM
You have likely heard of the dangers of using unsecure public Wi-Fi, so you know that hackers are out there snooping. It is pretty easy to hack into a laptop or mobile device that is on a public Wi-Fi connection with no protection. Hackers can read your emails, steal passwords, and even hijack your website log ins.
Let’s imagine that you are in a local coffee shop with your laptop. All someone has to do is download a wireless network analyzer, which usually has a free trial, and with the right hardware and additional software they can often see what everyone is … (36 comments)

mobile privacy: SIM Swapping: What You Need to Know - 12/18/19 08:54 AM
Have you heard of SIM swapping? It’s a new trick that hackers are using to get money and mess up your life.
What is SIM Swapping?
So, what is SIM swapping? It’s when a hacker tricks your cell phone company into thinking that you have activated your SIM card on another phone. In other words, the hackers are taking your phone number and then associating it with a different SIM card. If the switch is a success, your device will be deactivated, and all of your phones, texts, data, and more will come to the hacker. This means, of course, that the hacker … (0 comments)

mobile privacy: Make Your Mobile a Tough Target for Thieves - 02/19/19 06:25 AM
You should definitely pay attention to your mobile phone security. Most of us don’t, which makes it easy for hackers and ID thieves to target us. Here are some tips to protect yourself from becoming a target for thieves.
Use a Passcode
One of the easiest ways to ensure that you are not a target for thieves is to use a passcode. All mobile phones have a built-in passcode option, and if you have an iPhone you can even set a passcode if it has been stolen by using the Find My iPhone feature.
Use Face ID or Touch ID
To make your iPhone even … (4 comments)

mobile privacy: How to Monitor a Cell Phone - 02/15/19 07:32 AM
Do you fancy yourself a spy and wondering how you can monitor someone else’s cell phone? You won’t get that information here, but there is some good info on cell phone monitoring if you keep reading:
The Legalities of Tracking Cell Phones
Generally, it is not legal to monitor a cell phone that does not belong to you. However, generally speaking, and THIS IS NOT LEGAL ADVICE, if the account is under your name or if you have written permission from the person who owns the phone, you can track it.
Why Monitor a Cell Phone?
There are some situations where it is perfectly legal, … (15 comments)

mobile privacy: How to Block Spammy Scammy Telemarketing Calls - 01/24/19 06:17 AM
Are you getting a lot of scammy, spammy telemarketing calls? If you are, you know how annoying they can here. Fortunately, there are some apps out there that can help. Here are a few worth looking into:
CallApp
You can use CallApp to lookup numbers, and then decide if you want to answer it or not. It collects data from users, and then gives you this information when a call comes in. You can get CallApp Crawler for Android phones.
Call Control
This app offers reverse look up, call blocking, and it can even blacklist any unwanted texts, too. It is very easy to use, … (18 comments)

mobile privacy: Does Your Mobile Have Spyware on It? - 10/19/18 04:45 AM
You have a mobile phone, you might think it’s pretty safe, but what you might not realize is that these devices can have spyware on them. Keep in mind, many of the “signs” listed below are everyday normal phone behaviors. But combined, might mean spyware. Here are some of the signs:
Unusual Background Noise
While common, humming, static, or other weird noises could be a sign that someone is tapping your line. Though all phones might have strange noises from time to time, you should check if there are other signs if you notice them. This is especially the case if you hear … (18 comments)

mobile privacy: Protect Your Mobile from Hackers - 07/19/17 07:24 AM
If you are like most of us, you probably have a password, antivirus program, and a firewall for your home computer to protect it from hackers. Are you doing the same thing for your phone?
From 2015 to 2016 malware infections on smartphones swelled by 96%, and about 71% of the smartphones out there do not have any software at all to protect them. What does that mean for you? It means the odds are against you when it comes to getting your phone hacked. Luckily, there are some things you can do to protect your mobile phone from hackers:
Update Your … (15 comments)

mobile privacy: Mobile SIMs Hacks Cause Concern - 09/20/16 12:15 AM
A crook can steal your identity by taking control of your wireless phone account—by pretending to be you in person at the mobile store. The villain can then buy pricey mobiles and sell them—and guess who gets the bill but not the profit.
Symptoms of Hijacked Account
Suddenly losing service Your carrier says you went to a store, upgraded a few phones, then shut down your old device. Or, the rep will straight-out ask if the problem is with your new iPhone—even though you never purchased one. You were never at the store and never authorized any account changes. If this happens … (8 comments)

mobile privacy: Protect your Privacy on your iPhone - 08/15/16 01:08 AM
If you have an iOS device, you may be leaking personal information about yourself—without even knowing it—because you’re not familiar with the privacy settings.
Apps have “permissions,” meaning, they can access private information such as your social calendar stored on the phone, appointments, anything. Go to the privacy menu under “settings” to learn which apps can gain this access and deactivate it. And there’s so much more to know…
Ads
The Limited Ad Tracking option controls how targeted the ads are to your habits, not the amount of ads you see. This feature does not apply to ads across the Internet; only the … (2 comments)

mobile privacy: I want a Cell Phone Jammer - 04/13/16 11:58 PM
Well, we certainly can’t blame Dennis Nicholl for breaking the law. Frankly, had I been nearby him when he did it, I would have kept silent and let him continue breaking the law—unless, of course, I was engaged in some loud, planet-moving discussion with a world leader.
Nicholl, 63, was recently on a Chicago subway train. He brought with him a cell phone jammer. Unfortunately for Nicholl that day, Keegan Goudie was on the same train. Goudie is a blogger, noticed the infraction and began blogging about it. One thing led to another and Nicholl ended up being charged with the unlawful … (15 comments)

mobile privacy: Eight ways to secure your employees' mobile devices - 02/14/16 10:25 PM
Between half and three quarters of all employees have downloaded personal apps to company tablets and phones, according to surveys. At the same time, people are increasingly using use personal phones for work purposes like email, document-sharing and the list goes on.
What does it all mean? Companies must take extra precautions to ensure that sensitive data doesn’t get into the wrong hands.
Protecting your data
Fortunately, there are several steps that a business owner can take to protect the information on employees’ mobile devices. Here are some tips:
Make sure all devices are password protected. Require all employees to use an “erase data” function … (1 comments)

mobile privacy: How to shop securely with a Mobile Phone - 01/14/16 10:13 PM
“You can buy things with your phone!” No kidding! But imagine what the response would have been had you made this statement in 1984: “Off your meds, eh?”
Purchasing via the smartphone may very well eclipse the popularity of shopping via laptop. And cyber thieves know this. They’re counting on you to slip up.
Never click a link inside an e-mail, even if the subject line is a warning or alert to a fabulous sale. Cyber crooks know that the small screens on mobiles can easily hide tell-tale signs of scam e-mails, people are especially vulnerable to subject lines blaring great deals. If … (3 comments)

mobile privacy: Want Mobile Privacy? Read - 08/26/15 11:59 PM
If you don’t want your smartphone to know more about you than you do, here are top choices, as detailed on gizmodo.com:
BlackPhone 2
The Blackphone 2 will black out the federal government from spying on you. Has a five inch handset with full HD screen (with Gorilla Glass 3 that prevents shoulder surfing). 3 GB or RAM Its Silent Circle’s PrivateOS 1.1 provides a “Spaces” UI: Data will be encrypted and compartmentalized. The “Spaces” allow you to set up distinct spaces for different types of data, including a Silent Space that’s akin to Chrome’s incognito mode. The Silent Suite allows you … (3 comments)

 
Robert Siciliano, Realty Security and Identity Theft Expert Speaker (IDTheftSecurity.com Inc)

Robert Siciliano

Realty Security and Identity Theft Expert Speaker

Boston, MA

More about me…

IDTheftSecurity.com Inc

Address: PO Box 15145, Boston, MA, 02215

Office: (617) 329-1182



Listings

Links

Archives

RSS 2.0 Feed for this blog