REGISTER

email 14 48

Upgrading your mobile device? It has become standard practice to upgrade to a newer device every one to three years. And when doing so, people often sell, donate or discard the old one. The goal is often to sell the old one to make up the difference in cost for the new one.

 

However, I conducted a test in which I purchased a bunch of used devices off of Craigslist and eBay to see if I could still find personal data on them. I found a startling amount of personal data, including photos, phone numbers, addresses, emails, text messages and even passwords.

While most of us would think we are safe if we do a factory reset on our mobile device, this is not always the case. On some Android phones, even though some of the phones’ owners had done a factory reset, I was still able to find data on them. Here’s how to get your devices squeaky clean:

  • Wipe your phone: For mobile phones, you want to do a factory reset. The software to do this is built into the phone.
    • Android factory reset: Menu > Settings > Privacy > Factory Data Reset.
    • iPhone factory reset: Settings > General > Reset > Reset All Settings.
    • Blackberry factory reset: Options > Security Options > General Settings > Menu > Wipe Handheld.
    • Windows 7 phone factory reset: Settings > About > Reset Phone.
    • On any other operating systems or Symbian-based phones, you will need to do a search on your phone online, such as, “Phone Name, Model Number, Carrier, Factory Reset.”
    • Remember to remove or wipe any media, like SD cards or SIM cards. These are so cheap, it’s better to cut them in half with a scissors or reuse them.
    • Still unsure if you’ve gotten all your data off? Get a drill and poke lots of holes in the device and its hard drive, or hit it with a sledgehammer. This may be lots of fun, but it also may make it less saleable. 

Every week I receive emails from people asking how they can protect their privacy online. It seems like there have been more and more data security breaches, and therefore awareness about the potential to have our information exposed is growing. In fact half of us worry about the amount of personal information about us that is available online compared to only 33% who were concerned about this in 2009.

A recent Pew survey found that 86% of Internet users have taken steps online to remove or mask their digital footprints—ranging from clearing cookies to encrypting their email. And while most of us would like to be anonymous online, most of know that this is not always possible. Some other startling facts from the study:

21% of Internet users have had an email or social networking account hijacked, and 11% have had vital information like their Social Security number, bank account data or credit cards stolen

13% of Internet users have experienced trouble in a relationship between them and a family member or friend because of something the user posted online

6% have had their reputation damaged because of something that happened online and 4% have been led into physical danger because of something that happened online

Yet even though we want to keep our information private, most of us still knowingly post information online. The study found that half of us knew that our birth date was available online, and a whopping 30% knew that their home address was available online. And what else was revealing was that 26% of us didn’t’ feel that it was that important if people knew our location when we were online.

So while we may be concerned with privacy, there’s also a discrepancy in terms of what we have posted online or what we consider private or personal. Of course, this is a personal choice, but we should all be aware of things we can do to protect our information online, especially since it is not always in our control.

Be careful what you share online: Do what you can to control what information you reveal about yourself online. You should think about the Internet as akin to writing in permanent pen…once it’s there, it’s there forever.

Be cautious about where you give your information to: In today’s world a lot of information about us that is available online is not something that we posted ourselves. So think twice when giving your information, even if that’s in paper form since most employers, medical offices, etc, keep your information in electronic format and also what information you actually give out.

Lock down your privacy settings: Make sure you know how to use the privacy settings on social media sites, email, and other online applications and don’t connect with anyone you don’t know in the offline world.

Be careful what you download: Know what you are downloading, whether that be a photo from a friend or that fun new app for your smartphone. Many apps access information on your mobile device that you may not know about so make sure you check the permission it is accessing.

Keep your devices clean: Use comprehensive security on all your devices (not just your PCs) like McAfee LiveSafe™ service and keep your devices’ operating systems and browsers up-to-date to protect your information online.

Use tools to help keep protect your privacy: You can use things like browsing in “incognito” mode or clearing your cookies. You should also make sure that you don’t have your browser set to “remember me” or your apps set to automatically log you in. That way if anyone else uses your computer or gets a hold of your mobile device, they can’t access that information.

While we can’t control everything about us that is online, we can be proactive about what information we post online about ourselves and what information we give out.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! Disclosures.

There is no such thing as a truly secure password; there are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your accounts. But passwords are a mess. We have too many; sometimes they are all the same, which makes it easier for a hacker; many passwords are “123456” and easy to crack; and there are numerous ways that a criminal can spy on us to log our keystrokes.

The internet’s weak link is the difficulty in reliably identifying individuals. When online, our identities are determined by IP addresses, cookies, and various “keys” and passwords, most of which are susceptible to tampering and fraud. We need a better strategy.

Currently, positive ID (or “authentication”) is only possible by using a biometric. A biometric can be either static (anatomical, physiological) or dynamic (behavioral). Examples of static biometrics include your iris, fingerprint, face and DNA. Dynamic biometrics include your signature gesture, voice, keyboard and perhaps gait—also referred to as something you are.

Verification, on the other hand, is used when the identity of a person cannot be definitely established. Various technologies are used provide real-time assessment of the validity of an asserted identity. We don’t know who the individual is, but we try to get as close as we can to verify his or her asserted identity. Included in this class are out-of-wallet questions, PINs, passwords, tokens, cards, IP addresses, behavior-based trend data, credit cards, etc. These usually fall into the realm of something you have or something you know.

Biometrics, it seems, is taking on a whole new meaning.

Mashable reports, “A wristband dubbed Nymi confirms a user’s identity via electrocardiogram (ECG) sensors that monitor the heartbeat and can authenticate a range of devices, from iPads to cars. Developers at Bionym, the Toronto-based company that makes the device, say the peaks and valleys of an individual’s heartbeat are harder to imitate than the external features of biometric systems, like fingerprints or facial recognition.”

And then there are “cognitive biometrics”—yes, brainwaves. For example, when signing up for an account, people are provided pictures to look at, then choose one that would allow them access to their account. When they were to log in, they’d be presented with numerous pictures and when the one they chose showed up, their brain would light up a bit, telling the website to allow access. But while the process has been proven to work, people need to wear a helmet that attaches to their scalp to pick up their brainwaves. So it’s not exactly ready for prime time.

What do you think? Would you wear a bracelet that identifies you? Or a tinfoil hat!?

Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Wallets suck. Seriously. Mine hurts my butt when I sit down. I have to remember to take it with me, and then I’m always afraid of losing it. There’s nothing fun about it. And…well…it’s dirty. It really is—money is dirty, and the cards you hand to people with dirty hands that handle dirty cards all day are dirty. Can we please just use our mobiles as wallets?

There are a few technologies that are supposed to eliminate the wallet, but no matter how hard I try, I still need to carry one. More on that in a bit.

What’s in the works:

  • Isis is a mobile payment network comprised of the major mobile networks. It’s supposed to launch nationwide and there have been a bunch of pilot tests, but no official launch just yet.
  • Square is an app that accepts credit cards and allows you to pay with them in stores that accept Square-facilitated transactions.
  • Apple has the Passbook app, which stores your cards and works with an iPhone. It should have taken off, but it does squat.
  • Google Wallet is an app that has relationships with credit card companies and banks and uses near-field communications. It allows you to make payments, but only if you have an NFC-enabled phone—which is usually an Android—and the point of sale needs to be able to read it.
  • Starbucks is really the only company that has used its mobile app to accept payments, and it’s wildly successful. There’s no reason to even walk into a Starbucks with a wallet again.

So other than moving into Starbucks, I’ve found a temporary compromise.

  • Thinned out my wallet: This means I got a thinner wallet, too. I picked up a three-buck one from one of those sidewalk tables in New York City. For the rest of the world, you can find them all over eBay.
  • Keyring: This is an app available for iPhones and Androids that allows me to easily snap a photo of the front and back of my 50+ loyalty cards and use most of them at a retail counter. (Except Costco, which is stupid. Do you hear me, Costco?)
  • Hotspot Shield VPN: This is a virtual private network application installed on my mobile to protect my wireless traffic. So instead of having to remember my wallet and then putting my wallet into my pocket—which hurts—and worrying about losing it, I just use my mobile to make purchases online and have most everything shipped. Except, of course, at Costco.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

We are all too aware of the National Security Agency breaking encryption and implanting back doors on various servers, networks and within numerous social sites, email providers, mobile networks, mobile phones and other platforms to gather intelligence in the name of safety and security for the American people and other friendly nations across the globe.

Whether you agree or not with these policies, there are numerous disadvantages to this level of spying. At this moment, we as a culture are going though a shift where we are getting accustomed to these “invasions” instead of putting our collective feet down and saying NO.

  1. Facebook: Like it or not, there have been some recent changes in the social network’s privacy policy in that its settings no longer (meaning by default) allow users to exclude their Facebook profile from a public search.
  2. Google: Google updated its terms of service so it 11can use your Google+ name, face, web reviews and social media activities in online ads to anyone for any reason, as long as Google thinks it would help sell whatever the ad is offering.
  3. Apple: Researchers determined Apple’s iMessages may be being read, or at least have the ability to be read, by Apple employees. This news shouldn’t surprise people too much because we’ve known for quite some time that emails can be read by employees at various email providers.
  4. LinkedIn Intro: This is a new service that connects your Apple iOS email to LinkedIn’s servers, which essentially routes your emails in a man-in-the-middle-type situation. While the company says it won’t access your emails, some say it can—which, really, isn’t good.
  5. Drones: Yes, drones—everything from small, mosquito-sized aircraft to remote-controlled airplanes—are beginning to populate the skies specifically to gather intelligence on everyone who may be up to no good or who is in the wrong place at the wrong time.
  6. Webcam spying: A rent-to-own company was recently fined a substantial amount of money by the FTC because it installed software on its laptops to spy on users’ behavior. The point of the software was really to locate the devices if they were lost or stolen, but apparently someone internally couldn’t help himself.
  7. Free WiFi: Right now, dozens of municipalities are investing in a free WiFi they call “muniWiFi,” which stands for Municipal Wireless Network and is designed to blanket the cities and provide free wireless to anyone who wants it. But just because it’s free doesn’t mean it’s safe; without a doubt, criminals will have a field day with free public WiFi like this, so you need to get a leg up on the bad guys. Use a VPN such as Hotspot Shield VPN to protect your data. Hotspot Shield will also protect your IP address shielding you from prying eyes.

Telling you to not worry about any of this would seem like a pretty lame way to conclude a regurgitation of just how much privacy has been lost and how companies and our government are seizing an opportunity. But frankly, as long as you consciously participate (or not participate) in a way that precludes you or your data from being unwittingly exposed, then don’t worry about it. But at least DO something about it.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Smartphone use continues to increase. More than one third of Americans have dropped landlines and only use mobiles. It is very possible that within the next 10 years, the landline will be obsolete and we will all be wireless.

And when there’s a major transition in technology, the newness of it all creates a perfect storm for scammers to attack the new systems. Hackers are creating scams and viruses that are designed to spy on and collect our data the same way it’s done on a PC. (Keep in mind that what makes smartphones smart is the fact they are nothing less than small computers with the same power and reach as desktops or laptops. The only difference is they fit in your pocket.)

It is as essential to protect your mobile as it is to protect your PC. You need to make sure you protect yourself, as our mobile devices are our most personal of personal computers. Here are some things you should do to protect yourself:

  • Use a PIN code and set it to lock your device after one minute.
  • Download apps only from reputable app stores, and review the app permissions to make sure the app isn’t sharing more information than you’d prefer.
  • Don’t store sensitive information on your phone, like user names and passwords, and log out of apps that provide access to personal information.
  • If you use online banking and shopping sites, always log out and de-select any options to keep you logged in or your password saved.
  • Don’t access critical websites sites when using free WiFi connections unless you are using a virtual private network (VPN) application.
  • Review your mobile carrier accounts and app store accounts to check for any suspicious charges. If you do see charges you have not made, contact your service provider and credit card provider immediately.
  • Never respond to text, email or voicemail messages with personal information like credit card numbers or passwords.
  • Never click on a link in an email, text, social networking site or message from someone you do not know (or, in some cases, someone who poses as someone you know).

Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247

You probably know that iPhones are high on the wish list of thieves all over the country—so much so that data from the New York City Police Department reveals that iPhone and iPad thefts have soared 40 percent compared with the same period last year, according to CNET. A total of 11,447 cases of stolen Apple devices were reported to the city’s police, an increase of 3,280 over the last year.

Apple has been paying attention, and the new iOS7 has made it difficult for a thief to sell or reuse that stolen phone. This is because of a feature that prevents a wiping/resetting of the phone without the user’s Apple ID.

Here’s how: iPhone users who upgrade receive an email explaining how the new theft deterrent works, along with information on what to do in the event someone sells or transfers an iPhone to another party. It looks like this:

Dear Apple iPhone Customer:

Congratulations on your update to iOS 7. As an iCloud user, part of your upgrade includes new features built into Find My iPhone that make it harder for anyone else to use or sell your device if it is ever lost or stolen.

With Find My iPhone turned on in iOS 7, your Apple ID (This email address is being protected from spambots. You need JavaScript enabled to view it.) and password will always be required before anyone can:

  • Turn off Find My iPhone on your device.
  • Erase your device.
  • Reactivate and use your device.

There is nothing you need to do except to keep Find My iPhone turned on and remember your Apple ID and password. For more information, read the FAQ.

Note: As always, if you plan to give your device to someone else, make sure to erase all content and settings before transferring it to the new owner. This will remove the device from your account and allow the new owner to activate it. For more information, read What to do before transferring ownership of your iPhone, iPad or iPod Touch.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

People talk—A LOT. They can’t stop talking. Talking, getting something off your mind and out there feels good. Talking takes the pressure off one’s mind; our mouths are like relief valves for our heads. The problem has always been that people blurt out whatever is on their mind and say things that often get them in trouble. And yes, I’ve done it too.

But now people now post their thoughts online, which in many cases is even worse because it’s not one on one; it’s to the world. We’ve seen numerous kids, teachers, employees, officials, politicians, celebrities, and folks from just about every walk of life say or post something that has resulted in backlash and sometimes arrest.

The arrest part is very interesting. Law enforcement and government are paying close attention to social media and what is being said. A man in Toronto posts on Twitter he’s looking for a drug dealer, provides a location for where he is, and says, “I need a spliff”—slang for marijuana—and the Toronto police respond, “Awesome, can we come too?”

But it goes much deeper than that. NextGov.com reports, “Criminals, organized crime syndicates, gangs and terrorists also use social media. They post information and share photos and videos, and terrorist groups use the tools to recruit new members, disseminate propaganda and solicit funds.”

It seems the next stage to investigate and prevent crime is through social intelligence combined with social analytics, hence “Socint”. Continues NextGov.com: “Officials can use this type of social media-driven intelligence to gain insight, investigate, construct countermeasures and refocus resources.”

So what do YOU do? If you are doing anything illegal, stop…or just keep doing what you are doing and let’s just hope you get caught. For the rest of us who want a little more privacy or don’t want to get in trouble because we say stupid stuff, pay attention:

  • Know that everyone’s watching: What you say or post lasts forever, and it can and will bite you.
  • Lock down privacy settings: Each social site has its own privacy settings. They change often and they require your attention at least semiannually.
  • Update security settings: Criminals are creating viruses in record numbers for computers, mobiles and tablets. It is essential to updates your operating system’s critical security patches and antivirus, antispyware and antiphishing.

Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures For Roberts FREE ebook text- SECURE Your@emailaddress.

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Banner

CyberBanner

CyberBanner

Go to top