Archive for the 'Online Security' Category

How To Protect Yourself Against Hacking

This article is a great starting point to protecting yourself from the Privacy Pirates

Some articles are just so good, you’re better off going straight to the source, this is one of them!

The Visual Power Of Big Data

I have blogged about the Privacy Pirates and the massive invasion of digital privacy issues that abound… And I’m not even a conspiracy theorist!

That being said, this TED Talk shows the incredible power and majesty of what big data can reveal. I can only imagine what oppressive regimes do behind-the-scenes that we never get to see, but then again, I am NOT a conspiracy theorist.

The video below is magnificent, it shows beautiful, colourful renditions and extrapolations of data like I’ve never seen before. Gone are the days of endless, broing numerical printouts and tables. If only we had had visual tools like this when I studied cluster analysis in my doctoral multivariate statistical analysis course. I probably would have understood and retained a lot more…!

7 Signs That You Are Going To Be The Next Cyber Victim

Have a quick look at this interesting perspective on the state of cyber crime.

Boaz Fischer is a graduate of our Platinum Program.

They Know

I have talked about Privacy Pirates before…

This video is worth the 3 minutes – but I have to warn you, it’s more than a little upsetting what THEY KNOW…

Net Neutrality Vote

The Internet’s neutrality will be voted on soon… If you want to protect the Internet’ “integrity”, click on the image below or on the hyperlink to cast your vote to keep EVERYONE’S ACCESS EQUAL.

 Internet Neutrality

Linked In And The Law

Porter Press -1 Porter Press -2 Porter Press -3

 

Thank you Alex Pataky of Opening Roof Specialists for forwarding this on.

I am sure several of our readers and subscribers will purchase the book!

Amazing mind reader reveals his gift in this 2-minute video

You need to watch the video first – it is simply AMAZING..

When you’re done, click to read more.

Continue reading ‘Amazing mind reader reveals his gift in this 2-minute video’

The Case Against Social Media

As a reader or subscriber to this blog, you know I am fundamentally “against social media” based on some fundamental business and online privacy principles.

The following excerpts from a recent study bolster my belief that the influence of social media is grossly overrated – IN MOST instances. yes, there are exceptions, but exceptions are NOT the rule!

The following graphics from a study from Dscout.com say it all…

Social Media - Phones

It’s not just phones that lack influence – it’s “social media” in general…

Social Media - Friends Influence

So where does the propaganda come from?

Think about it – the social media platforms and self-proclaimed consultants and advisors have everything to gain… THEIR model is to make money FROM you, not for you… Hmmmm….

Microsoft’s piracy statement updated

As a reader or subscriber to this blog, you know I am not a fan of Social Media and the tactics used to steal your personal information.

Today’ I came across a message from Microsoft that I found truly surprising – read it for yourself.

The question is, will they be able to stick to it and remain competitive when their competitors keep stealing and monetising peoples’ personal details as rampantly as ever… Time will tell, but I have to give credit, where credit is due – well done Microsoft!

 Microsoft Piracy Statement

Long URL

According to Wikipedia:

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.[1][2] Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware.[3] Phishing is typically carried out by email spoofing[4] or instant messaging,[5] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

So how can you protect yourself when you get an email with an abbreviated URL (Tiny URL)?

You can go to http://longurl.org/ and expand the Tiny URL to make sure you know where you will end up when you click.

If you think information like this is valuable, imagine if you became a client and we shared with you even more?

Have a look at our products and programs and test them for yourself. A penny saved is a dollar earned!

 

 

Privacy Pirates

Privacy Pirates: How The War For Your Personal Identity Will Escalate In 2013 And What You Need To Do Now To Protect Yourself

At my Internet workshops, I give  participants a sneak peek into what the war between Google, Facebook, Apple and Amazon mean to you and your business.

It’s one of the key principles I’ve been advocating to my elite VIP and Platinum Program Members for the past 3 to 5 years.

The Internet is undergoing an incredible transformation that has alarmed privacy and personal liberty advocates around the world.

Without delving into conspiracy theories and cynical skepticism, I discuss what you should do to protect yourself, your company and your family.

I share what the experts are saying because this is no longer ‘science fiction’. It’s real and it’s here now. Contact us if you’d like a copy of our Privacy Pirates Report.

Internet Wars, Facebook Fallacy, Google Apple War, Google Facebook War

Some New Computers Have Malware Already Installed

I am not one to focus on the negative, but every once in a while, it’s necessary to be aware of potential problems without stepping over the line into paranoia.

Ray Keefe of Successful Endeavours in Melbourne, remains on top of computer security issues because he develops electronic systems and upgrades legacy systems for his clients and security is of paramount importance.

Ray brought this issue to my attention and I thought it was worthy of sharing it with you just in case you thought you’d be safe with a new computer.

Click on the hyperlink to access the IEEE’s security alert on malware on new computers.

How to pick a good password

Decades ago only spies and systems administrators were the only ones who really had to worry about passwords. But today, you have to enter a password to do the most basic things like turning on your computer or smartphone, downloading a song or buying a book online.

It’s no wonder many people use a single, simple password for everything. But that can be a catastrophic mistake.

You need a good password – one that no one can easily guess:

Password security, Safe Password, Secure Password

HOW TO CREATE A GOOD / SAFE PASSWORD

Continue reading ‘How to pick a good password’

Internet Blackout? What you need to know

According to reputable sources, thousands of computer users may lose Internet access on Monday, when the deadline for a temporary fix to a malicious software scam shut down by the FBI last year expires.

What is it?

Millions of computers were infected with the so-called “Internet Doomsday” virus used in the hacking scam, which redirected Internet searches through DNS servers used by the scammers. (Who, in turn, allegedly netted $14 million in bogus advertising revenue.) After U.S. and Estonian authorities busted the malware ring last November, a federal judge ordered that the FBI use temporary servers while the malware victims’ PCs were repaired. The temporary servers will shut down at 12:01 a.m. EDT on Monday, meaning anyone using a computer still infected with the virus will likely lose Internet access.

“Connectivity will be lost to the Internet PERIOD,” Symantec, the online security firm, said in a blog post. “If your computer is still using DNS entries that are pointing to the FBI servers on July 9, you will lose TOTAL access to the Internet. No connecting to the office from home, no updating Facebook, nothing until the DNS settings are fixed.”

Click here to read the original article and access links to safely test your Internet access.

ALERT: Video Surveillance Goes Mainstream

Privacy, Video Surveillance, Online Privacy, Privacy PiratesA recent Economist Magazine article on video surveillance struck a chord with me – face recognition is becoming mainstream and as such there are virtually no limits to the violations to privacy that will soon be possible by unscrupulous companies and criminals.

As you know, the Privacy Pirates are out there stealing your personal data, but this is one step beyond that – this is potentially LIVE and ADAPTIVE in both the physical and virtual world.

You don’t need to be a conspiracy theorist to get worried. I’m far from being paranoid, but there are tell tale signs that the abuses are increasing at an alarming rate.

Since I am NOT into propagating conspiracy theories, I have put together a report that summarises several issues that you should be aware of.

If you’d like a copy, you’ll need to contact us to get it. It’s not a free giveaway download. The 24 page report took 37 hours of research assembling 67 articles with 126 reference links for you to get quick access to what you need to protect yourself. Contact us – prevention is the only cure for this disease!

Facebook Wall Of Shame Infographic

During my recent Business Blogging For Sales Lead Generation event tour in Adelaide, the Gold Coast, Melbourne and Sydney, participants heard a preview of my rant on Privacy Pirates which I’ve been proselytising about for quite some time. Karen Bonanno, a 2011 Exponential Entrepreneur Of The Year Award Winner, sent me the infographic below that I just had to share with you.

I will expand on this in an upcoming Do It Yourself Google Sales Lead Generation For Small Business series of workshops… But in the meantime have a good read of this infographic. You’ll start to get a sense of where I’m coming from and how I am guiding my clients to avoid being victims of the Privacy Pirates.

Facebook Privacy, Personal Privacy Theft, Identity Theft

Credit Cards: How Are They Verified?

Ever wonder how a credit card number is verified? A fascinating article, Making Sense of your Credit Card Number published by Digital Inspiration Technology Blog.

You credit card number may look like a random string of 16 digits that’s unique in the world but those digits reveal a little more than you think. For instance, the first digit of the card represents the category of industry which issued your credit card.

American Express is in the travel category and cards issued by them have 3 as the first digit. If you have VISA or MasterCard, your card’s first digit should be either 4 or 5 as they are from the banking and financial industry.

The first six digits of your credit card number identify the institution that issued the card to you. VISA cards follow the series 4xx while MasterCard uses 51-55 as the prefix.

You may even verify if a given credit card number is valid or not using simple addition. The following visual illustration courtesy of Mint.com will help you understand more about the anatomy of your credit card.

Data Breach Costs

In a previous post, I explained the risks of phishing.  In the 2009 Annual Study Australian cost of data breach report, they state that the average cost per compromised record is $123. Can you imagine that? If you have 10,000 records in your database, that’s a whopping $1,230,000. Which is why the common statement holds true… “80% of businesses that suffer a catastrophic data breach incident close their doors within 18 months.

Pretty sobering stuff isn’t it?

What can you do to ensure you and you’re data are safe? Be diligent about LIMITING access to data and ensuring you have the best and latest technology possible.

I don’t want to get into the details today, just thought I would share the statistic for you – it sure makes more “real” doesn’t it?

Phishing

Phishing” (also known as “carding” or “spoofing”) refers to email that attempts to fraudulently acquire personal information from you, such as your account password or credit card information. On the surface, the email may appear to be from a legitimate company or individual, but it’s not. I came across this particular explanation of phishing that I thought was helpful and valuable enough to share with you.

There are so many people I know who don’t take necessary precautions to protect themselves – for example they don’t shred their personal documents. They just throw them in the trash… this is ESPECIALLY dangerous with apartment buildings. Let’s face it – if YOU were trying to steal people’s identities would you go through the trash to steal ONE person’s or 100, 200 or even 300 all in one go? Sure the pile would be BIGGER with 100, 200, 300, but so will be the payoff!

I am not a paranoid person, just cautious – on the Internet it’s just so much easier for people continents away to be malicious.