Archive for the 'Online Security' Category

Phishing scams are increasing

Phishing scams are increasing and you need to be ever more more diligent with your security and privacy these days with the scammers’ level of sophistication becoming more and more deceptive. Article #1: PayPal scam Article #2: Missed call scam Article #3: CommBank email scam I would forward this blog post to friends, family staff and […]

Share

How to turn off FaceTime to avoid Apple’s eavesdropping bug

This latest news alert is worthy of quick consideration – the steps are super quick and easy to resolve on all your devices: https://fox13now.com/2019/01/29/how-to-turn-off-facetime-and-avoid-apples-eavesdropping-bug/ Please share amongst friends and family.

Share

2018 Internet Minute

Ever wonder what happens in 60 seconds on the Internet? Check this out! Psst! Your devices are doing this automatically – even while you sleep!

Share

Cyber Security Checklist

FYI, I just published an original article “Ward off hackers with this cyber safety checklist” on the Internet’s #1 domain registrar, GoDaddy.com, it’s my chosen domain registrar and primary resource for checking and buying domain names (URLs) for blogs and websites. Click on the hyperlink to read the article – it’s a compreshensive summary to […]

Share

Apple Users Beware Of New Phishing Scam

This lastest phishing scam is affecting unwary Apple users. Australian, be careful of this Origin Energy Phishing scam.

Share

How To Protect Yourself Against Hacking

This article is a great starting point to protecting yourself from the Privacy Pirates… Some articles are just so good, you’re better off going straight to the source, this is one of them!

Share

The Visual Power Of Big Data

I have blogged about the Privacy Pirates and the massive invasion of digital privacy issues that abound… And I’m not even a conspiracy theorist! That being said, this TED Talk shows the incredible power and majesty of what big data can reveal. I can only imagine what oppressive regimes do behind-the-scenes that we never get […]

Share

7 Signs That You Are Going To Be The Next Cyber Victim

Have a quick look at this interesting perspective on the state of cyber crime. Boaz Fischer is a graduate of our Platinum Program.

Share

They Know

I have talked about Privacy Pirates before… This video is worth the 3 minutes – but I have to warn you, it’s more than a little upsetting what THEY KNOW…

Share

Net Neutrality Vote

The Internet’s neutrality will be voted on soon… If you want to protect the Internet’ “integrity”, click on the image below or on the hyperlink to cast your vote to keep EVERYONE’S ACCESS EQUAL.  

Share

Linked In And The Law

  Thank you Alex Pataky of Opening Roof Specialists for forwarding this on. I am sure several of our readers and subscribers will purchase the book!

Share

Amazing mind reader reveals his gift in this 2-minute video

You need to watch the video first – it is simply AMAZING.. When you’re done, click to read more.

Share

The Case Against Social Media

As a reader or subscriber to this blog, you know I am fundamentally “against social media” based on some fundamental business and online privacy principles. The following excerpts from a recent study bolster my belief that the influence of social media is grossly overrated – IN MOST instances. yes, there are exceptions, but exceptions are […]

Share

Microsoft’s piracy statement updated

As a reader or subscriber to this blog, you know I am not a fan of Social Media and the tactics used to steal your personal information. Today’ I came across a message from Microsoft that I found truly surprising – read it for yourself. The question is, will they be able to stick to […]

Share

Long URL

According to Wikipedia: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.[1][2] Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used […]

Share

Privacy Pirates

Privacy Pirates: How The War For Your Personal Identity Will Escalate In 2013 And What You Need To Do Now To Protect Yourself At my Internet workshops, I give  participants a sneak peek into what the war between Google, Facebook, Apple and Amazon mean to you and your business. It’s one of the key principles […]

Share

Some New Computers Have Malware Already Installed

I am not one to focus on the negative, but every once in a while, it’s necessary to be aware of potential problems without stepping over the line into paranoia. Ray Keefe of Successful Endeavours in Melbourne, remains on top of computer security issues because he develops electronic systems and upgrades legacy systems for his […]

Share

How to pick a good password

Decades ago only spies and systems administrators were the only ones who really had to worry about passwords. But today, you have to enter a password to do the most basic things like turning on your computer or smartphone, downloading a song or buying a book online. It’s no wonder many people use a single, […]

Share

Internet Blackout? What you need to know

According to reputable sources, thousands of computer users may lose Internet access on Monday, when the deadline for a temporary fix to a malicious software scam shut down by the FBI last year expires. What is it? Millions of computers were infected with the so-called “Internet Doomsday” virus used in the hacking scam, which redirected […]

Share

ALERT: Video Surveillance Goes Mainstream

A recent Economist Magazine article on video surveillance struck a chord with me – face recognition is becoming mainstream and as such there are virtually no limits to the violations to privacy that will soon be possible by unscrupulous companies and criminals. As you know, the Privacy Pirates are out there stealing your personal data, […]

Share