Marriott announced last week that as many as 500 million of their Starwood Guests had their customer data exposed. In this post I’ll go over what we know about the Marriott breach, what you can do about it, and how to mitigate damage from the inevitable future breaches. Details of the Marriott Breach Here are
The US Postal Service (USPS) has an interesting service called Informed Delivery that allows you to see what pieces of mail are heading to your mailbox before they arrive. You can use it to see what mail you should have received, as well – if you were expecting something but didn’t get it. When you
It’s that time of year again! Black Friday, Cyber Monday, Boxing Day and all the other gift shopping days between now and the end of the year. (Already missed Singles Day, though.) But you need to make sure that you’re not giving away your gift recipient’s privacy or giving hackers a means to rip off
. Consumer Reports is warning people about a recent spate of phone scams with callers claiming to be agents of the Social Security Administration. These fraudsters are using caller ID spoofing to make it seem as if they’re calling from 800-772-1213. While that is the actual number for the SSA, it’s not the SSA calling.
It’s National Cybersecurity Awareness Month! One of the key themes this year is working together to improve our overall security. To that end, I’d like to focus on how you can close some common security holes in your life. Security types call this “reducing your attack surface”. One of the best ways to protect yourself
As Hurricane Florence approaches, I thought I’d share my personal checklist for preparing for the power outage that often accompanies a big storm. This isn’t just for hurricanes, though. It can apply to snow or ice storms, too. These are storms where you have at least a few days to prepare and may lose power
It’s been over two years since I published the 2nd edition of Firewalls – and this update is a whopper! The third edition is 400 pages long and has 152 tips in it (compared to 326 pages and 131 tips for the previous version). It’s the most comprehensive version yet, updated for the latest Mac,
If you have a combination printer/fax machine, your network is probably vulnerable to a single, malicious fax. A security research company named Check Point released a report last week that detailed how HP printers with built-in fax capability could be hacked by sending it a specially formatted fax. While the study focused on HP printers,
The Internet of Things (IoT) promises all sorts of cool new features for our previously "dumb" devices, allowing them to be controlled from anywhere on the planet. But because the compete on cost, security is lax or nonexistent. If you're going to bring these devices into your home, you need to keep them walled off.
Every new computer comes with one account, and most people never change that – but we all should. The default account on your computer is an administrator or “admin” account. This account has full permissions to do anything – which is convenient, but dangerous for daily use. One of the first things you should do