Archive for the 'Security' Category

Phishing scams are increasing

Phishing scams are increasing and you need to be ever more more diligent with your security and privacy these days with the scammers’ level of sophistication becoming more and more deceptive. Article #1: PayPal scam Article #2: Missed call scam Article #3: CommBank email scam I would forward this blog post to friends, family staff and […]

Share

How to turn off FaceTime to avoid Apple’s eavesdropping bug

This latest news alert is worthy of quick consideration – the steps are super quick and easy to resolve on all your devices: https://fox13now.com/2019/01/29/how-to-turn-off-facetime-and-avoid-apples-eavesdropping-bug/ Please share amongst friends and family.

Share

2018 Internet Minute

Ever wonder what happens in 60 seconds on the Internet? Check this out! Psst! Your devices are doing this automatically – even while you sleep!

Share

Cyber Security Checklist

FYI, I just published an original article “Ward off hackers with this cyber safety checklist” on the Internet’s #1 domain registrar, GoDaddy.com, it’s my chosen domain registrar and primary resource for checking and buying domain names (URLs) for blogs and websites. Click on the hyperlink to read the article – it’s a compreshensive summary to […]

Share

Apple Users Beware Of New Phishing Scam

This lastest phishing scam is affecting unwary Apple users. Australian, be careful of this Origin Energy Phishing scam.

Share

How To Protect Yourself Against Hacking

This article is a great starting point to protecting yourself from the Privacy Pirates… Some articles are just so good, you’re better off going straight to the source, this is one of them!

Share

The Visual Power Of Big Data

I have blogged about the Privacy Pirates and the massive invasion of digital privacy issues that abound… And I’m not even a conspiracy theorist! That being said, this TED Talk shows the incredible power and majesty of what big data can reveal. I can only imagine what oppressive regimes do behind-the-scenes that we never get […]

Share

7 Signs That You Are Going To Be The Next Cyber Victim

Have a quick look at this interesting perspective on the state of cyber crime. Boaz Fischer is a graduate of our Platinum Program.

Share

They Know

I have talked about Privacy Pirates before… This video is worth the 3 minutes – but I have to warn you, it’s more than a little upsetting what THEY KNOW…

Share

Linked In And The Law

  Thank you Alex Pataky of Opening Roof Specialists for forwarding this on. I am sure several of our readers and subscribers will purchase the book!

Share

Microsoft’s piracy statement updated

As a reader or subscriber to this blog, you know I am not a fan of Social Media and the tactics used to steal your personal information. Today’ I came across a message from Microsoft that I found truly surprising – read it for yourself. The question is, will they be able to stick to […]

Share

Technology tips when starting your own business

Website Design Internet technology is one of the biggest challenges small business owners face. Part of the reason is how quickly it changes but more importantly it’s because of the misinformation propaganda machine out there confusing things – ON PURPOSE. Nowadays, the Internet is the undisputed go-to place for information. Even if you don’t engage […]

Share

Long URL

According to Wikipedia: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.[1][2] Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used […]

Share

Privacy Pirates

Privacy Pirates: How The War For Your Personal Identity Will Escalate In 2013 And What You Need To Do Now To Protect Yourself At my Internet workshops, I give  participants a sneak peek into what the war between Google, Facebook, Apple and Amazon mean to you and your business. It’s one of the key principles […]

Share