How old is old enough for a kid to have a smartphone?
Right out of the gate, I’m saying 16, and I know there’ll be some backlash from that. Some will say it all depends on the kid; others will argue there’s no right answer. Here’s why [...]
Mallory Whitfield is a Content Analyst at FSC Interactive. Mallory discusses the ever changing world of online marketing and search engine optimization and how businesses can keep up with the dramatic changes in SEO.
Avoid These [...]
When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves.
One of these tricks is to scare us into thinking that our computers or smartphones have become infected with malware to get us to purchase [...]
Digital device theft is a big problem.
I’ve seen numerous stories about iPhones being stolen right from a person’s hand while the user was talking on it. Others have reported sitting in a coffee shop while having a conversation and having [...]
Baby monitors have evolved from simple one-way radio communications based on older radio waves to highly evolved IP based, internet-connected cameras that can be viewed on a smartphone or tablet.
Back in the day, when cordless phones were 900 [...]
There is no such thing as a truly secure password; there are only more secure or less secure passwords.
Passwords are currently the most convenient and effective way to control access to your accounts. But passwords are a mess. We have too many; [...]
Seriously. Mine hurts my butt when I sit down. I have to remember to take it with me, and then I’m always afraid of losing it. There’s nothing fun about it. And…well…it’s dirty. It really is—money is dirty, and the [...]
Near field communications (NFC) is the exchange of information between two devices via wireless signal.
For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. In the case of a mobile wallet [...]
The uber rich have many reasons to invest in uber security.
I met a woman who won a $300 million lottery, and she had some unfortunate stories about how low people go to get at and to moneyed individuals. So to protect life and limb, the uber [...]
Ever lock yourself out of your car or home? I’ve done each at least once this year; that’s about my average.
After the last time I got stuck on the cold side of my front door, I decided to go with keyless locks for my home, specifically [...]
We are all too aware of the National Security Agency breaking encryption.
The NSA has frequently been known to be implanting back doors on various servers, networks and within numerous social sites, email providers, mobile networks, mobile [...]
With over one billion people connected to Facebook, we have to assume that many of them are criminals. (Criminals are people with friends too!)
But the criminals we need to be concerned about are the ones who create all kinds of scams designed [...]
Smartphone use continues to increase.
More than one third of Americans have dropped landlines and only use mobiles. It is very possible that within the next 10 years, the landline will be obsolete and we will all be wireless.
And when there’s [...]
You’ve been here before: You’re at work, you get a notification via a popup, then an email, then a text reminding you of an appointment on your calendar.
For most busy professionals, this is pretty normal because you know you need multiple [...]
People talk—A LOT. They can’t stop talking. Talking, getting something off your mind and out there feels good.
Talking takes the pressure off one’s mind; our mouths are like relief valves for our heads. The problem has always been that [...]
Ever lose a mobile device? Have one stolen?
Know someone who has? Device loss and theft is a common issue when it comes to identity theft and results in data breaches. Some studies have shown as many as 2.5 million laptops are stolen annually, [...]
It began with the laptop.
The laptop was the first portable internet-connected device that freed up millions to create a mobile workforce. Next was the smartphone, which didn’t really take off until Apple opened it up to developers and allowed [...]
Low-powered cellular base stations are often found in residential homes and small businesses where mobile coverage is scant.
The device, which also known as a femtocell, connects to DSL or cable connections and extends cellular coverage to a [...]
We all do it. We probably all just don’t admit it.
Well I admit it—I’ve searched for that elusive picture of Kimye’s baby North (who I thought would be called Kadence, but I’m not in the know, which is why I’m on the search engines [...]
Just about anything wireless is hackable today.
Everything—from PCs to mobiles to tablets to home automation devices to pacemakers to insulin dispensers and even cars—are hackable.
And now “smart” toilets.
CNET reports, “[Smart] toilets [...]
This year, 17 such victims have reported a dating scam that has cost them a combined $700,000, says the North Carolina Attorney General’s office.
The typical victim is a woman in her early 60s. One victim sent her online Casanova nearly $1.3 [...]
Christmas trees, mistletoe, candy canes, turkey and stuffing bring out scammers, phishers, burglars and identity thieves.
I’m not purposefully trying to be a Grinch here, but I’m just reminding you that good times, unfortunately, bring out [...]
It’s pretty simple.
Your mobile’s global positioning system (GPS) functionality allows location-based services to locate and publish information about your whereabouts on various applications and within the code of photos posted online.
If you understand what mobile criminals are trying to do, you can fight back.
The primary risks you should worry about are:
Financial fraud: Someone takes over your bank account, extracts money, or sets up a premium SMS scam where you pay for [...]
There are many different kinds of hackers; not all are bad.
For example, so-called white hat hackers are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information [...]
The number of households in the United States that rely solely on mobile phones continues to increase.
As of July 2011, 31 percent of households had mobile phones and no landlines. Additionally, almost one in six households used mobile phones [...]
The internet has dissolved the geographical boundaries and technological limitations that have constrained organized crime in the past.
We now live with crime syndicates based in Russia, espionage sponsored by Asian nation-states, and botnets [...]
Categorized as viruses, they are generally developed by criminals with the intention of gathering personal information to commit some form of identity theft.
Currently, there are upwards of approximately 40,000 malicious [...]