5 Cyber Safety Tips

Making Sense of Security 5 Cyber Safety Tips

With October being Cyber Awareness Month, here are 5 simple Cyber Safety tips to help you stay secure. Get your copy of these tips to share now. NEVER Share Your Password! Keep your passwords secure. Change passwords often. 2. Post Carefully to Social Media Remember: Internet posts stay there forever. Especially with screenshots. 3. Be

Strong Password Tips

Making Sense of Security Password Tips

Online Safety Guidelines for Strong Passwords Quick tips for creating and saving your online passwords and making them strong. Make Passwords Long Use passwords longer than six characters when possible. Especially with most characters being from the Alphabet.  Don’t Use Personal Information Avoid using demographics, birthdates or names from your loved ones. Including pets.  Change

How to Install GPS on Someone’s Mobile Phone

mSpy laptop

How to Install GPS on Someone’s Mobile Phone. Using mobile phones has brought us much convenience when it comes to contacting a person regardless of their location. Yet, from time-to-time, we may actually need to know their location and are unsure how to track them. Today, there is software that brings us that convenience of being able to keep tabs on our loved ones. This capability brings peace of mind, especially when it comes to our children and significant others. Software for mobile cell phones deliver many features. Not only can you view text messages, call logs, social media chats but you can locate the device of your person’s GPS location.

How To Set Your Phone for Better Privacy and Security

Phone Privacy and Security

The default factory settings on your phone are a double-edged sword. On one hand, they’re the best way to see what the creator recommends for you, and it makes it easy to get started. But sometimes, these features can have problems.

They can be reducing your battery life, or share things you don’t want them to. So no matter what phone you use, you should change a few options around if you want to have the most security. And this guide will help you to find those.

These settings alone will not protect you from persistent hackers or from complex phishing scams but they will be a great place to start your basic security review. Unfortunately cyber crime statistics are showing increasing threats year on year targeting individuals and business users.

Commercial spy apps are also on the rise and they make it very easy for unskilled hackers to target people if they can access your cell phone. Fortunately these spy apps do leave traces and you can find out if you have been hacked – if you know what to look for.

So let’s look at a few settings you should check when you first start that new phone…..

How to Listen to Someone’s Cell Phone Conversation

How to Listen to Someone’s Cell Phone Conversation without them Knowing - Making Sense of Security

How to Listen to Someone’s Cell Phone Conversation without Them Knowing The phone rings. Your other half answers it. You only hear one side of the conversation. They repeatedly say: “uh-huh…uh-huh…yaaa…uh-huh….ok…bye!” This ambiguous conversation leaves you overflowing with curiosity of not only what the other side of the convo was, but WHO were they talking

FBI hacks vulnerable US computers to fix malicious malware

malicious malware

FBI hacks vulnerable US computers to fix malicious malware The FBI has been hacking into the computers of US companies running insecure versions of Microsoft software in order to fix them, the US Department of Justice has announced. The operation, approved by a federal court, involved the FBI hacking into “hundreds” of vulnerable computers to

Free Phishing-Protection Solution Amid The COVID-19 Outbreak

Free Phishing-Protection Solution Amid The COVID-19 Outbreak

OhPhish Helps Remote Workers and Businesses Fight Phishing Attacks – From the Editors at Cybercrime Magazine ALBUQUERQUE, N.M., March 23, 2020 /ECCouncil.org/ As the novel coronavirus (COVID-19) pandemic progresses across the world, cybercriminals are taking advantage of the situation resulting in a spike of phishing scams on remote workforce and corporate systems. While working from

How to Stay Connected and Protected in a Remote Work Environment

protect connect remote work

How to Stay Connected and Protected in a Remote Work Environment   Advancements in cloud solutions and collaboration tools in recent years, coupled with the necessity of going remote due to the pandemic, have empowered today’s workforce to choose where they want to work. While the ability to work from anywhere—home, the library, coffee shops or

A Can of Phish Bait: from Surveys to Rule Changes to Your Boss’s Boss

phishbait-surveys-rule-changes-boss

Employees need to continue being wary of phishing scams as they begin to return to the office, according to Roger Kay at INKY. Kay describes several phishing templates that INKY has intercepted in recent months, including one that informed recipients that they needed to fill out a compliance form related to COVID-19 risks. “Reasonably well

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials

Phishing Scammers Send a Fake “Private Shared Document” as the Initial Attack Vector for Stealing LinkedIn Credentials

A new social engineering scam demonstrates how cybercriminals are both evolving their tactics while still using tried and true methods that just work to attain their goals. I’ve covered scams impersonating Office 365 I don’t know how many times. But it’s not very often you hear about a scam that uses LinkedIn as both its

Most Phishing Emails Are After Credentials

Phishing Emails Are After Credentials

Most Phishing Emails Are After Credentials 57% of phishing emails in 2020 were designed for stealing credentials, according to Cofense’s most recent Annual State of Phishing Report. Meanwhile, just 12% of phishing attacks last year were used for delivering malware. Cofense believes this is because credential phishing emails are better at bypassing email security filters