We talk about social engineer some in Security 101 and we talk about it a lot in Security Decoded. This week we talk about a few different methods of social engineering.
In this episode of Security 101 Mikes shows you how to use Guided Access on your iPad to help protect your iPad and your kids while they are using the iPad.
This week Mike talks about how to live privately in a social world. So your family is on facebook and all of the latest pictures of the grandkids end up on facebook but you do not want to be social and refuse to get a facebook account. You do not have to miss out, you can setup your facebook account where no one will know you are even there.
In this episode Mike provides a number of tips to help keep your kids safe while they are on the Internet.
Our last week talking about credit cards. This one stems from a friend of Mike’s posting a partial credit card image online. We also talk about the proper way to destroy a credit card.
After scaring everyone last week with the credit card skimmers this week we talk about how you can protect yourself and your credit from people that steal your information.
This week Mike covers a scary subject that most people never even think about. We cover Credit Card Skimmers this week and show you what to look for on ATM machines, at the gas pump and even when you are eating out.
We want to help you get the latest information about what is happening in security that can affect you. This week we tell you how you can stay up to date on the latest threats.
Do you install software from downloads like torrents? So many people install illegal copies of software (software not paid for). This video is not about not paying for the software but more about some security threats around installing the downloaded software.
We have all seen link shortenters around the internet, in fact if you have ever used twitter you have probably seen a ton of them. They are things like bit.ly/XT5GU7.
Link shorteners themselves are not dangerous, but what the shortened link points to can be. We talk more about these in this weeks security 101.
How many rumors and possible scams have you heard about? I am sure hundreds, everybody has. How many "wives tails" have you heard?
There is a site you can go to on the internet that keeps track of all these things so you can go get supporting or refutal evidence, etc. It is a neat site to just look through too.
Bottom line, do not trust everything you read on the internet. Give snopes.com a look.
Don't get caught by email forward scams. Also, your friends will appreciate it if you stop sending them all of the junk mail too.
This week we tell you what to be cautious of when using browser toolbars. So many people have browser toolbars stacked on top of other toolbars then complain about how slow their machine is. That is not considering what the toolbar could be tracking about you. We talk about all of this and more in detail in this episode of security 101.
This week we tell you what it means if you are getting email failures for email you did not send or someone sent you a reply to an email that you did not send.
Depending on which one you may be infected.
This week we ask you the question, where has you thumb drive been plugged in? We tell you the dangers of thumb drives and how you can stay safe when sharing files.
This week we show you how you can be a safer when posting from your IOS devices. Did you know it may be telling people where you are? We show you how to check and to stop it while leaving the the services you like that need to know where you are working.
This week we walk through how to safely setup Facebook so you are not giving out too much information to people that you do not know.
With Android the most popular smartphone operating system out there, malware authors are hitting it hard as well. There are some serious issues with Android and malware. Mostly because the android operating system is open source and the google play store is also very open.
Ransom Ware is becoming more and more popular. I recently heard someone say they paid 3 times to have their machines fixed because they got infected. What they did not realize is they were paying the very people that infected them in the first place.
This week we are going to explain Ransom Ware, some of the new and very scary techniques these malware authors are using to get money out of you.
In our very first episode we talked about drive by downloads and how they can infect your machine in just milliseconds after arriving at the site. We had questions about the drive by downloading so we are going to describe what is drive by downloading and how it puts you at risk.