Created By Annie Jennings PR, National Publicist  

Should You Post Pictures Of Children Online?

Most people give no thought whatsoever to posting pictures of their children online. They are proud of their kids, they love them…so why not show the world how wonderful they are so others can enjoy each milestone too? Plus, Grandma and Auntie [...]

Podcast: Avoid These SEO Mistakes in 2016

Listen Here: Mallory Whitfield is a Content Analyst at FSC Interactive. Mallory discusses the ever changing world of online marketing and search engine optimization and how businesses can  keep up with the dramatic changes in SEO. Avoid These [...]

What Is Scareware?

When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One of these tricks is to scare us into thinking that our computers or smartphones have become infected with malware to get us to purchase [...]

Prepare Now For Device And Data Theft

Digital device theft is a big problem. I’ve seen numerous stories about iPhones being stolen right from a person’s hand while the user was talking on it. Others have reported sitting in a coffee shop while having a conversation and having [...]

Kids And Smartphones: How Old?

How old is old enough for a kid to have a smartphone? Right out of the gate, I’m saying 16, and I know there’ll be some backlash from that. Some will say it all depends on the kid; others will argue there’s no right answer. Here’s why [...]

Unsecured Wireless Video Baby Monitors Hackable

Baby monitors have evolved from simple one-way radio communications based on older radio waves to highly evolved IP based, internet-connected cameras that can be viewed on a smartphone or tablet. Back in the day, when cordless phones were 900 [...]

Passwords: Fingerprint, Heartbeat Or Brainwaves?

There is no such thing as a truly secure password; there are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your accounts. But passwords are a mess. We have too many; [...]

I Really Want My Phone to Be My Wallet. Don’t You?

Wallets suck. Seriously. Mine hurts my butt when I sit down. I have to remember to take it with me, and then I’m always afraid of losing it. There’s nothing fun about it. And…well…it’s dirty. It really is—money is dirty, and the [...]

NFC App On Androids Facilitates Automation

Near field communications (NFC) is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. In the case of a mobile wallet [...]

5 Home Security Tactics Of The Uber Rich

The uber rich have many reasons to invest in uber security. I met a woman who won a $300 million lottery, and she had some unfortunate stories about how low people go to get at and to moneyed individuals. So to protect life and limb, the uber [...]

New App Stores House Or Car Keys Online. Is It Safe?

Ever lock yourself out of your car or home? I’ve done each at least once this year; that’s about my average. After the last time I got stuck on the cold side of my front door, I decided to go with keyless locks for my home, specifically [...]

7 Scary Privacy Issues To Be Aware Of

We are all too aware of the National Security Agency breaking encryption. The NSA has frequently been known to be implanting back doors on various servers, networks and within numerous social sites, email providers, mobile networks, mobile [...]

Hackproof Your Facebook Account

With over one billion people connected to Facebook, we have to assume that many of them are criminals. (Criminals are people with friends too!) But the criminals we need to be concerned about are the ones who create all kinds of scams designed [...]

Why Mobile Security is a Must

Smartphone use continues to increase. More than one third of Americans have dropped landlines and only use mobiles. It is very possible that within the next 10 years, the landline will be obsolete and we will all be wireless. And when there’s [...]

Scammers Use Online Calendars To Phish Victims

You’ve been here before: You’re at work, you get a notification via a popup, then an email, then a text reminding you of an appointment on your calendar. For most busy professionals, this is pretty normal because you know you need multiple [...]

Socint: Disseminating Cybercrime Through Social Intelligence

People talk—A LOT. They can’t stop talking. Talking, getting something off your mind and out there feels good. Talking takes the pressure off one’s mind; our mouths are like relief valves for our heads. The problem has always been that [...]

Laptop Theft Leads to Identity Theft

Ever lose a mobile device? Have one stolen? Know someone who has? Device loss and theft is a common issue when it comes to identity theft and results in data breaches. Some studies have shown as many as 2.5 million laptops are stolen annually, [...]

Mobile, Wearable And Now…Implantable Technology?

It began with the laptop. The laptop was the first portable internet-connected device that freed up millions to create a mobile workforce. Next was the smartphone, which didn’t really take off until Apple opened it up to developers and allowed [...]

Cellular Base Station Range Extenders Vulnerable to Attack

Low-powered cellular base stations are often found in residential homes and small businesses where mobile coverage is scant. The device, which also known as a femtocell, connects to DSL or cable connections and extends cellular coverage to a [...]

Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?

We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture of Kimye’s baby North (who I thought would be called Kadence, but I’m not in the know, which is why I’m on the search engines [...]

Danger: Wireless Toilets Next On Hackers’ List

Just about anything wireless is hackable today. Everything—from PCs to mobiles to tablets to home automation devices to pacemakers to insulin dispensers and even cars—are hackable. And now “smart” toilets. CNET reports, “[Smart] toilets [...]

North Carolinians Scammed For Millions Dating Online

This year, 17 such victims have reported a dating scam that has cost them a combined $700,000, says the North Carolina Attorney General’s office. The typical victim is a woman in her early 60s. One victim sent her online Casanova nearly $1.3 [...]

10 Holiday Security Tips

Christmas trees, mistletoe, candy canes, turkey and stuffing bring out scammers, phishers, burglars and identity thieves. I’m not purposefully trying to be a Grinch here, but I’m just reminding you that good times, unfortunately, bring out [...]

5 Ways Your Identity is Stolen

Chances are good that in the coming year, you will be asked to provide your or a family member’s Social Security number (SSN) at least a few times. And because of all you’ve heard about identity theft and all the advice like “never give [...]

Location-Based GPS Services Are Risky

It’s pretty simple. Your mobile’s global positioning system (GPS) functionality allows location-based services to locate and publish information about your whereabouts on various applications and within the code of photos posted online. Various [...]

How The Government (And Bad Guys) Intercept Electronic Data

The news of the NSA spying using PRISM should not come as a surprise to anyone in the intelligence community. Electronic spying is as normal as breathing. And when a 27-year-old American traitor with little life experience (he was 15 when 9/11 [...]

What Are My Risks With My Mobile Device?

If you understand what mobile criminals are trying to do, you can fight back. The primary risks you should worry about are: Financial fraud: Someone takes over your bank account, extracts money, or sets up a premium SMS scam where you pay for [...]

Wanna Be A Hacker? Uncle Sam Wants You!

There are many different kinds of hackers; not all are bad. For example, so-called white hat hackers are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information [...]

Why Are Criminals Moving From PCs To Mobile Devices?

The number of households in the United States that rely solely on mobile phones continues to increase. As of July 2011, 31 percent of households had mobile phones and no landlines. Additionally, almost one in six households used mobile phones [...]

What Should I Know About Mobile Cybercrime?

The internet has dissolved the geographical boundaries and technological limitations that have constrained organized crime in the past. We now live with crime syndicates based in Russia, espionage sponsored by Asian nation-states, and botnets [...]

Buyer Beware: Is It A Distrustful Or Distasteful App?

Malicious applications. Categorized as viruses, they are generally developed by criminals with the intention of gathering personal information to commit some form of identity theft. Currently, there are upwards of approximately 40,000 malicious [...]