• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Terry Ambrose

Writing is like a good barbecue sauce, if it ain't bold, it ain't worth doing.

  • Home
  • About Me
    • Interviews
    • Appearances
    • Media
    • Privacy Policy
    • Contact Me
  • All Books
    • Seaside Cove Bed & Breakfast Mysteries
      • A Treasure to Die For
      • Clues in the Sand
      • The Killer Christmas Sweater Club
      • Secrets of the Treasure King
    • Trouble in Paradise McKenna Mysteries
      • Photo Finish
      • Kauai Temptations
      • Big Island Blues
      • Honolulu Hottie
      • Mystery of the Lei Palaoa
      • North Shore Nanny
      • A Damsel for Santa
      • Maui Magic
      • The Scent of Waikiki
    • License to Lie Thriller Series
      • License to Lie
      • Con Game
    • Anthologies
  • Blog
  • Recipes
    • Appetizer
    • Breads
    • Desserts
    • Main dishes
    • Side dishes
  • Scam Tips & Interviews
    • Authors You’ll Like
    • Reviews
    • Scams and Cons
You are here: Home / Archives for security issues

security issues

Three tips for your Internet of Things device

August 4, 2018 By Terry Leave a Comment

internet of thingsIf you’ve bought a “smart device” for your home, you could be helping hackers around the world. The problem began when the first smart devices failed to provide a way to change their default passwords. When the news broke that these devices could be hacked on a massive scale and used in phishing scams, the manufactures slowly made changes to enhance the security of future devices sold.

Those changes only affected future devices, which means millions of devices with default passwords are in use around the world and many are being used on networks for—shall we say, less than honorable purposes. So you have the picture, right? 

How to spot the problem

The first question is, do you even have an Internet of Things device? If you’re like me, you take the “security through abstinence” approach and avoid these devices because of their potential security flaws. Is it inconvenient to not be able to dial ahead and tell my home to turn up the heat or turn on the lights? I suppose, but not having those capabilities is a small price to pay for rock solid security.

According to the FBI, Internet of Things abuse is hard to identify, but there are a few signs to watch for, if you even have access to the information. First, do you know what your monthly Internet usage is? My provider doesn’t give me this information, but if yours does, you can watch for a major spike. Similarly, if you pay based on usage, you can watch for a larger than usual Internet bill. Are your devices or your network running slow? This could also be a potential signal of something going on.

Making your Internet of Things devices less vulnerable

Assuming you have vulnerable devices, you may be able to eliminate the problem by doing a few things. The FBI’s list is more comprehensive, but some of their suggestions are beyond the skill set of the average consumer.

1) Reboot your devices regularly

2) Change default user names and passwords.

3) If you’re notified of a security patch for your device, follow the instructions to install it.

Filed Under: Scams & Cons Tagged With: scams, security issues

Hackers are everywhere — vigilance is key to security

July 2, 2017 By Terry 2 Comments

cyber security awareness monthWe hear lots of news these days about hackers, cyberterrorism, data breaches, and more. A hot topic right now involves questions about our last election. Was it tampered with by Russia? Someone else? These are pretty broad questions, but at a personal level, what does all this talk about hackers really mean?

I’ve just spent the past week trying to keep hackers from damaging websites we host through our business. The attacks have come from all over the world. It’s been a high stress week consumed by many hours of dealing with thousands of attacks. So, exactly who are these guys? It’s hard to tell, but basically they are most likely either grey hat or black hat hackers.

White hat hackers

These are the good guys. They’re either computer security experts or have a high set of ethics. They don’t try to infiltrate a site without permission, and they share the results of their efforts with the owner. There are education programs, conferences, and certifications for white hat hackers.

Grey hat hackers

The first one who infiltrated one of our sites was a self-described grey hat hacker. The grey hats don’t ask for permission ahead of time. They simply do their thing. In fact, the one who hacked our sites said this was his hobby. He didn’t do damage. He didn’t steal information (to our knowledge). He simply broke into the site, posted a cute graphic, and sent a message announcing his success.

Black hat hackers

These are the ones we hear about all the time. They’re out for fame, money, or whatever suits their fancy. Some go after big targets, others are just starting out and pick on low hanging fruit.

How they hack into a website

Hacking a website is far easier than you might think. There are programs, some available for free, allowing even a novice to launch devastating attacks. Many of today’s hackers are what might be called “script kiddies.” They know little about what they’re doing other than how to push the buttons on their computer. Most likely, they account for a majority of the spam that hits your email inbox (one reason why so much of the spam is amateurish.)

What does all this mean to you?

The point of this post is to show how websites can be compromised without the owner’s knowledge. For instance, a black hat hacker could break into a website and replace a downloadable piece of software with something containing malicious code. At a more global level, it could also mean our last national election was indeed influenced by outside forces.

It may sound very conspiracy-theorist, but it wouldn’t take much to tilt an election by affecting a small number of votes. The bottom line is we all need to be extra vigilant in making sure we get our software from reputable sources, be cautious with links in emails, and always keep our own virus protection software current.

SaveSave

SaveSave

Filed Under: Scams & Cons Tagged With: Hacker (computer security), security issues

Optimizing Your iOS Privacy and Security Settings

May 30, 2017 By Terry 1 Comment

Optimizing IOS Privacy

optimizing IOS privacy
Hands holding smartphone with access identification password on the screen over wooden table

Former FBI Director James Comey complained to the Senate Judiciary Committee recently about IOS security. Trying to bypass iPhone security safeguards to access encryption data was like running into an impenetrable wall, Comey said. But the fact the Bureau was still able to hack half the phones illustrates that there is a risk if you don’t have your iPhone configured correctly. Here are some tips for how for optimizing iOS privacy and security settings.

Enable Passcode Lock and Disable Bypass Features

The most fundamental privacy and security step you should take is going into your general settings to enable passcode lock, says security provider McAfee. Passcodes are four digits by default. Avoid common passcodes such as 1234, 0000 or 5683, and instead choose a harder number to guess. Setting auto-lock timeout and enabling erase data will make it harder for a thief to try to guess your code by brute force.

If you enable Touch ID, you can enter a longer six-code passcode and then use Touch ID as a shortcut instead of having to type it in every time. However, your passcode must still be used when you first turn on your phone and in certain other circumstances, as Apple explains in its online security manual. The iPhone 7 and iPhone 7 Plus still include embedded Touch ID, though it’s uncertain how iPhone 8 will handle this feature.

To use your passcode effectively, you should disable features that can be used to bypass it. These include voice dial, found under the settings for your passcode lock’s voice control, and SMS preview, found under your settings for messages.

Disable Built-in Sensitive Data Storage Features

There are also certain features built into the design of the iPhone to track your activity that you should disable to optimize your privacy and security. You can disable your keyboard cache, which normally stores your keystrokes for up to a year, if you go under your general settings and choose the reset option. You should also disable your camera’s geotagging feature under your settings for location services.

The iPhone takes an automatic screenshot each time you tap your Home button, so avoid tapping it when looking at sensitive information. You can disable this feature if you jailbreak your phone, however this isn’t generally recommended.

Keep Your Firmware Updated

Your iOS device includes embedded operating system firmware. Apple updates this regularly to incorporate security updates, so you should make sure you have the current firmware version. You can check your device’s firmware version under the About section of your general settings. You can receive firmware update prompts by plugging your device into a computer running iTunes and launching iTunes. You can also keep track of firmware update announcements by following Apple’s @appleios Twitter feed.

Enable Safari Privacy and Security Settings

Your iPhone’s Safari browser has some privacy and security settings you can access under your settings for Safari. You should enable Block Pop-ups and Fraud Warning. You should also disable AutoFill for Use Contact Info and Names & Passwords.

After viewing any sensitive information, be sure to clear your history, cookies and cache. You should also go under your setting for Safari databases to delete any databases you don’t want saved.

Use Wireless and Email Wisely

Cyberthieves can try to use your phone’s Bluetooth and Wi-Fi connections to steal data. To prevent this, when you’re not using Bluetooth, go under your general settings for Bluetooth and turn it off. Likewise, when not using Wi-Fi, go under your general settings for Wi-Fi, then tap the blue arrow next to each previously associated network SSID and tap to Forget This Network.

For email, it’s important to protect your contact list. To do this, go under the settings for Mail, Contact, Calendars. Then select an active mail account, tap on Advanced and turn on the SSN option.

Enable Find My iPhone

In the event your iPhone gets lost or stolen, you should have the Find My iPhone app enabled. To do this, launch AppStore and download the free Find My iPhone app. Then go under the settings for Mail, Contact, Calendars under Accounts and add a MobileMe account. You can then log into the MobileMe account with your Apple ID and password and turn the Find My iPhone setting on. Finally, go to the installed app and log in with your Apple ID and password. You will then be able to track your device through the MobileMe website if you ever need to find your phone. You will also be able to display messages to contact you on your phone, play sounds and remote wipe your data if needed.

Filed Under: Scams & Cons Tagged With: security issues

Are Bad Security Habits Putting Your Home at Risk?

April 18, 2017 By Terry Leave a Comment

Security alarm keypad with person arming the system

What are the odds of your home being broken into? They may be higher than you think. One in every thirty-six homes will be broken into each year, according to data from the Federal Bureau of Investigation. The average homeowner suffers $2,230 in property loss per break in, totaling $4.7 billion stolen annually from U.S. citizens. Many homeowners are victimized more than once after burglars identify them as an easy target. Often bad habits leave homeowners needlessly vulnerable. Here are some of the most common bad habits that can leave your home at a higher risk of becoming burglarized.

Forgetting to Lock the Front Door

Locking your door is one of the simplest burglary prevention steps you can take, but a surprising number of people don’t do it. Here’s what FBI data shows:

  • 34 percent of burglars break in through the front door
  • Adults over 65 were less likely to lock their doors than younger people
  • Men were less likely to lock their doors than women
  • Rural dwellers were less likely to lock their doors than city dwellers and suburbanites
  • Midwesterners were less likely to lock their doors than those from other regions
  • Whites were less likely to lock their doors than other ethnic groups

Simply taking the time to lock your door can leave you significantly less vulnerable to become burglarized. Make sure you have a deadbolt lock instead of just relying on the lock on your doorknob.

Not Securing Access Points

After front doors, the most common ways burglars get in are through windows and back doors. Many people leave their windows open during summer months, or place an air conditioner in their window, which a burglar can easily remove. Make sure you secure your windows and back door. If you use an air conditioner, you can make it more secure by installing screws through the top mounting rail, installing window frame locks, or using a window wedge.

Basement doors and windows and garage doors can also be vulnerable entry points. Lock your basement door with a dead bolt just as you would your front door. Bars and grills are one of the most effective ways to secure basement windows. Thieves can open garage doors by inserting a coat hanger through the top of the door and using it to release the emergency latch. Prevent this by disabling the emergency release, removing the cord attached to it, and locking the release lever.

Not Installing a Security System

Another frequent mistake is not installing a home security system. Burglars tend to be deterred by a camera, motion detector or alarm. It’s worth the investment to get a HD security camera system, especially when some companies, such as Lorex Technology, offer systems that don’t require a monthly subscription.

A dog can also be a great security system. Most burglars say they will avoid a home with a big, loud dog.

Hiding a Spare Key Outside

Another common mistake homeowners make is leaving a spare key outside their home in an obvious location such as under a doormat or in a fake rock. Burglars who have been interviewed after their arrests say that one thing they typically do when staking out a home is look for a hidden key. If you feel a need for a spare key, keep it in your wallet or purse or with a trusted neighbor.

Filed Under: Scams & Cons Tagged With: security issues

12 Scams of Christmas list continues — holiday deal scams and mobile apps

November 27, 2016 By Terry 2 Comments

holiday deal scams

This is Week Three in my 12 Scams of Christmas countdown. In Week One, I covered Soggy Security and Mystery Shopper scams. Week Two covered those fake debt collectors and coupon scams.

#8) Hot holiday deal scams

Hot holiday deals were included in last year’s list, but that post was more about stolen and fake goods. Last year’s tip still applies because there are still plenty of disreputable vendors doing business in the wild. But, there are also plenty of hot holiday deal scams making the email rounds this year. One I’ve been seeing a lot of lately has to do with the “Shark Tank Greatest Product.”

Once again, the scammers are taking advantage of high visibility celebrities to make their not-so-great email offers more attractive. In this case, the email I received read:

The sharks all took out their phones and snapped this lens on and were blown away by how incredible the photos were. They were more vivid and 15x clearer. All 3 went in togeather for a record-deal.

Let’s ignore the typos in the message for a minute and remember that claims like this are simply a lure to drum up business for the scammer. The product may not be an outright scam, but the potential for fraud is high. So, when looking at hot holiday deals, it’s definitely a case of buyer beware. It’s far better to sacrifice a better price for a more reputable vendor and product.

#7) Not-so-merry mobile apps 

Apple recently purged thousands of apps from the App Store. Why? The apps weren’t up to today’s standards. In the past, Android apps were riddled with malware. While the situation has improved, a security company recently disclosed a new incidence of the problem. The “Dress Code” malware, which made it into about forty apps, has now been downloaded around a half million times. That’s a lot of infected phones.

It’s unrealistic to expect anyone to completely protect themselves from malware on a phone. After all, it would mean never downloading an app, connecting to a website, or opening an email. So, for those who want to actually use their phones, the best solution is to be cautious. Download apps from reputable sources such as the App Store or Google Play, only connect to trusted websites, and never click a link in an email that comes from an unknown source.

Smartphones are no different from a laptop or desktop computer. They require the same kinds of security precautions to avoid a not-so-merry surprise.

The 12 Scams of Christmas List (the countdown)

Week 1: #12 Soggy Security (#12) and Mystery Shopper Scams (#11)

Week 2: Scrooge Wants Money (fake debt collectors) (#10) and Coupon and Gift Card Scams (#9)

Week 3: Hot Holiday Deals (#8) and Not-so-merry Mobile Apps (#7)

Week 4: Chilling Charities (#6) and Shipping Notice Scams (#5)

Week 5: Dubious Diets (#4) and Love Scams (#3)

Week 6: Deceptive Online Games (#2) and Holiday Media (#1)

Filed Under: One Step Ahead - Featured, Scams & Cons Tagged With: 12 Scams of Christmas, email scam, scams, security issues

12 Scams of Christmas — soggy security and mystery shopping

November 13, 2016 By Terry Leave a Comment

12 scams of ChristmasI just realized there are 41 days left until Christmas. It’s a scary thought. Where did the year go? Better yet, what will the end of the year bring? One thing is certain, the holiday season will bring out scammers. With that in mind, here are the first two entries from this year’s “12 Scams of Christmas” list.

#12 — Soggy Security

’Tis the season for bad little hackers and scammers to take advantage of your computer’s outdated apps and programs. Software updates can be a major pain, but they’re a necessary part of maintaining a healthy computer system. Let the updates go and your computer becomes much like an old pair of socks with a hole or two.

Here are three tips to help keep your holidays merry and bright while ensuring your electronic devices run smoothly.

  • If an update is issued for your device, install it.
  • Only download apps, software, and updates from reputable sources.
  • Ensure that a website has a good reputation by using a service such as Web of Trust. This is a free online service that lets site visitors rate each website they visit. It doesn’t slow down your browser, and could save you from making a costly mistake on a fraudulent website that looks legitimate.

#11 – The Mystery Shopper

Who wouldn’t like to have a little extra cash for the holidays? If you happen to be one of those people who doesn’t mind the crowds, consider a part-time job as a mystery shopper. Just remember, these  part-time jobs can be a great way to make money, or an expensive mistake.

Want to get paid to shop a massage? Done! Eat haute cuisine? Stay at fancy hotels? No problem. All of these opportunities are open to the mystery shopper. But, mystery shoppers do not typically make a lot of money. Nor do they get paid in advance to make purchases.

One popular twist on the scam involves an assignment to evaluate money transfer services such as Western Union or MoneyGram. Often, a fake mystery shopper service will charge a fee for training or registration. This should be a warning sign that you’re being scammed. For more information on how to become a mystery shopper without getting scammed, visit SecretShopper.com.

The 12 Scams of Christmas List (the countdown)

Week 1: #12 Soggy Security (#12) and Mystery Shopper Scams (#11)

Week 2: Scrooge Wants Money (fake debt collectors) (#10) and Coupon and Gift Card Scams (#9)

Week 3: Hot Holiday Deals (#8) and Not-so-merry Mobile Apps (#7)

Week 4: Chilling Charities (#6) and Shipping Notice Scams (#5)

Week 5: Dubious Diets (#4) and Love Scams (#3)

Week 6: Deceptive Online Games (#2) and Holiday Media (#1)

Filed Under: One Step Ahead - Featured, Scams & Cons Tagged With: 12 Scams of Christmas, scams, security issues

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 9
  • Go to Next Page »

Primary Sidebar

  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter

Follow Me on Bookbub

Subscribe to The Snitch

Secrets of the Treasure King - Seaside Cove Bed & Breakfast Mystery #4
New Cozy!

Secrets of the Treasure King

View Book

Tags

2020 appearances Australia Award-winning Authors Bestselling Author Big Island Big Island Blues book review cozy mystery crime fiction Day Trips email scam events fraud Friday Fotos Great Escapes Book Tours Guest Post Hawaii Hawaii travel Heritage Gardens historical novel humor interview kauai tour literacy Maui photos mystery New Authors Newsletter Recipe New York Times bestseller New Zealand paranormal phishing police procedural romance San Diego scams security issues sunrise The Snitch thriller travel Travel Journal 2019 travel tip Your Money

Footer

Join my mailing list to stay in touch

Top posts

  • Five tips to avoid four Amazon email scams
  • Is battery reconditioning a scam or not?
  • Home
  • The background check email scam
  • The Broken Spine by Dorothy St. James
  • The Vast Platinum Shopping Credit Card — scam or a good deal?

find me on facebook

find me on facebook

Copyright © 2021 Terry Ambrose · Terry Ambrose · Genesis Framework on WordPress · Log in