Security Tips and Advice

How Can You Delete Yourself from the Internet

How Can You Delete Yourself from the Internet

1) Delete your online accounts: If you really want to terminate your Internet presence, you’ll want to eliminate these accounts, especially the ones you don’t use anymore. The easiest method is Account Killer, a website that provides direct links to your most popular accounts and instructions how to wipe the slate clean; 2) Remove yourself from data broker sites: Primary data brokers like...

How Hackers Utilize Fear and Urgency to Get Your Information

How Hackers Utilize Fear and Urgency to Get Your Information

Hackers once used to trick people with funny emails or lotto wins before unleashing their attacks. Lately, they have adopted smarter tactics based on human emotion to infiltrate devices. It is important for people to understand the distinct characteristics of the emotions that social engineers commonly manipulate. 1) Fear: Fear is one of the strongest human emotion. Social engineers do a great...

Dubai Police Warn about Saving Credit Card Details on Phone

Dubai Police Warn about Saving Credit Card Details on Phone

Mounting cases of hacked debit and credit cards and cash losses by unsuspecting victims is leading Dubai Police to warn the public. With more aggressive phishing and online theft becoming the norm globally, unwitting smartphone users who are not more discrete when surfing online are opening themselves up to potential electronic identity theft. And naive phone owners who store their card passwords...

Don’t Allow Cybercrime Creeps Ruin Your Wedding

Don’t Allow Cybercrime Creeps Ruin Your Wedding

Cybercrime is probably the last thing on your mind, with all of the to-do lists, emotions, and drama that can surround a wedding. But did you know that engaged couples are often targeted by online criminals? Think about it: You’re spending large sums of money, punching your credit-card information into unfamiliar websites, and documenting it all in real time on social media. Sorry, brides, but...

Seven Suggestions to Keep Your Mother Safe Online

Seven Suggestions to Keep Your Mother Safe Online

Here are seven tips that can help your mothers stay safe online on Mother’s Day and every day thereafter. 1) Get Some Basic Protection: These fundamental safeguards include implementing software updates as soon as they become available and not using Bluetooth unless it’s necessary. We should also teach mothers about encrypting sensitive data, regularly creating backups of photos and important...

FTC Initiates Cybersecurity Resource Website for SMBs

FTC Initiates Cybersecurity Resource Website for SMBs

Federal Trade Commission website offers free tips and information for small businesses. The Federal Trade Commission rolled out a website recently for small businesses that provides tips and resources on cybersecurity. The new ftc.gov/SmallBusiness website aims to help small businesses protect their networks and systems from cyberattacks, as well as protect customer and employee data. Access to...

Researchers Launch New Password Meter that Will Change How Users Make Passwords

Researchers Launch New Password Meter that Will Change How Users Make Passwords

Researchers from Carnegie Mellon University and the University of Chicago have just unveiled a new, state-of-the-art password meter that offers real-time feedback and advice to help people create better passwords. To evaluate its performance, the team conducted an online study in which they asked 4,509 people to use it to create a password. "Instead of just having a meter say, 'Your password is...

  • More at Phys
  • |
  • |
World Password Day: How to Make “Strong” Passwords Even Stronger

World Password Day: How to Make “Strong” Passwords Even Stronger

Happy World Password Day! Here are five tips on how to create a stronger password right now: 1) Try to make your passwords 12 – 15 characters long; 2) Avoid using dictionary words, slang, curse words, email addresses, names, places, etc. Instead, use password mnemonics to create a complex, but memorable password. E.g. “I love watermelon because it just turns to water in your belly!” =...

On World Password Day, Here are Four Steps to a Secure Online Account

On World Password Day, Here are Four Steps to a Secure Online Account

The first Thursday in May of each year has been officially declared World Password Day—a day to promote good security hygiene and password habits. In 2017, that day has fallen on May 4. Companies like Dell, Microsoft Azure, Intel Security, and more are championing the effort, which offers a simple four-step approach to better passwords: 1) Create Strong Passwords: Strong passwords, according to...

Five Measures to Protect Your Child’s Data on the Internet

Five Measures to Protect Your Child’s Data on the Internet

To better understand the ways in which young people learn today, and will learn in the future, the Aspen Institute created the Task Force on Learning and the Internet. This group of experts created a guide to serve as a framework for dialogue and action among the learning community’s many stakeholders. The guide addresses how to balance the need for student’s privacy and security, while at...

Tips to Successful 'Digital Spring Cleaning': National Cyber Security Alliance

Tips to Successful 'Digital Spring Cleaning': National Cyber Security Alliance

The Better Business Bureau and the National Cyber Security Alliance are calling on consumers to take their annual spring-cleaning ritual into the digital age by offering a checklist of helpful tips and a chance to shred sensitive documents: 1) Keep a Clean Machine: Ensure all software on internet-connected devices — including PCs, smartphones and tablets — is up-to-date to reduce risk of...

Keep Your Home Safe from Bad Actors, Thanks to New Security Measures from Airbnb

Keep Your Home Safe from Bad Actors, Thanks to New Security Measures from Airbnb

You’re sharing your home with strangers by way of Airbnb, so naturally, you want to feel secure. And as cyberattacks and hacks become ever more common, the short-term rental platform is stepping up its game to ensure that your home is protected — at least from a digital perspective. As such, Airbnb has introduced “new defenses to further prevent bad actors from taking over an Airbnb...

Five Steps to Protect Critical Data from Insider Threats

Five Steps to Protect Critical Data from Insider Threats

The risk of insider attacks is natural for any business, but it is important to take essential measures to mitigate such attacks. However, to build a robust security system, organizations must understand the nature of insider attacks. The five-step approach, i.e. define, discover, baseline, secure and monitor helps companies to understand the nature of data flow within an organization, identify...

US-CERT: Easter Holiday Phishing Scams and Malware Campaigns

US-CERT: Easter Holiday Phishing Scams and Malware Campaigns

As the Easter holiday approaches, US-CERT reminds users to stay aware of holiday scams and cyber campaigns, which may include: unsolicited shipping notifications that may actually be scams by attackers to solicit personal information (phishing scams); electronic greeting cards that may contain malicious software (malware); requests for charitable contributions that may be phishing scams or...

8 Things You Should Do to Practice a Good Cyber Hygiene

8 Things You Should Do to Practice a Good Cyber Hygiene

In this digital age, we completely depend on various gadgets for so many aspects of our lives resulting in a need to stay vigilant to protect ourselves against cyber threats. However, in order to be as secure as possible, it is essential to follow a good cyber hygiene i.e. making sure we are guarding and maintaining our systems and devices aptly and using best cyber security practices. Following...

Things You Need To Know About Flying With a Laptop

Things You Need To Know About Flying With a Laptop

This may sound like a nightmare or a Black Mirror episode about a dystopic future, but you now have to check your laptop if you’re flying to the United States or United Kingdom from 10 airports in 8 North African and Middle Eastern countries. Citing possible security risks — involving bombs, not computer viruses — U.S. and U.K officials are restricting electronic devices larger than a...

Security Tips and Advice

This category provides expertly curated cyber security news on the cyber security tips, cyber bullying safety tips, cyber safety tips for kids among others that are important for every individual to follow for maintaining an optimum cyber hygiene. It is now widely recognized that a small mistake can jeopardize not only individual security but organizational security and in some cases, national security as well. An optimum cyber hygiene is considered as the best line of defense against such threats. If an individual is aware and follows the safety tips, he/she can make a tremendous contribution towards his/her personal, organizational and national security.