Posts tagged "Mobile"

Mobile Security Webinar: Defending Your Digital Devices (8/15/13)

Screen Shot 2013-08-14 at 11.07.21 AM

Mobile Security Webinar: Defending the Devices that Power Your Productivity

Admit it. You compute almost as much on mobile devices as you do on your main computer. You are hyper efficient because you are always connected. You read work emails on your iPhone or Droid, log in to sensitive Internet accounts via iPad and store mission critical files on your laptop. Thanks to the independence, flexibility and efficiency afforded by mobile gadgets, desktop computing is quickly becoming an outdated notion. To remain nimble and relevant, you must be able to connect, communicate and compute from anywhere.

Register Now

But along with the rewards of freedom, mobile computing also comes with risk. Small devices are easier to lose, simple to steal and targets for data theft. Here’s the good news: Deluxe can help you stay one step ahead of the hackers, competitors and criminals looking to use your data to drive their profits.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Mobile Apps Turn Smartphone Into Weapon

You and I have come to think of our Smartphones as indispensable tools. Flaws recently discovered in mobile apps for Facebook, Linkedin and Dropbox could turn our tools into weapons by exposing us to data theft at many levels, including personal identity theft and corporate data loss.

Taking  extra precautions now will protect not only your Smartphone but other devices, too, as the flaw may well be present in other mobile applications including many iOS games.

Apparently, Facebook’s iOS and Android apps don’t encrypt their users’ login credentials. These flaws expose users to identity theft by saving user authentication keys (usernames and passwords) in easily accessible, plain text files. These unencrypted files may be stolen, transferred to another device in a matter of minutes, and used to access the victim’s accounts without ever having to enter any user login credentials.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , ,

ID Theft – Five Tips for Vacation Protection

Holiday travel brings various levels of challenge and stress. Don’t let identity theft risk add to your anxiety.

Here are five tips to help you to avoid becoming a victim while on vacation:

1. Stop your mail and newspaper. Avoid letting un-invited credit invitations sit in your mail box. You can stop your mail by phone or online at usps.com. Also, ask a trusted neighbor to watch for package & parcel deliveries and to hang on to them until you return. If you receive a daily newspaper, put your subscription on hold. A pile of un-retrieved newspapers in your driveway is a “Welcome” sign to thieves.

2. Don’t advertise that you’re on vacation. Make sure if you are going to post vacation updates on your e-mail, on social networking websites, or on your voice mail greeting, that you post generically, no specifics. Put a few lights on timers so that your home doesn’t look unoccupied for the entire time you’re gone. Replace the front porch light bulb.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , ,

Are Mobile Banking Apps Safe and Secure? Not Yet | Sileo Group

mobile banking apps

A study produced by The Ponemon Institute and ThreatMetrix (Mobile Payments & Online Shopping – October 2011) states that only 29% of consumers use mobile banking apps on their smart phones and tablets. Of those that don’t participate, 51% cite security reasons for their lack of participation. In other words, consumers like you and I are not yet comfortable with mobile banking apps safety. And our instincts are correct! Why shouldn’t you be comfortable with mobile banking apps quite yet?

Top 7 Reasons Why Mobile Banking Apps Aren’t Safe (Yet)

  1. Because most app stores (e.g., Android Marketplace) don’t review apps for security, it is very easy for criminals to post malicious apps that steal information from your mobile device (like your bank account numbers).
  2. The average smartphone or tablet user has installed no security software on their mini-computer (that’s what smartphones and tablets are), meaning that they have only a fraction of the security of a laptop or desktop.

Posted in Cyber Data Security by Identity Theft Speaker .
Tags: , , , , ,

Is Your Wireless Carrier Tracking Your Surfing Habits (Maybe)

Oh what your mobile phone carrier knows and tracks about you! A one-page document from the Justice Department‘s cybercrime division shows how cell phone companies record and retain your call and surfing activity (calls, text messages, web surfing and approximate location). Here’s a summary of how each company retains your information (full details in the image below):

  • Verizon Wireless – rolling one-year records of cell tower usage & what phone accessed what web site
  • AT&T / Cingular – ongoing records of cell tower usage since July of 2008
  • T-Mobile USA – doesn’t keep any data on Web browsing activity
  • Sprint Nextel’s Virgin Mobile – 3 month record of text content
  • Other than Virgin Mobile and Verizon, none of the carriers keep texts but they keep records of who visited a particular web site.
  • Verizon keeps some information for up to a year that can be used to ascertain if a particular phone visited a particular Web site

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , ,