Category: Technology

Topics about improving your knowledge in technology and how technology can help you improve your financial life.

  • Why Should Parents Monitor What Their Children Watch On The Internet?

    Why Should Parents Monitor What Their Children Watch On The Internet?

    The world is evolving at high speed and you can’t do something about it. Although it is hard to accept it, gone are the days when finding information on books in a library was considered as a normal activity. Nowadays, technology has taken over our lives and the use of the Internet has managed to drastically changing the way we communicate and educate ourselves.

    Over the years, adults have had to get used to the constant changes. However, today’s youth have grown up with them and understand them better. In fact, in many cases, children use computers, smartphones and tablets more efficiently than their own parents do.

    There is no doubt that free access to Internet has brought many benefits to society. Yet, such freedom can be harmful, especially for youngsters.

    Remember that during childhood and adolescence, the personality of individuals is still developing and they are more vulnerable to what is going on around them. Additionally, young people often question everything that happens to them and are impatient to feel included in their community. Therefore, Internet presents itself as the perfect opportunity to build relationships and search for answers.

    “There is no doubt that free access to Internet has brought many benefits to society. Yet, such freedom can be harmful, especially for youngsters”

    All of these reasons put them at risk of getting information that does not match their age or maturity level, which can cause serious consequences and lead to problems such as

    Cyber-bullying:

    This is a type of threat that manifests itself through social networks, chat rooms or websites. The victims of this issue often receive unpleasant messages and they made fun of in public. Also, children who suffer from cyber-bullying are subjected to daily humiliations and try to hide what happens to them. Besides, they tend to have low self-esteem, avoid going to school and are more likely to use drugs and alcohol in their adulthood.

    Do not forget that once some graphic content is uploaded to the net, it is very difficult to remove it, which can produce a major problem in the future of the affected kid. Monitoring periodically the websites that your children visit online could alert you about it, whether they are being harassed or, on the contrary, they are harassing someone else.

    Problems associated with sexual content:

    Nowadays modern kids and teens communicate with each other incessantly. However, when the information they share is too personal, it could cause some serious damages to their reputation. There are endless cases of children who send photos, videos or messages with sexual content every day. The conflict with “sexting”, as it is commonly known as, is that once something is sent, there is no control over who can see it, even if it was originally destined to one person.

    In addition, the web makes it easy to establish relationships with malicious people who may want your children to engage in risky activities or even abuse of them. Finally, the Internet provides simple access to pornographic and violent websites.

    Read also: Five Tips to Live Better and Extend Your Life

    Identity problems:

    Children tend to reveal detailed data about their lives and their families, which could lead to a serious trouble. In addition to exposing your home address and your occupations, you may also be a victim of fraud with your credit cards or your bank accounts. Besides, your child could be usurping someone else’s identity, which is a clear sign of some possible psychological problem.

    Viruses and malwares:

    Identifying unreliable websites can be a difficult task for a child, so your computer can be infected with a virus or a malware. This could cause you to lose valuable information or your computer could be completely damaged.

    Other problems such as gambling addiction, approach to illegal activities and isolation are common among young people. These are some of the steps you can take to protect them:

    – Place your computer in a visible area of the house.

    – Limit the time of use of Internet.

    – Establish some rules.

    – Review the browsing history frequently.

    Read also: Five Tips To Protect your Personal and Financial Information on The Internet and A Surprise for You.

    Monitoring what your children watch on the net is important so you can take care of their integrity, mental health and even assure his admission to college. For these reasons, you should pay more attention to them when you notice bizarre photographs or pornography on your computer, if they get calls or gifts from strangers or as soon as they have a suspicious attitude.

    Certainly, we experience changes every day so it is important that you educate your children about the dangers and risks of the real world and the digital world.

  • What Your Apps Know About You.

    What Your Apps Know About You.

    In a world where mobile security is becoming more and more important, it’s important to know what apps we install on our mobile devices can say about us. According to stats calculated by Appthority, more than 79% of all apps have hidden behaviors. As if that wasn’t bad enough, about 70% of these apps use unencrypted network services. This could mean that our there on the internet are huge amounts of personal data from people all over the globe waiting to be found.

    “More than 79% of all apps have hidden behaviors”

    Everything that is unencrypted

    What does this mean?

    Well it basically means that apps will store your data in simple text. Let’s say your password for Facebook is long and complicated, this will mean nothing if the app saves it plain text for anyone to see.  When an app uses unencrypted services, anything you enter on it can be found by someone inside your network in simple characters. From passwords, to bank accounts and any other type of data you enter on the app.

    Read Also: Keeping Your Device Clean And Virus Free

    This was a problem with both the WhatsApp and Facebook app. In WhatsApp not only was your data up for grabs, but so were all your conversations. This problem was solved last year, so think of all that time you used it.

    Next time you download an app, check its encryption services, after all you don’t want all your data out there, do you?

    Your location

    Many apps out there need to know your permission in order to offer you better services. Such as traffic and mapping apps (think Google Maps or Waze) or even dating apps like Tinder. However, many other ones ask for permission to use your location, this is because they pass it on to their advertisers. It may be for the sole purpose of knowing what crowd over the globe you are reaching whenever you advertise on said app, but this is not necessarily true.

    Unfortunately, this is almost always a package deal. Either you’re on board with apps having your location or you can’t install it at all. Our recommendation is you assess whether this app will be truly valuable to you.

    All your media files

    Another common permission request among apps is to have access to your gallery, microphone and camera. This could be as risky and all of the above. It allows apps to have an entrance to your media files and then, be allowed to share them on the internet or even delete them from your device. These could be:

    • Photos
    • Videos
    • Voice recording
    • Any other type of media file

    Read Also: Top Public Wi Fi Risks and How to Prevent Them

    It may also seem a bit fictional to spy on someone through the camera or microphone on their phone or computer, but this access will actually make it possible to do so. These apps could be able to remotely access your camera and take unwanted pictures or open your microphone and record your conversations without your even knowing. While all of this could sound crazy and paranoid, that fact is that it can happen, and hey a little precaution never hurt anybody.

    Phone and contacts

    Just like with your media files, this could potentially be very annoying and intrusive. When apps have access to your contacts, this can be used to send them information through you, whether it is malicious or not. Even more so, when they have permission to enter your phone, it can be even be used to secretly call paid numbers or undesirables.

    Don’t be the person who lets outsiders get data from all your friends by using you as an address book and be careful with what you download.

    Storage

    This is basically an enhanced version of access to your media files. If an internet enabled application can access your data, it can upload private information to a website. Dangerous as it may sound, most apps require access to storage nowadays so that they can save their own data.

    Payment Information

    Probably one of the scariest things to have in public knowledge. Many apps require for some type of payment, for extra features or just to remove adds. The thing is not all, like covered previously, are good at encrypting data and might release it every time you make a purchase. On the other hand, it could also mean that these apps save your data and make purchasing easy for anyone using your device. Which is why all over the world parents have found hundreds of dollars spent in the app stores by their children, leading up to lawsuits against companies like Apple becoming successful and having to settle for over $35 million.

    After reading this article you might want to uninstall all of your apps and become untrustworthy about downloading new ones. The truth is you just have to be careful about the developers from whom you are downloading. Trusting only the one with a good reputation or that have good reviews. On the other hand, you can also learn about permissions and access, giving you the upper hand when it comes to this.

    There are also security apps for encrypting your files, such as MobileIron or airwatch. These will make downloading and using apps much safer. In the end, being safe is as important now as it has always been, just that now there are many more ways of having undesirables reach you and this calls for attention.

  • What You Must Know About The “Wanna Cry” Virus

    What You Must Know About The “Wanna Cry” Virus

    You are probably wondering why you’ve heard the word “ransomware” a few times since last week in the news. That’s because a harmful informatic virus that goes by the name of “WannaCrypt” or “Wanna Cry” massively attacked thousands of Windows users, more than two thousand corporations and even hospitals in 170 countries around the world. Some of the affected include Telefonica, FedEx, and the National Health Service of U.K. But, how exactly does this cyber-attack work and how dangerous does it really is?

    “Ransomwares” are malwares created by computer scammers which infect you PCs, prevent you from accessing to your operating system and encrypt all the data you’ve ever stored.

    “Ransomwares” are malwares created by computer scammers which infect you PCs, prevent you from accessing to your operating system and encrypt all the data you’ve ever stored. Also, they require the payment of a ransom to remove the restriction. “Wanna Cry” functions the same way; it takes advantage of a safety gap known as “Eternal Blue” in the outdated Window’s software and gets easily into your computer. Researchers say that it is currently going through the Internet searching for vulnerable machines that can get infected. That means that you don’t even have to open a “fishing email” or a website affected by the virus to get it on your device. Removable memories and external hard drives are not out of danger either, they can also get harmed by this malware. Later, once it has taken over your data, it encrypts or “locks” all of the information making it impossible to open. Finally, your screen shows a message asking you to pay $300 in bitcoins, otherwise, your information might get lost, stolen or made public.

    “…it is currently going through the Internet searching for vulnerable computers that can get infected; that means that you don’t even have to open an email or a website affected by the virus to get it.”

    Although “Wanna Cry” has attacked mainly large companies, it is very likely that your information is vulnerable from getting stolen too.  So, how can you protect your computer from this cyber-attack? Here are some tips that will help you. 

    Update your software to Windows 10
    Believe it or not, this informatic crime could have been avoided if people had updated their softwares faster. Ever since Microsoft knew that there were some weaknesses in his old Windows’s systems, they launched a safety patch that stopped this malware from striking. So, what was the problem then? The issue was that people did not feel the need to get the latest version because they thought it made no difference. Worst mistake! If they had had Window 10, nothing would’ve ever happened to their computers. Have you updated your software yet?

    Do not open emails from strangers 
    Although this ransomware can access your information even if you haven’t clicked any suspicious link, it is important that you don’t open any message in your inbox from someone that you don’t know, especially if it has a really attractive subject. This is the classic way that cyber attackers use to make people fall into their trap so you better stay alert.

    Make backups frequently 
    The main threat of this malware is that it can erase all of the information you’ve kept for years if you don’t pay the ransom. However, if you backup all of your data frequently you won’t be so afraid of losing it. Experts recommend that you do it weekly or daily. Have you copied your data lately?

    The Worst Cyber Attacks in History.

    Heed the warnings
    Microsoft knows that there are people around the world looking forward to making enormous cyber-attacks. Therefore, they’ve come up with a big improvement in the latest Windows 10, which offer an integrated antivirus and a firewall system for all the users. The only task that you have is to keep it updated, otherwise, your computer might get the virus. When it comes to users of Windows XP or older versions, they must buy an antivirus and install it in their PCs.

    Do not show your money
    You might be tempted to pay right away with the hope of getting you information back but this is not the best solution. Authorities recommend not giving any money to this “cyber thieves” under any circumstances because they can take it and leave without releasing your files. Besides, if you lend them the payment, you’ll be encouraging this lawbreakers to do it again.
    As you can see, not only does crime happens in the real world, but it also happens on the web. Watch out!

  • Want To Get Rid Of Your Computer? Discover What You Should Do Before That.

    Want To Get Rid Of Your Computer? Discover What You Should Do Before That.

    If you are thinking of letting go of your old computer, either because it’s time for a new one, or because you simply don’t want it anymore, you might come across a few challenges.

    Remember that during the whole time you used it, you probably entered in it a great deal of valuable information, and some may still be saved in your computer. These may be anything from; passwords, bank account numbers, license keys or registration numbers of software programs, directions, phone numbers, medical information or  prescriptions, tax returns, files created automatically by browsers and operating systems, and other important data that may fall into the hands of criminals. If you don’t take the necessary precautions before you dispose of your electronic equipment, you may end up being a victim of identity theft.

    Your computer’s hard drive can be a great treasure for thieves. Why? Because a hard drive is a magnetic tool able to store data from your computer. It is one of the most important components of hardware inside your PC and is where all your important information is stored. Therefore, the first thing you should do is use a program that will clean your hard drive several times, deleting all the information it contains. To be even safer, the hard drive can be removed and destroyed.

    Remember that formatting or deleting the files from the hard drive doesn’t ensure they have been eliminated forever, for they remain on the hard drive, only they are harder to find. But an expert on the subject can retrieve them with any data recovery software. In the modern world of today, in which the technology is so advanced, there are many people looking for these opportunities to steal using virtual information that they recover, even to blackmail the owners of such information and ask for money in exchange for for the return of the information.

    Your computer’s hard drive can be a great treasure for thieves. Why? Because a hard drive is a magnetic tool able to store data from your computer. It is one of the most important components of hardware inside your PC and is where all your important information is stored.

    If you are wondering where you can find a program to completely remove the information from your hard drive, it’s very easy, these types of programs are available online as well as in computer stores. Many of those found online are free and those found in stores are usually inexpensive. When choosing the program, check if it automatically deletes everything on the hard drive or if it allows you to choose what you want to delete. At Premiere Consumer Credit Counseling, we recommend you choose a program that sweeps the hard drive several times, to avoid the recovery of the information that was supposedly eliminated. But still, the best thing you can do, to be sure, is removing the hard drive and destroying it yourself

    Read also: 12 strategies to avoid becoming a victim of identity theft.

    Don’t forget to save your information elsewhere before removing it. You can use a USB drive, CD discs, another external hard drive or your new computer if you already have one. Remember that nowadays storing information in the “cloud” is an excellent choice, which allows you access to your information for free, just by registering and establishing a password. This tool has been gaining a lot of momentum and has proven a very safe one.

    Once you have all the information that you want to keep safed elsewhere, and you are certain that the hard drive no longer contains any information, you can decide what to do with your PC.

    At Premiere Consumer Credit Counseling, we give you some ideas about what to do with your old computer:

    • Keep it: you could do this for the possibility you may be able to use some of the parts for your new computer, should it need them in time.
    • Sell it or give it away: you can access online sales sites and try to find someone interested in buying it. Or you could give it to a family member, friend or acquaintance who needs it.
    • Donate to a non-profit organization: there are social initiatives and educational institutions that do not have the resources to acquire this type of technological tool. In an act of goodwill you could donate it to one such organizations in need of it.
    • Recycle it: Many PC manufacturers can receive your old computer to recycle it and advise you in acquiring a new one of their brand. You can check with your pc manufacturer if they can receive your old computer. Before taking your old PC to the manufacturers make sure they provide the service by visiting their website or contacting them by phone.

    On a different note, it is important to take into account that many electronics contain metals that are highly harmful to the environment and must therefore be disposed of in the right way. For this reason, recycling it and leaving it in the hands of experts is a good choice. You can find more about this in the environmental protection agency where you will find information on electronics recycling programs.

    There are several methods by which you can get rid of your old computer without exposing your identity or damaging the environment. Also be mindful that you can remove the graphic card and continue using it on other computers.

    Sources,

    https://www.protecciondelconsumidor.gov/recursos/tecnologia

    https://www.consumidor.ftc.gov/articulos/s0010-desechar-una-computadora-vieja

  • Have you been a victim of the biggest data hack of history?

    Have you been a victim of the biggest data hack of history?

    If you are among the 147 million people who were affected by breach in the security system in the United States by the Equifax hack you have the right to be compensated, and we are going to tell you how to make that happen.

    Data such as names, dates of birth, driving license’s numbers, Social Security Numbers and addresses were exposed during this company hack in 2017. This situation led Equifax to convey an agreement with the Federal Commerce Commission, the Financial Protection Office and 50 states and territories in the U.S. that might include up to $425 million dollars to repair damages to victims. If you are part of these mentioned group you can make your claim through this website: www.equifaxbreachsettlement.com and must do it before January 22nd, 2020, last valid date to make all claims. Nonetheless, it is important for you to keep in mind that the administrator will not be given any benefits until the case is properly reviewed by the court, and these results may come to you after January 23rd, 2020, after all claims are received.

    Affected parties may receive the following benefits:

    1. The company will handle all credit supervision and protection against identity theft, these services will be given for free and includes at least four years of supervision of your reports at all three credit offices (Equifax, Experian and TransUnion), a $1,000,000 insurance policy against identity theft and up to six more years of free report supervision on Equifax, so this benefit could extend for up to ten years.

    2. If you were underage at May 2017, you could have access to an eighteen years’ free credit report supervision.

    3. If, because of the breach, you were forced to make honorary payments to professionals such as lawyers and accountants, or paid notary costs, shipping for documentation for frozen or to unfroze credit reports, credit report supervision, etc. you can make the claim. (limit 20,000$ per person). For the reimbursement of your money you could ask for a check or inform that you would rather receive these money on your debit card once the court rules in your favor.

    4. You can also make claims for the time spent doing procedures and processes, although you must deliver details of the actions you performed and show proof that demonstrates they made improper use of your information.

    In case you have been affected you can communicate to the administrator of the agreement at the line 1-833-759-2982, where you will be explained how can you access for free to the identity restauration services.

    How to get Free Credit Reports?

    If you are a United States citizen you could access 6 credit reports every year for seven years, but this will take place after January 2020 through the Equifax website.

    Remember to register your email to receive updates and reminders at the beginning of the mentioned year. Additionally, you will get an activation code with instructions. You can choose to receive this code via email, or in your home’s mailbox when you present your claim.

    Is it true that you can apply for 125.00 USD instead of receiving Free Credit Scores? 

    You can, but keep in mind that the full amount for these alternative reimbursements is $31 million, which will imply that every person soliciting this amount will get a very small amount of money. For this reason, it is recommended to apply for the free credit reports.

    If you already presented your claim and filed the $125.00 petition but you want to change your call you can! As an answer to your query you will get a confirmation email, replying to that email you can ask for the change.

    For more information go to www.equifaxbreachsettlement.com or call 1-8330759-2982

  • Top Public Wi Fi Risks and How to Prevent Them

    Top Public Wi Fi Risks and How to Prevent Them

    We all know how convenient it is to arrive at the nearest coffee shop, tap into the Public Wi Finetwork and start checking our mail,or how useful it is to sort out a thing or two from work while we wait for our flight to be called, taking advantage of the airport’s free wireless service. However, this convenience is precisely what keeps us from realizing how dangerous these Wi Fi hotspots can turn out to be. This doesn’t mean we shouldn’t use them; it merely points out the needwe have of knowing how they work, which are the risks associated with them and how to prevent any misfortune from happening.

    The freedom offered by Wi Fi technology is a double-edged sword and is up to the users to do whatever they can to protect themselves.

    How does Wi Fi work?

    Wi-Fi is the name of a commercial brand that designates a technology able to link computers (and mobile devices) without wires for data transferring.

    In order to accomplish this, the computer’s wireless adapter transforms data (which is originally in a binary code) into radio waves. This signal is then transmitted by an antenna to a wireless router that translates it again to binary code and sends it to the Internet through a physical connection. The same process applies the other way around.

    “The freedom offered by Wi Fi technology is a double-edged sword and is up to the users to do whatever they can to protect themselves”

    Having said that, we can understand how easy it can be to intercept that stream of data that “floats” around when we sign in a public wireless service.

    Today, anybody with a Wi-Fi equipped laptop can download a Wi-Fi monitoring program for free and start watching (and stealing) the data traffic that takes place in one of these wireless hotspots (coffee shops, airports, hotels and others), even from 100 feet away.

    Also, there is the risk of running into an “evil twin” or “spoof”: hackers equipped with off-the-shelf routers that can set up a fake Wi Fi signal that mimics popular paid services, luring unaware users into connecting to them. Then the hacker can watch all Internet traffic and even ask for credit card information, posing as any kind of deal that requires a payment in order to access it.

    That is what it boils down when it comes to signal interference. However, another factor comes into play to make matters even more delicate. Since public Wi Fi networks are almost always unencrypted (encryption being the process by which the transmitted data gets translated into a special code that only your computer and the server can understand), it is even easier for a crook to take advantage of any information that he or she could steal along the way.

    Top Safety Tips:

    Identifying Rogue Access Points

    Let’s say you go into your nearest coffee shop, turn on your laptop and the first thing that pops into your screen is a “free” Wi Fi network inviting you to connect to it. Before you do so, look around and see if there is a sign that advertises such a service. If there isn’t, chances are you are in the presence of a spoof, intended to attract the incautious.

    Also, if your Web browser says the security certificate is invalid or if a prompt asks you to re-enter your user name, log off and shut down your computer.

    Finally, connect only to a Wi Fi service that is protected by a password, even if you have to pay for it. This does not guarantee your safety (remember that these passwords are shared and anyone can access the network), but it is definitely safer than an unprotected service.

    Avoid Visiting Certain Websites

    Even if you’ve confirmed the soundness of the public network you are connecting to, you should restrain yourself from visiting websites that require a username and a password to log in, such as social networks and financial institutions. It’s just better to wait until you are in a private and secure network to do so.

    Read also: 10 Actions You can Take Right Now To Improve Your Computer Security: Am I really at risk?

    You should also use a secure browser connection. You can verify this by looking for the “https” protocol on your address bar. If it does appear,it means that the communication between your browser andthe serveris protected by some kind of encryption, although not every site offers this option.

    Use Your Own Encryption Software

    As we have said, not every webpage offers the secure https option. But you can use other encryption options, such as aVirtual Private Network or VPN.

    VPN is softwarethat allows you to encrypt your data traffic, with the following advantage: https is only applicable to your browser-based traffic while, with VPN, all traffic from any application in your computer is encrypted.

    Read also: Five Tips To Protect your Personal and Financial Information on The Internet and A Surprise for You.

    Personal VPNs can be found on the web, but you should expect to pay a small amount for their usage.

    Extra Safety Tips

    – Turn of any sharing option that could be used to access your computer.

    – If your computer has firewalls, use them.

    – Create a strong, random password and change it often. Also, avoid using the same password for more than one website or application.

    – For instant messaging, use a service that secures your chats, like Skype and Google Talk.

    At Premier Consumer we hope to have given you the necessary tools to make your online experience more productive andsafe.

  • Tips To Keep You Safe When Using Online Banking

    Tips To Keep You Safe When Using Online Banking

    Online Banking is nowadays one of the fastest, easiest ways to manage bank accounts. You only need a computer and internet access to get all its benefits. However, there are many security-related aspects to consider while doing so. There are plenty of fraudsters and hackers right now and being 100% safe from them is almost impossible. However, for that reason, many banks all around the world are investing huge amounts of money to develop safer online platforms to ensure that you and your money are safe from fraud.

    Banks use high technology systems to encrypt your personal information at the time of registration and logging in, transforming it into scrambled codes that are almost impossible to decipher. They also provide automatic log out after a period of time without activity in the site and blockage of users after three incorrect log in attempts are made. However, despite everything they can offer in terms of security, they encourage customers to take additional actions to reinforce your privacy and security at all levels.

    “Many banks all around the world are investing huge amounts of money to develop safer online platforms to ensure that you and your money are safe from fraud”

    At Premier Consumer, we offer you a detailed list of important tips to keep you safe when using Online Banking:

    • Create stronger (i.e. longer and difficult to guess) passwords that contain at least eight characters and a mix of capital letters, numbers and symbols.
    • Change your passwords constantly. Some banks will ask you to change your passwords since they have a working timeframe of around three to six months.
    • Do not use the same username and password for all your online banking accounts. In case someone discovers that information, they will have access to virtually everything
    • Do not set your Social Security number, credit card number, ID or personal identification number PIN as your password.  This information is relatively easy to find, and if someone does it, someone may try to use it to access your accounts.
    • It is never advisable to write down your passwords, but if for any reason you need to do it, write them somewhere only you know where they are. Anyhow, never write them on your phone because it is not considered a safe place to do so.

    Tips And Tricks To Protect Your Children On Internet.

    • Do not respond to emails that seem to be sent from your bank asking to send them information regarding your online accounts. Banks will never ask you for your usernames or passwords this way.
    • Cancel your cards immediately if they happen to get lost.
    • Ignore any type of phone calls asking you to transfer your money to another account for “security reasons”.
    • Try not to download attached files sent from strange or unknown sources. These kinds of files usually have viruses that can destroy your computer and access your personal information.
    • Same thing goes with links. Do not click on them if you are unsure about them or if you suspect that they are viruses.
    • Pay attention when your internet browser shows a warning sign. A safe webpage will show on the browser’s search bar a padlock icon over a green background.
    • Protect your computer with the best antivirus and antispyware software. Some of them even include firewalls. There are viruses all over the web that can steal your information or damage your electronic devices, so is better to be safe than sorry.
    • Also, remember to update your antivirus regularly since new viruses are spread quickly.
    • If you are an avid user of smartphones, secure it with a screen lock. This will help you to keep safe all the information you have there in case you lose it.
    • Be careful with how much information you are sharing on social media.
    • Only use your personal computers. Avoid logging in from internet cafes or any other unknown computer.
    • Do not download applications and software from unreliable sources. Only download from certified and verified pages or “App Stores”.
    • Read the Privacy Policies of Webpages and apps to ensure that your personal information is safe.

    Mobile Banking Apps: What They Are and How You Can Start Using Them Safely

    These tips are not here to scare you; on the contrary, they are here to keep you aware of the things you have to do in order to use your Online Banking accounts safely. By following all these security tips, you will be protecting your personal information from getting lost or stolen.

  • Tips To Generate Passwords

    Tips To Generate Passwords

    As users, the only way to keep our networks safe is through the use of secure passwords, so we need to create different passwords to maintain the privacy of our information, from social networks to bank accounts.

    Most users don’t spend enough time to create safe passwords, which is a huge mistake. We have to acknowledge that our passwords give access to a great amount of valuable information, and if we only create simple passwords for us to remember them, it will also be easier for others to discover them, and compromise our private information.

    Most users don’t spend enough time to create safe passwords, which is a huge mistake. We have to acknowledge that our passwords give access to a great amount of valuable information, and if we only create simple passwords for us to remember them, it will also be easier for others to discover them, and compromise our private information.

    Also, we have to take into account that even if some passwords guard information that we don’t consider too valuable, if stolen, it could lead people to access the sites that do represent losses to us as users, this is why we need to create safe passwords and give them the importance they deserve.

    Read Also: How Criminals Target You At ATMs

    There are many different ways to create safe passwords. Down below, there will be presented some tips to generate safe and easy to remember passwords:

    Don’t use the same password to all of your sites
    If we use the same password for all of our networks and sites, it only takes one guess for other users to have access to our private information, which is why it’s recommended to create a different password for each portal.

    Don’t use personal information
    When generating a password, users usually use personal information to remember it easily, but this shouldn’t be done, because anyone who knows you or anyone who can see your information in any social network will be able to discover your passwords and compromise your private information.

    Convert the vowels into numbers
    A very popular trick that can be used to create safe and strong passwords is converting the vowels into numbers. You can use a word or phrase that means something for you and replace the vowels with numbers that represent the vowel, for example, let’s say your password is “Volleyball”, after replacing the vowels for numbers it would be “V0ll3yb4ll”, which will make your password stronger and secure.

    Only use vowels or only use consonants
    Another hack you can use to create passwords that are more difficult to decipher is to only use vowels or consonants. For example, let’s say our password is “Hauntedyard”, if we eliminate the vowels we would get “Hntdyrd”, or if we eliminate the consonants we would get “Auea”, which will make our passwords harder to discover, but easier to remember by  following the pattern.

    Use the name of the site as part of your password
    If you have trouble remembering to which site or network belong each password, you can include the initials of the site. For example, if the password belongs to Facebook, you can use FB at the beginning or at the end of it; this will help you keep your passwords organized and you won’t forget to which site they belong.

    As a last resort, you can use a password generator
    There are many password generators online. These systems allow you to choose the type and length of the password you wish to create, and an algorithm picks randomly the characters, generating a unique and strong password.
    There are diverse tricks that can be used to create safe passwords, and there are many more, like mixing letters and numbers, using numbers and special characters, etc. The important thing to remember is that generating strong passwords is vital for us to safeguard our private information, and if we don’t do it right we can compromise and lose our money.

    Read also: 10 Actions You can Take Right Now To Improve Your Computer Security

  • Tips And Tricks To Protect Your Children On Internet.

    Tips And Tricks To Protect Your Children On Internet.

    Internet has become an essential tool, not only for adults but for minors as well. As for the kids, Internet is a necessary tool for doing their homework. Through netsurfing they are capable of checking on virtual encyclopedias and libraries, among other websites, which have the resources they need in order to resolve their concerns. It is even used very often to play and interact with people of different nationalities.

    Many parents have warned their children about the hazards of speaking to strangers, giving information when they receive calls, let strangers enter the house when an adult is not at home. They even monitor the TV shows their children see, the books they read, or the magazines they get into their hands. However, such supervision must be applied to the websites their children visit on Internet, and warn them about the risks they might face on the web.

    Internet’s growing use by children involves real and dangerous risks. This is the reason why it is imperative that you, as an adult, make safe and responsible decisions to keep children away from becoming victims of the wrong use of this tool. Keep in mind that not everything you find on Internet is reliable, and children have access to loads of information, therefore, they must be warned, especially for the interaction they might have with other users. In many cases, your children might believe they are talking to another child, but they are actually chatting with an adult who is cheating on them.

    10 Actions You can Take Right Now To Improve Your Computer Security: Am I really at risk?

    Remember, children are going through that stage in which they are constantly eager to satisfy their curiosity, explore, learn and discover the world. Internet is the tool they make use of for this purpose. However, they might find adult contents, in which they could have access to pornography, violence or direct relationships with adults.

    “Internet’s growing use by children involves real and dangerous risks. This is the reason why it is imperative that you, as an adult, make safe and responsible decisions to keep children away from becoming victims of the wrong use of this tool.”

    As a parent, it is important to be aware of the existence of the National Bureau of Consumer Protection, which enforces and ensures the compliance with the Children’s Online Privacy Protection Act or its acronym COPPA. This act states that websites operators must notify the parents and seek for their consent before and whenever they request, use or reveal the personal information of a child. Through this law, you will have control over the information that your children provide. Likewise, you will be able to cancel the permission when you deem this necessary.

    The Children’s Online Protection was passed on October 1998. It stated that if Internet was used to communicate harmful material to minors, it must be consider as a federal offense. For this reason, websites with adult content are legally bound to restrict the access to minors.

    Five Tips To Protect your Personal and Financial Information on The Internet and A Surprise for You.

    Some tips to protect your children from the Internet hazards are listed below:

    • Set limits: Do not let your children stay long periods of time surfing on the web. You might set up schedules.
    • Sound communication with your children: Talk to them and explain to them that online conversations are not safe, and that people not always show their real identity. Explain to them that meeting in person with people they have met online is dangerous.
    • Do not allow your children to access to credit card numbers and passwords: Teach them that they do not have to provide such kind of information, neither personal data.
    • Limit the connection service on line: Children will not have access to inappropriate websites. Check with your service provider the available lock-out options. You might also block them through the safety measures of your ISO or OSP.
    • Do not let your child to create an email account without supervision: Once you consider your child is mature enough to have an email account, help him or her to sign in, and keep always an eye on the inbox and outbox of the account.
    • Control of the external computers use: Remember that the computer at home is not the only one your children might have access to. For this reason, you must teach them how to properly use any other computer.
    • Websurf with your children: Spend some scheduled time on Internet with your children, show the websites to do research for their homework, the right sites to play and keep them away from chatrooms. Let them show you the websites they visit regularly or those that are mostly mentioned among their friends.
    • Be careful with discussion groups: Children frequently become the target of sexual offenders on these sites.

    You can always teach your children to have a safe surfing.

    Source:
    https://www.consumidor.ftc.gov/temas/seguridad-de-los-ninos-en-internet
    https://www.consumidor.ftc.gov/articulos/s0030-ninos-y-mundos-virtuales

  • The Worst Cyber Attacks in History.

    The Worst Cyber Attacks in History.

    Let’s be honest, in today’s world we should all be afraid of hackers. They can easily take advantage of weak passwords and poorly maintained computer systems to steal confidential information, hijack your identity or -if they get access to your financials- steal your money. But for some hackers, gaining access to personal accounts is not enough, so they target governments and huge corporations, either to rack profit for themselves or wreak havoc on their enemies

    “for some hackers, gaining access to personal accounts is not enough, so they target governments and huge corporations”

    In this article, Premier Consumer provides some of the biggest computer attacks on record:

    Sony Entertainment Pictures

    In October 2014, employees at Sony Pictures found that they couldn’t access their computers, instead, all they saw on their screens was a glowing red skull and the words “Hacked by #GOP”. Calling themselves the “Guardians of Peace”, the hackers threatened to release a vast amount of the internal company data unless their unspecified demands were met. It was thought that the hack was related to their soon-to-be-released comedy, “The Interview” (which mocks North Korean leader Kim Jong-un), Sony was forced to cancel the movie’s theatrical release.

    Despite this, hackers released the sensitive data, allowing newspapers and competitors to dig into the company’s inner workings and peek into their future projects. This was a disaster for the company, but there’s a silver lining, the publicity generated by the attack made “The Interview” a top-selling movie in online stores, allowing Sony to break even on the movie despite having launched the movie in only a few theaters.

    Home Depot

    This attack targeted Home Depot’s payment data, gaining the hackers access to over 56 million credit cards stored in the retailer’s systems. The numbers and identifications of these cards became available to the hackers after they introduced custom-made software to the company’s system.

    The hack remained in Home Depot’s computers from April until September of 2014, collecting data for the hackers, who appear to be from Eastern Europe. It targeted the self-checkout counters at their stores in the United States and Canada.

    The company took measures to contain and counteract the attack once it was discovered, offering free credit monitoring for clients who had bought in their stores since April. However, as it happens with breaches of this nature, trust in the company’s ability to protect customer data took a serious hit.

     TJX

    The Home Depot hack was huge, but it’s not the biggest we’ve seen. In 2007, TJX, the close relative like Marshalls and T.J. Max, admitted they had suffered a breach that compromised the information on 94 million credit cards.

    Hackers had been taking information since 2003, when they accessed TJX’s network by intercepting wireless communications in two Marshalls stores in Miami. Even though some people were charged for using credit cards loaded with the stolen data, the hackers themselves were never found.

    Read also Top 12 Strategies to Avoid Identity Theft

    Settling with the affected customers cost TJX around $256 million, but analysts estimated that the actual cost to the company may have reached up to $1 billion, including other legal settlements and lost sales.

    Saudi Aramco

    This is widely regarded as the biggest computer hack in history. It targeted the Saudi oil company Saudi Aramco, one of the largest in the world (it provides around 10% of the world’s oil production), and managed to disrupt their operations for five months.

    The hack infected the company’s millions of computers because one of its IT employees opened a spam e-mail. Once most of the employees were out on holidays, the attack kicked into gear, wiping or completely destroying most of Aramco’s computer systems.

    The company had to buy massive amounts of new hard drives, managing to partially disrupt the world’s supply (in fact, if you bought a hard drive between September 2012 and January 2013, you paid a slightly higher price for it because of this).

    Read also 10 Actions You can Take Right Now To Improve Your Computer Security: Am I really at risk?

    A group calling themselves “Cutting Sword of Justice” claimed responsibility for the attack, stating they did it because of the company’s support of Saudi Arabia’s authoritarian regime. The company managed to continue pumping oil throughout the ordeal, but they were forced to do their administrative work on paper for months.

    What Do You Think About Hackers?

    We should all be afraid of hackers, and for good reason, so make sure to do everything you can to protect yourself. If you just manage your private accounts, you’ll probably be fine as long as you keep some basic security measures, like creating secure passwords, keeping your software updated and ignoring spam emails. However, if you are managing a company that depends on the use of computer systems, then you must make sure to invest in computer security. That way you will protect your company’s systems from damage, keeping your confidential information private, your operations uninterrupted and your mind at peace.