Purpose

Dedicated to helping people make themselves safe and their Homes harder targets,...or when James Bond meets Soccer Mom




Wednesday, December 1, 2010

Personal Security - Protect against Electronic Vehicle Theft

A friend of ours sent us this information and asked us to post it for everyone's benefit.

How to Lock Your Car and Why.

I locked my car. As I walked away I heard my car door unlock. I went back and locked my car again three times. Each time, as soon as I started to walk away, I would hear it unlock again!!

Naturally alarmed, I looked around and there were two guys sitting in a car in the fire lane next to the store. They were obviously watching me intently, and there was no doubt they were somehow involved in this very weird situation. I quickly chucked the errand I was on, jumped in my car and sped away. I went straight to the police station, told them what had happened, and found out I was part of a new, and very successful, scheme being used to gain entry into cars.

Two weeks later, my friend's son had a similar happening.... While traveling, my friend's son stopped at a roadside rest to use the bathroom. When he came out to his car less than 4-5 minutes later, someone had gotten into his car and stolen his cell phone, laptop computer, GPS navigator, briefcase.....you name it. He called the police and since there were no signs of his car being broken into, the police told him he had been a victim of the latest robbery tactic -- there is a device that robbers are using now to clone your security code when you lock your doors on your car using your key-chain locking device..

They sit a distance away and watch for their next victim. They know you are going inside of the store, restaurant, or bathroom and that they now have a few minutes to steal and run. The police officer said to manually lock your car door-by hitting the lock button inside the car -- that way if there is someone sitting in a parking lot watching for their next victim, it will not be you. When you hit the lock button on your car upon exiting, it does not send the security code, but if you walk away and use the door lock on your key chain, it sends the code through the airwaves where it can be instantly stolen. This is very real. Be wisely aware of what you just read and please pass this note on. Look how many times we all lock our doors with our remote just to be sure we remembered to lock them -- and bingo, someone has our code...and whatever was in our car.

Sunday, November 28, 2010

Personal Security- ATM Frauds

From an article titled "ATM Fraud Gets Even More Brazen"
by Karen Blumenthal, November 27, 2010

Fraud involving debit cards and personal-identification numbers is on the rise as criminals go where the cash is—even targeting banks' own automated teller machines.

Techniques such as "skimming," in which criminals capture card information and personal-identification numbers, have existed for years, often on a small scale. Though the dollar losses still are relatively modest, organized gangs now are pulling off more-sophisticated attacks.

They also are targeting bigger players: Whereas most of the fraud in previous years took place at independent ATMs or at retail points of sale, fraud at bank-owned ATMs made up more than 80% of the breaches in the first six months of this year, says Fair Isaac, which provides fraud-detection software.

Europe, which has faced a bigger problem than the U.S., saw card-skimming ATM attacks jump 24% in the first six months of this year, to 5,743, the largest six-month number since data-gathering began in 2004, according to the European ATM Security Team, a nonprofit group. (Losses from skimming fell 8%, to €144 million, or $197 million.)

Attacks on retailers continue to climb as well. Last month, supermarket chain Aldi said it had discovered that payment terminals in major U.S. cities in 11 states had been altered to allow the skimming of card numbers, cardholder names and PINs between June 1 and Aug. 31 this year.

Avivah Litan, fraud analyst at Gartner, a research firm, estimates that fraud involving debit cards, PINs and point-of-sale equipment has surged 400% over the past five years. One tactic, she says, has been "flash attacks": Using the stolen information, gangs create thousands of counterfeit debit cards and then dispatch cronies to at least 100 ATM machines in several cities at once. Each withdraws a small dollar amount from several accounts to avoid fraud-detection software, adding up to tens of thousands of dollars in losses.

Until recently, skimming equipment was relatively crude and clunky, attached to card-readers with double-stick foam tape and relying on small cameras to record hands punching in PINs. Newer devices include equipment that fits inside card readers, pinhead-sized cameras and well-crafted attachments that sit snugly on top of ATM card readers and PIN pads, looking just like the real equipment. Bluetooth technology allows the fake card reader and PIN pad to talk to each other, and data drives or wireless technology can make downloading of stolen information quick and easy.

Given such clever engineering, consumers may not be able to tell that a machine has been compromised. Banks may not know either: Fair Isaac says that perpetrators of such fraud often place skimmers on outdoor ATMs on Saturday mornings and remove them before the bank opens Monday. The data is typically passed to crooks in another country within hours.

Better technologies are available: Canada and several European countries, among others, have adopted so-called chip-and-PIN debit cards, with chips built into the card, adding a layer of protection. But American banks and retailers have resisted adopting the technology because it is expensive to replace cards, ATMs and point-of-sale machines.

The chip-and-PIN technology isn't foolproof, and experts say U.S. banks and retailers may instead leapfrog that technology, possibly by using the capabilities of smartphones to verify transactions or to actually make the transactions instead of using a card.

Given scammers' growing sophistication, consumers are at a disadvantage. But there are some steps you can take—beyond becoming an expert in equipment design and appearance—to avoid the traps or lessen the impact if your information is stolen:

• The simplest protection, says the American Bankers Association, is to get in the habit of covering up your hand when you enter your PIN so that a camera can't record what you are typing.

• Use an indoor ATM. Because they are less isolated, indoor ATMs are less likely to be tampered with than outdoor machines.

• Use your PIN sparingly at retailers, and choose the signature option—or a credit card—instead, Ms. Litan says.

• If you don't have time to check your bank account regularly, set up email or text alerts to send you balances weekly or, if you are particularly paranoid, daily, so that you will know sooner if something is amiss. Most banks will refund your losses promptly, but you need to report the violation quickly, preferably within two days and no later than 60 days after receiving a statement showing the fraud.

• You should add your bank's and credit card's customer-service numbers to your contacts so you can access them from both your email and cellphone. Having the numbers at hand will eliminate the frustration of trying to find them when you are traveling or at a public computer.

• If your bank suspects fraud, it needs to be able to reach you quickly. Make sure it has your cellphone number as well as your email address and that your other information is up to date. Taking my own advice, I discovered that my bank had home and work phone numbers that were more than a decade out of date.

Tuesday, November 23, 2010

Internet Security - The 12 Cyber Scams of Christmas

Christmas Season is upon us,...let's not let down our guard. Be safe by being informed.

By Suzanne Choney from msnbc.com November 16, 2010

http://www.msnbc.msn.com/id/40218820/ns/technology_and_science-tech_and_gadgets/

Shoppers looking for holiday bargains are already scouring the Web as well as incoming e-mails and text messages for deals — and cyber criminals are quite busy, too, hoping to lure you in with a deal that seems too good to be true.

"We’re all looking for a great deal online, but some sites offer electronics or luxury goods at prices that are too good to be true," said Alison Southwick of the Better Business Bureau.

"Every holiday season BBB hears from holiday shoppers who paid for a supposedly great deal online, but received nothing in return." (For more tips on shopping safely online, see the BBB's list here.)

Security software company McAfee recently released its "12 Scams of Christmas" list, and offers of "free" iPads — among this year's most coveted tech gadgets — comes in at No. 1.

"With Apple products topping most shopping lists this holiday season, scammers are busy distributing bogus offers for free iPads" via e-mail spam, McAfee said.

In the e-mail, "consumers are asked to purchase other products and provide their credit card number to get the free iPad. Of course, victims never receive the iPad or the other items, just the headache of reporting a stolen credit card number."

Meanwhile, in the Facebook, Twitter or other social media version of the rouse, users are asked to "take a quiz to win a free iPad and must supply their cell phone number to receive the results. In actuality they are signed up for a cell phone scam that costs $10 a week," McAfee said.

Here's the rest of the company's "12 Scams of Christmas" list:

2. "Help! I’ve Been Robbed" — "This travel scam sends phony distress messages to family and friends requesting that money be wired or transferred so that they can get home."

We and other news organizations have written about this before, especially as an issue on Facebook, where people feel like they trust information that's posted. With so many people traveling during the holiday season, though, it's easy to fall prey to this one.

3. Fake gift cards — Social media (Facebook, Twitter, MySpace as examples) are used by no-goodniks to "promote fake gift card offers with the goal of stealing consumers’ information and money, which is then sold to marketers or used for ID theft," says McAfee.

"One recent Facebook scam offered a 'free $1,000 Best Buy gift card" to the first 20,000 people who signed up for a Best Buy fan page, which was a lookalike. To apply for the gift card they had to provide personal information and take a series of quizzes."

4. Holiday job offers — Maybe for some, the recession is over, but not for many of us still. Which is why "as people seek extra cash for gifts this holiday season, Twitter scams offer dangerous links to high-paying, work-at-home jobs that ask for your personal information, such as your e-mail address, home address and Social Security number to apply for the fake job."

5. "Smishing" — You've heard of phishing? "Smishing" is when a phishing SMS, or text messages, arrives on your cell phone, wanting you to bite.

"These texts appear to come from your bank or an online retailer saying that there is something wrong with an account and you have to call a number to verify your account information. In reality, these efforts are merely a ruse to extract valuable personal information from the targets," McAfee says.

"Cyber crooks know that people are more vulnerable to this scam during the holiday season when consumers are doing more online shopping and checking bank balances frequently."

6. Suspicious holiday rentals — Many of us are looking to save on that Christmas-y cabin in the mountains or chic vacation apartment in the city of our dreams. "During peak travel times when consumers often look online for affordable holiday rentals, cyber crooks post fake holiday rental sites that ask for down payments on properties by credit card or wire transfer."

7. Recession scams continue — "Scammers target vulnerable consumers with recession related scams such as pay-in-advance credit schemes. McAfee Labs has seen a significant number of spam e-mails advertising pre-qualified, low-interest loans and credit cards if" — that emphasis is mine —"the recipient pays a processing fee, which goes directly into the scammer’s pocket."

8. Grinch-like greetings, involving e-cards — Electronic cards can save paper and postage, but "cyber criminals load fake versions with links to computer viruses and other malware instead of cheer ... Computers may start displaying obscene images, pop-up ads, or even start sending cards to contacts that appear to come from you."

9. Low price traps — Discussed above, as the "too good to be true" deals, which are promoted on some auction sites and fake websites, McAfee says, "with the goal of stealing your money and information."

10. Charity scams — "Common ploys include phone calls and spam e-mails asking you to donate to veterans’ charities, children's causes and relief funds for the latest catastrophe."

11. Dangerous holiday downloads — "Holiday-themed screensavers, jingles and animations are an easy way for scammers to spread viruses and other computer threats especially when links come from an e-mail or IM that appears to be from a friend."

12. Hotel and airport Wi-Fi vulnerabilities — This is an anytime risk with thieves who are savvy enough to hack into public networks being used by hurried travelers. Hacker-thieves can steal credit card numbers, bank accounts and other forms of personal identity; try not to access bank accounts, for example, or give your credit card number online while using public Wi-Fi. It's a good anytime rule — not just for the holidays.

Wednesday, November 17, 2010

Internet Security - FEDEX, UPS or USPS E-Mail Virus

It has came to our attention that there is a new e-mal virus making the rounds,...

United Parcel Service, U.S> Postal Service and/or Federal Express E-Mail Virus

With Christmas coming up, I can see where this could be a real problem.
The newest virus circulating is the UPS/Fed Ex Delivery Failure. You will receive an e-mail from UPS/Fed Ex Service along with a packet number. It will say that they were unable to deliver a package sent to you on such-and-such a date. It then asks you to print out the invoice copy attached. DON'T TRY TO PRINT THIS. IT LAUNCHES THE VIRUS!

*Pass this warning on to all your PC operators at work and home.*
This virus has caused Millions of dollars in damage in the past few days.

Tuesday, November 9, 2010

Personal Security - Jury Duty Scam

Pass this on to all you know. This has been verified by the FBI, link provided at the bottom of this post).

This cam is spreading so fast, you need to be prepared should you get this call. Most of us take those summonses for jury duty seriously, but enough people skip out on their civic duty that a new and ominous kind of fraud has surfaced.

The caller claims to be a jury coordinator. If you protest that you never received a summons for jury duty, the scammer asks you for your Social Security number and date of birth so he or she can verify the information and cancel the arrest warrant. Give out any of this
information and bingo, your identity was just stolen.

The fraud has been reported so far in 11 states, including Oklahoma, Illinois, and Colorado.

This (swindle) is particularly insidious because they use intimidation over the phone to try to bully people into giving information by pretending they are with the court system.

The FBI and the federal court system have issued nationwide alerts on their web sites , warning consumers about the fraud.

Check it out here at the FBI site.

Protecting yourself is the key: Never give out personal information when you receive an unsolicited phone call.

Sunday, November 7, 2010

Personal Safety - The New Cardio Pulmonary Resuscitation

Do CPR the right way: 5 things everyone needs to know about the new CPR Method.

Everyone needs to know basic first aid: From stopping the bleeding, to CPR to treating for shock, etc. This article was from Yahoo! Shine magazine on-line and clarifys the new CPR method. Not much of a change if you have been certified in the pat,...if not, get certified. Your local YWCA/YMCA always has certification class. Well worth the modest fee for peace of mind if not fore prepardeness.


by Jessica Ashley, Shine staff, Oct 14th, 2010
http://shine.yahoo.com/channel/health/do-cpr-the-right-way-5-things-everyone-needs-to-know-2399731/

The American Heart Association announced today new recommendations for the way CPR is performed. The small change could make a big difference in the lives of people suffering from cardiac arrest, the organization says.

For nearly 40 years, CPR guidelines have trained people to follow these simple A-B-C instructions—tilt the victim's head back to open the airway, then pinch their nose and do a succession of breaths into their mouth, and finally perform chest compressions.

But now, the AHA says starting with the C of chest compressions will help oxygen-rich blood circulate throughout the body sooner, which is critical for people who have had a heart attack. With this shift, rescuers and responding emergency personnel should now follow a C-A-B process—begin with chest compression, then move on to address the airway and breaths. This change applies to adults, children, and babies, but does not apply to newborns.

The revision is a part of the 2010 emergency cardiovascular care report published by the AHA., an organization that reviews its guidelines every five years, taking into account new science and literature. Although the changed procedure will take some time to reach what Monica Kleinman, the vice chair of the AHA's Emergency Cardiovascular Care Committee, calls "front-line people", there is a plan in place to implement the recommendations as soon as possible to their training network, medical staffs, and first-responders.

"The sooner chest compressions are started, the more likely there will be a better outcome," Kleinman announced. "Studies performed in labs as well as large-population studies have shown that people do better if they get chest compressions within four minutes."

That four minutes is the amount of time it could take for emergency crews to rapidly respond, Chicago firefighter and CPR instructor Kelly Burns notes. Until then, he stresses that any CPR bystanders perform can make a difference.

"Early activation is critical," Burns says, especially in cities where traffic and walk-up buildings can slow even the fastest respondents during a trauma where every minute counts.

When someone needs CPR, the very best reaction is a quick one, he says.

"In a perfect world, someone else calls 911 while you start chest compressions on the person in need," he advises. According to Kleinman, however, only about one-third of victims of cardiac arrest get assistance from bystanders.

Despite changing guidelines, outdated training, or any confusion in the moment, Burns says that no one who tries CPR is faltering.

"People are reluctant to jump in and help, especially if the person is not a family member or friend," Burns observes on a weekly basis. "The only mistake a civilian can make in these situations is waiting and not doing anything at all."

To that end, the new AHA guidelines are meant to help anyone who encounters this kind of emergency—the idea being, if they know better, they will do better.

5 potentially life-saving notes to remember about the new C-A-B method of CPR:

1. There are no mistakes when you perform CPR.
"One thing most people don't know, " Kleinman says, "is that there is almost nothing you can do [during CPR] to harm a person in cardiac arrest except delay responding."

Starting with chest compressions is now viewed by the AHA as the most effective procedure, and all immediate assistance will increase the chances the victim will survive with a good quality of life.

If one person calls 911 while another administers CPR, as Burns recommends, emergency operators will give informed instructions over the phone as well as dispatch aid to the scene.

2. All victims in cardiac arrest need chest compressions.
The AHA asserts that people having a heart attack still have oxygen remaining in their lungs and bloodstream in the first few minutes of cardiac arrest. Starting chest compressions first thing pumps blood to the victim's brain and heart sooner, delivering needed oxygen. This new method saves the 30 seconds that people performing CPR used to take to open the airway and begin breathing under the old guidelines.

3. It's a myth that only older, overweight men are at risk for a heart attack.
"Equal numbers of women and men have heart attacks," Kleinman reports. Sufferers are primarily adults.

Although infants and children are far more likely to require CPR due to accidents than cardiac arrest, it is important to know how administer care to them. (You can learn how to perform CPR on infants and children with this kit produced by the AHA or by signing up for one of their training sessions.)

4. Nearly all cardiac emergencies occur at home.
"Ninety percent of events take place at home. If you perform CPR in your lifetime, it's probably going to be for someone you love," Kleinman reveals.

5. Training is simpler and more accessible than you think.
Learning CPR has never been hard, Kleinman says, but guideline changes in the last ten years have reduced the number of steps and simplified the process even more.

Traditional CPR classes (listed here on the AHA website) are accessible for many people at local schools and hospitals.

Kits are also available to complete in the privacy of your own home or workplace. Kits available through the AHA include inflatable, disposable mannequins and a training DVD.

"Anybody can learn to do CPR. It's clearly important for saving lives, and now it is easier than ever," Kleinman asserts.

Monday, November 1, 2010

Personal Security - Replace Your Important Documents

Imagine that your house burns down or gets completely destroyed by fire, flood or other disaster. Would you know how to go about replacing your essential paperwork? Here's a helpful list of links that can help you replace your essential personal paperwork as well as change your address. Print several copies of this and put a copy at work and with a friend. Make copies of your official and important documents and store also at separate locations:

* Passport: For information on replacing a lost or stolen passport, visit the State Department website at http://travel.state.gov/passport/lost/lost_848.html

* Social Security Card: Go to http://ssa-custhelp.ssa.gov/app/answers/detail/a_id/251 for information and an application for a new card.

* Driver's License: If you need a get a new driver ' s license or renew the one you have, go to http://www.usa.gov/Topics/Motor_Vehicles.shtml to find the nearest DMV office.

* Birth and death certificates, marriage and divorce decrees: Information on getting replacement certificates of birth, death, marriage and divorce decrees can be found on the Centers for Disease Control and Prevention Website at http://www.cdc.gov/nchs/w2w.htm
You ' ll find helpful details in plain English, along with links and even prices.

* Bank records: You can get information about accessing accounts, lost records, ATM cards and direct deposits by calling the FDIC at 877-275-3342. For information regarding credit unions, call 703-518-6300.

* School records: If you need records from your former primary, secondary, or post-secondary school (whether public or private) the first place you should contact would be your former school. Administrators at the school should be able to tell you where school records are kept and what you need to do to obtain them. If the school you attended is closed, you should contact the appropriate school district. The Institute of Education Sciences (IES), a part of the Department of Education (ED), has a website which provides locators for public schools http://nces.ed.gov/ccd/schoolsearch , private schools http://nces.ed.gov/surveys/pss/privateschoolsearch or school districts http://nces.ed.gov/ccd/districtsearch . Contact information for your State Department of Education is available at http://www2.ed.gov/about/contacts/state/index.html . If you are trying to locate records from a postsecondary school that has closed, you will need to contact your State Higher Education Agency. A list by state is available at
http://wdcrobcolp01.ed.gov/Programs/EROD/org_list.cfm?category_ID=SHE Your State Higher Education Agency can explain how to find records from closed schools in your state.

The Institute of Education Sciences (IES), a part of the Department of Education (ED), has a website which provides locators for public schools http://nces.ed.gov/ccd/schoolsearch private schools http://nces.ed.gov/surveys/pss/privateschoolsearch or school districts http://nces.ed.gov/ccd/districtsearch

Contact information for your State Department of Education is available at http://www2.ed.gov/about/contacts/state/index.html If you are trying to locate records from a postsecondary school that has closed, you will need to contact your State Higher Education Agency. A list by state is available at http://wdcrobcolp01.ed.gov/Programs/EROD/org_list.cfm?category_ID=SHE Your State Higher Education Agency can explain how to find records from closed schools in your state.

* Savings Bonds: If you have old Savings Bonds stashed away somewhere, be careful. Lose them and you can lose the money. At http://www.treasurydirect.gov/indiv/research/indepth/ebonds/res_e_bonds_eereplace.htm The Treasury Department tells you exactly what to do with those bonds while you can still find them...and what to do if you can't.

* Contact government agencies: A list of links to federal, state and local government agencies, is available at http://www.usa.gov/Agencies.shtml

* Address Change: To change your address online with the post office go to http://www.usps.com/realmove If you receive Social Security benefits, you can also make an address change online at http://ssa-custhelp.ssa.gov/app/answers/detail/a_id/219 For the IRS you can download a form at http://www.irs.gov/pub/irs-pdf/f8822.pdf and mail it in.

Thursday, October 28, 2010

Financial Security - The Sneakiest New Shopping Scams

Easy ways to avoid the biggest rip-offs online and in stores

By the editors of Shop Smart Magazine. ConsumerReports.org

Just as important as knowing how to sniff out great buys is understanding what it takes to avoid rip-offs. And with Internet fraud on the rise, it's getting tougher to outsmart the criminals. Complaints to the Internet Crime Complaint Center, a joint operation of the FBI and the National White Collar Crime Center, jumped 22 percent last year. The complaints include plenty of run-of-the-mill scams, like sellers who steal credit-card numbers or take the money and run. But those are child's play compared with what else is brewing.

Think you're too savvy to get taken? OK, maybe you don't fall for those e-mails from Nigerian royalty asking you to wire money, but digital criminals are getting sneakier every year. One scam that can trip up even the most cautious consumers involves "skimmers" attached to ATMs. Those devices record account numbers and passwords so that thieves can clean out your bank account.

"These guys are constantly thinking of new ways to swindle you, some of which are quite sophisticated," says Brian Krebs, a computer security expert and author of "Krebs on Security" at Krebsonsecurity.com.

Think you're safer shopping at the mall? Official purse-snatching statistics show there's been a downward trend, but many of those crimes aren't reported to law enforcement officials. And pickpocket activity always jumps around holiday time, says Bob Arno, co-author of "Travel Advisory! How to Avoid Thefts, Cons and Street Scams While Traveling" (Bonus Books, 2003). But you can outsmart even the craftiest swindlers if you know what's in their bag of nasty tricks. Here's a guide to the latest, sneakiest scams, and simple tips that can help you protect yourself.

'Smishing'

How it works "Phishing" is when you get an e-mail from a supposedly trustworthy source, such as your bank or PayPal, claiming a problem with your account and asking for your user name and password. When you respond, your information is stolen and your account is siphoned. "Smishing" is the latest twist on that scam—instead of getting an e-mail, you get a text message. (The word is a combination of "SMS," for short message service, aka text messaging, and "phishing.") You're told to call a toll-free number, which is answered by a bogus interactive voice-response system that tries to fool you into providing your account number and password.

"It works because people don't give their cell-phone numbers out," Krebs says. "If someone has my cell number, I figure it's someone I know." Thieves can use random-dialing telemarketing services to hit on your number, says Rod Rasmussen, president and CTO of IID, an Internet security firm. If you belong to a credit union, be especially wary—members are targets because often the call-back number has a local area code, not an 800 number, which makes victims less likely to suspect a hoax, Rasmussen says.

Prevent it If you get a text alert about an account, don't respond before you verify that it's legitimate. You can do a Google search on the number to see whether it matches your financial institution. Even better, call the customer-service number at your bank or other service provider to give any needed information to a representative.

Teeny, tiny charges

How it works Thieves get hold of your credit- or debit-card number and make very small charges of 20 cents to $10. The charges appear on your bill with an innocuous-sounding corporate name, and a toll-free number may appear next to the charge. But when you call the number, it's either disconnected or you're instructed to leave a message and your call is never returned.

That was precisely the scam that the Federal Trade Commission broke up in June, according to spokesman Frank Dorman. "We don't know where the thieves got the card numbers, but we're looking into that," he says. The scam was successful because most consumers either didn't notice the charges or didn't bother to correct them because the amounts were so small. In all, the crime ring racked up more than $10 million in bogus charges, the FTC estimates.

Prevent it Scrutinize every item on your bill every month, and question those you don't recognize. (Some charges, but not all, will list a phone number.) If you think a charge is fraudulent, notify your card company as soon as possible but no later than 60 days after the charge appears. By law, the card company must remove the disputed amount from your account while it investigates. Worst case, by law you're liable for only the first $50 on a credit card. (In most cases, Visa and MasterCard will cover the full amount.) Debit cards offer fewer protections: You must report the problem two days after you notice it. If you don't, you could be liable for the first $500 in fraudulent charges. If you wait more than 60 days after your statement is mailed, you could lose all the money in your account.

Skimmers

How it works Skimmers, devices that thieves attach to ATMs or gas pumps to steal your debit account number and password, have been around for years—and they're not going away. They're getting even more sophisticated.

The devices are placed at the mouth of the card-acceptance slot and record the data off of the magnetic strip on the back of your ATM card when you slide it into the machine. Crooks will usually plant a second device, such as a hidden camera or a transparent plastic PIN pad overlay, that's used to record your PIN when you type it in. In the early days of skimming, the thief had to return to the ATM or gas pump to retrieve the apparatus. But now, Krebs says, wireless technology enables the devices to be rigged to send account information via text message to the thief's cell phone. "The thief can be down the street in a coffee house or halfway around the world," he says. "As long as he's got a working phone signal, he can get the information sent to him right away and start using it."

Prevent it Use credit cards and avoid using non-bank ATMs. Those machines are generally located in areas that are less secure, making it easier for thieves to tamper with them. And check the card slot: If there's a plastic strip or plastic film sticking out, or anything glued to the card reader, go elsewhere. If your card is stuck inside the card slot, do not leave the machine. Use your cell phone to call your bank branch or the 24-hour service number to report the problem.

Membership programs

How they work You're buying from a large, reputable website but just before you click the "confirm" button on your purchase, you see a pop-up window or banner ad with an offer such as "$10 Cash Back on Your Next Purchase!" Here's the catch. By accepting that so-called deal, you're agreeing to enroll in a Web discount program that's run by a completely separate company. Those programs, which have innocuous names such as "Reservation Rewards," "Travel Values Plus," or "Great Fun," often provide a 30-day trial period during which you get discounts on a variety of merchandise and services. After that, a monthly membership fee, usually $10 to $20, will appear on your credit-card bill—even though you never gave that outside company your card number.

Sounds dicey, doesn't it? A Senate committee headed by Jay Rockefeller, D-W.Va., thought so, too. Last year, the committee launched an investigation into three large companies that sell memberships to those discount clubs: Affinion Group, Vertrue, and Webloyalty. The committee's report was issued last November and alleged, among other things, that "misleading 'Yes' and 'Continue' buttons cause consumers to reasonably think they are completing the original transaction, rather than entering into a new, ongoing financial relationship with a membership club operated by Affinion, Vertrue, or Webloyalty."

The problem is so ubiquitous that in May, Rockefeller introduced a bill to ban that and other misleading sales practices. Meanwhile, the three companies mentioned in the report have pledged to change their ways. Previously, customers' credit-card numbers were provided to the discount company by the original site without the consumer's knowledge. After the investigation began, all three companies started to require consumers to type in, at a minimum, the last four digits of their card number to make it clear that they are entering into a separate transaction. We'll be on the lookout for whether those changes are enough to keep consumers from being duped.

Prevent it Be wary of pop-up windows or banner ads that promise an additional discount before you complete a transaction. If you do click on an offer, take the time to read the fine print. Scrutinize your credit-card statement every month and question any unfamiliar charges, no matter how small. Check your e-mail inbox and spam folder because Web loyalty programs often send a notification e-mail before they start charging your credit card, when you still have time to cancel.

Stripped gift cards

How it works Thieves look for gift cards that are displayed on grab-and-go racks, such as in grocery and department stores. They use a handheld scanner—which you can buy online for just a few hundred dollars—to read the code behind the magnetic or scratch-off strip on the back of the card. That, combined with the card number on the front, gives them everything they need to steal the value of the card. Then they put the card back on the rack. Later an unsuspecting buyer purchases the worthless gift card. Even if a card isn't preloaded, a thief can steal the card number and security code, then call the 800 number shown on the card every few days to check the balance. Once a shopper has purchased the card and loaded it with a dollar amount, the thief can spend it before the purchaser does.

Prevent it Buy cards that are behind a customer-service desk, says Tom Browning, vice president of corporate compliance and chief security officer for AlliedBarton Security Services. Inspect the card; if the magnetic or peel-off strip on the back isn't pristine, the card might have been tampered with. When buying a preloaded card, ask the cashier to scan it to make sure the full value is on it. If you're buying from a third-party gift-card site, look at the refund policy. And always hang on to the receipts. If something goes wrong, it can help you—or the gift recipient—get a refund.

Counterfeit electronics

How it works Counterfeiting might seem like old news, but it's still going strong—in fact, stronger than ever. Last year, U.S. Customs and Border Protection made 14,841 seizures of fake and pirated goods worth $261 billion, an all-time high. The counterfeits seized included the usual suspects—footwear, apparel, and accessories—plus a huge number of electronics. "A knockoff handbag may not present a direct risk to consumers," says Anthony Toderian, spokesman for CSA International, which tests and certifies products, "but counterfeit electronics certainly do." Fake goods could have substandard wiring, faulty fuses, flammable plastic casings, and harmful chemicals such as lead and mercury. All kinds of electronics have been illegally copied, including computers, phones, and handheld gaming devices, he says. Although online shopping and auction sites and deep-discount stores are the most likely places those fakes will pop up, some have made their way onto the shelves of major retailers. "Buyers for stores can be fooled just as easily as regular consumers can," Toderian says.

Prevent it Look for a label stating that the product has been certified by CSA International or Underwriters Laboratory. (Go to CSA -International. org and click on "Certification Marks" to see what genuine labels look like. At UL.com, go to the search box and type in "How to spot fakes.") Look at the product, too. Are there misspellings on the package? If the box is see-through, does it contain all of the listed components, including batteries, cases, and power cords? Is the manufacturer's contact information, including address and phone number, clearly displayed? When in doubt, buy from well-known retailers that offer a full refund.

3 simple ways to protect yourself

Get the right security software In recent tests, we found two great, downloadable programs that protect against viruses, spyware, and other online threats at no charge. Try Avira, at www.free-av.com, or Microsoft Security Essentials, at www.microsoft.com/security_essentials.

Fight fraud There are several useful resources for ensuring your online safety. Bookmark these!

FTC.gov
The Federal Trade Commission's site has lots of fact sheets that tell you what to do you if you've been scammed. Under the Consumer Protection tab, click on "Consumer Information" and then "Shopping for Products & Services." Don't miss the helpful primers on what to do if you're billed for merchandise you never receive and "How to right a wrong."

Safeshopping.org
This site is sponsored by the American Bar Association and is packed with advice on safe payment methods, protecting your privacy when you shop, and other need-to-know topics.

OnGuardOnline.gov
This site has tips on Internet shopping and is sponsored by government agencies. Quizzes test your knowledge of spyware, online auctions, ID theft, and more.

Antiphishing.org
The Anti-Phishing Working Group, an industry-sponsored association, has a tip sheet on how to avoid being scammed. Click on "Consumer Advice," then "How to Avoid Phishing Scams."

Check sellers Before you do business with anyone, go to the Better Business Bureau, at www.bbb.org/us. Grades A to F are based on how long the seller has been in business and how good a job it does resolving complaints. Other sites that are worth a look include SiteJabber.com, Complaints.com, and RipoffReport.com, for its user reviews. Also do a Google search of the site or retailer and the word "complaints."

Hang on to your handbag!

Bob Arno, an author and anti-theft consultant, has traveled the world secretly filming pickpockets. So he knows their tricks and how to thwart them. Here's his advice:

Get a grip Thieves are just as likely to snatch your purse as to slip a hand inside it to grab a wallet. So keep your handbag tight against your body and in front of you at all times. And when you're sitting down in the food court at the mall, don't sling your purse behind you on the chair. Even if you think you're maintaining physical contact with your bag, leaning forward for just a second is all the opportunity a thief needs to grab it. And never put it on the floor, even if it's in front of you.

Nix knapsacks They're back in style, but any bag that's not within your view is a juicy target for skilled pickpockets, no matter how securely it's fastened. And avoid purses with open compartments. Bags with zippers are best.

Keep your focus A classic ploy of purse thieves is to create a diversion—pointing at something, talking loudly, holding open a map and asking for directions, or spilling something on your coat then offering to clean it up. It can happen in a restaurant or a busy mall. Whenever anyone approaches you, be sure to firmly hold your purse and keep it in front of you.

Pare down your wallet Do you really need to bring all of your credit cards and ID cards with you? Leave everything except the necessities at home. And never routinely carry around anything with your Social Security number on it. (Photocopy all of the cards in your wallet, just in case.)

Be smart with your car Park in well-lit areas. If it's still daylight but you plan to shop for a while, park under a street lamp or in a well-lit garage. Always put up your windows and lock the car. If you go back to your car to stow packages, put them in the trunk—visible boxes and bags are magnets for thieves. Don't load up with so many packages that your purse dangles from your arm, out of your sight. Take advantage of curbside pickup or ask the store to hold bags for you. If someone tries to grab your purse, don't resist. "It's not worth losing your life over," Arno says. Also, if you have a GPS device in your car, program it so that your "home" setting isn't your home address. Instead, use the school or church down the street, or crooks will know how to get to your house while you're out. GPS thefts are also on the rise, so don't leave any visible trace of one in your car, including the mount.

Check sellers Before you do business with anyone, go to the Better Business Bureau, at www.bbb.org/us. Grades A to F are based on how long the seller has been in business and how good a job it does resolving complaints. Other sites that are worth a look include SiteJabber.com, Complaints.com, and RipoffReport.com, for its user reviews. Also do a Google search of the site or retailer and the word "complaints."

Monday, October 25, 2010

Personal Safety - Decision to Arm Yourself

The Decision to arm yourself for a non-gun owning person can be a significant decision and even life altering. Read this article written by Jennifer Willis for Salon.com




I was anti-gun, until I got stalked
I can't stand weapons. But after disturbing e-mails and letters, I decided to arm myself with more than words

"You need to arm yourself."

I blinked at the Portland police officer in my living room. This uniformed bear of a man -- packing a gun, a nightstick, a radio and who knew what else -- was responding to an ongoing stalker problem that had started several months earlier. I'd received letters, a phone call, a few packages and several e-mails from this unbalanced stranger who'd read a few newspaper stories I'd written and taken a shine to me. When the latest letter arrived -- mentioning my boyfriend, Mike, thoughts on religion, and a trip I'd taken but hadn't told anyone about -- I was seriously alarmed.

But get a gun? Surely, I'd misheard him.

"Getting a concealed carry permit isn't hard," the officer continued. "And they make ladies' purses with concealed weapons compartments."

In that moment, I understood the phrase, "blood turning to ice." I'm afraid of guns. When you get right down to it, I abhor them. I used to date a guy who owned a handgun and regularly trekked into the woods with his friends to shoot. I made him move the small gun safe from beneath the bed to another room before I'd agree to stay overnight.

But that morning was like a perfect storm of firearms. The first thing Mike had said to me when I opened my eyes -- hours before the officer made his suggestion, before my neighbor confided she'd been thinking of getting a gun for hiking and kayaking trips, before my retired military uncle e-mailed to say that arming myself probably wouldn't be a bad idea -- was, "Maybe you should get a gun."

Apparently, the Universe really wanted me packing heat.

The officer saw the dismay on my face. "Most bullet wounds don't kill people," he assured me. "And it would be self-defense."

I spent the rest of the day in a general freakout.

I was hopeless trying to get any work done. Periodically, I'd do Web searches on handguns. I discovered that Oregon is a right-to-carry state and that it costs $65 for a concealed carry permit -- $50 for the four-year permit and $15 for the background check. I learned the difference between a pistol and a revolver -- a revolver's chambers revolve, like the six-shooters in Hollywood Westerns -- and I read that the .357 Magnum and .38 Special were ideal for women interested in a gun for self-defense because they're relatively lightweight, aren't prone to jamming and don't carry too many bullets. Because who really needs a 20-round magazine when you're defending against a stalker? "Six or seven bullets will do you just fine," read one Web comment.

But the idea of owning a gun made me sick to my stomach. That afternoon, when I escaped into a fitful nap, I dreamed people were pointing double-barreled shotguns at me.

When I thought about it, I realized I'd grown up with firearms in the house -- from the antique rifle mounted on the sun porch wall to the Colt .45 in my father's sock drawer. When I was 7, I watched my cousins shoot targets on the family farm in Virginia. I'd even picked up the hot shell casings as souvenirs.

As an adolescent, I'd spent my own money on a Daisy air pistol. I was surely the only girl at my single-sex prep school who owned a weapon, and I trained with it regularly, which is probably why, years later, I was an ace shot in paintball (Code name: Salad Shooter). Even the ex-military guys clamored to get me on their teams.

But that was a far cry from carrying -- or firing -- live rounds.

As Mike tried to sleep, I fretted out loud. I told him a firearm in the house made me nauseous, that I feared the weapon would be turned on one of us, that there'd be an accident. I told him I believe in compassion and peace. I told him the very idea of a gun was a compromise of my principles.

Mike sighed. "Which would you prefer, compromising your principles or getting abducted by Crazy Man?"

That's when the old Theodore Roosevelt adage popped into my head -- "Speak softly and carry a big stick" -- and I finally got it. I can still be the compassionate, diplomatic, interfaith groovy gal I've always been; I'll just be packing heat in case negotiations tank.

When I got another letter from the stalker -- a movie schedule with show times circled, alongside a handwritten note that was way too familiar -- Mike looked up the nearest gun dealer and put me in the car.

"This guy is pissing me off," he told me. "I already have enough stress without this."

So now, after a background check and fingerprinting, I have my very own Ruger .38 Special -- a black, five-shot double-action revolver that fits my small hands disturbingly well.

I was petrified when I went to the firing range for the first time. The police officer behind the counter laughed at my Ruger. "Oh, you've got one of those dinky guns!" he said. He warned me how bad the recoil was going to hurt, which scared me even more.

The woman standing beside me leaned over and whispered, "Don't mind the guys trying to be all macho." She was packing the same make and model I had.

Another officer took pity and walked me into the range to demonstrate every single step of loading, holding, aiming and firing my weapon. He showed me how to stand and how to eject the bullet casings afterward. Still, even with ear protection, I literally jumped every time someone else pulled a trigger. Gunshots are LOUD.

My hands were shaking as I loaded the .38, and I was still flinching every time the guy in the next lane fired off his .45. I focused on everything the police officer showed me. I kept the barrel pointed down range and my fingers curled around the cylinder until I was ready to snap it back into place. I remembered to keep my thumbs off the gun, and to keep the grip lodged firmly against the fleshy part between my thumb and hand. I aimed, put my finger on the trigger, and fired.

The gun kicked hard, but not as bad as I'd feared, and it was more startling than painful. I shot a few more rounds, making adjustments to my aim for the recoil and my own jumpiness. After I'd gone through two full cylinders -- 10 bullets -- Mike took a look at the paper target. Every single shot had not only hit the target, but gone right into the chest and head of my paper dummy. Mike was impressed. Frankly, so was I.

After going through a box of 50 rounds, I left the range with black-smudged fingers that smelled of gunpowder. My firing hand was sore the next day, and the truth is -- two months and more target practice later -- I'm still not entirely comfortable having a handgun in the house. Whenever the dogs erupt in the middle of the night in a barking frenzy, my thoughts go immediately to my .38.

But I'm not as afraid of my stalker as I used to be, either. I'm armed now, with more than words and good intentions. He keeps sending upsetting letters, but if he ever pays a visit ... Jenny's got a gun, and she knows how to use it.

Monday, October 18, 2010

Internet Security - Facebook Fiasco

By now alot of people have heard of the allegations that Facebook security was breached exposing private individual information on FB users. This is the latest article from the New York Times on this issue.

Facebook Acknowledges Privacy Issue With Applications:
MIGUEL HELFT, October 18th, 2010, The New York Times

Facebook said on Monday that it was talking to application developers about how they handle some personal data, after a report said some applications had been improperly sharing the data with advertisers and Web tracking companies.

In a blog post, Mike Vernal, a Facebook engineer, said the company had recently learned that several applications were passing a piece of data known as a user ID to outside companies in a way that violated its privacy policy. User IDs are unique numbers assigned to Facebook members that are used by Facebook and its applications to identify them.

Facebook's statement came after The Wall Street Journal reported late on Sunday that it had found that several Facebook applications were "providing access to people's names and, in some cases, their friends' names" to advertisers and Internet tracking companies. The report said that all 10 of the most popular applications on Facebook, including games like FarmVille and Mafia Wars, were transmitting user IDs to third parties. Three of those applications were also transmitting information about a user's friends, The Journal said.

Facebook also sought to downplay the significance of the problem. "Press reports have exaggerated the implications of sharing" a user ID, Mr. Vernal wrote on a company blog for application developers. "Knowledge of a UID does not enable anyone to access private user information without explicit user consent."

Yet Mr. Vernal acknowledged that the sharing of user IDs was in violation of its privacy policies, and said that it had disabled some programs that did so.

Mr. Vernal said there were technical challenges involved in preventing this problem. "We are talking with our key partners and the broader Web community about possible solutions," he wrote. "We will have more details over the course of the next few days."

Facebook has been hit with a string of controversies over privacy. In May, after a series of complaints from some users and privacy advocates, the company made wholesale changes to its privacy settings. Mark Zuckerberg, the company's chief executive, apologized to users, saying that some of the site's privacy settings had become too complicated for the average user to understand. Despite the changes, the privacy issue has continued to dog Facebook.

Thursday, October 14, 2010

Personal Safety - Know Your Felon Neighbors

Do You Know Your Neighbors? I mean, REALLY - Do you know your neighbors?

Just put in your address (or any address around you) & your neighborhood map will pop up.

Use an a business address near you if you’d rather not put in your own, then you can drag the map to Your neighborhood to show those convicted felons.

Every place you see a red balloon or thumb tack is the home of a convicted felon. Just hover your mouse over an icon & not only will the name come up,
but also the crime they were convicted of.

Be advised that these people may not live there anymore and the chances for mistaken identity, especially on common names always exists.


http://www.felonspy.com/search.html

Thursday, October 7, 2010

Health Issue - Bed Bug Epidemic

Received this from a friend who got it from Snopes, it was be-bugged, pardon the pun:

Hi All: A bit of information that you might like to know about. We have friends here in our community and one of their sons is an entomologist (insect expert), and has been telling them that there is an epidemic of bed bugs now occurring in America. Recently I have heard on the news that several stores in NYC have had to close due to bed bug problems, as well as a complete mall in New Jersey.

He says that since much of our clothing, sheets, towels, etc. now comes from companies outside of America, (sad but true), even the most expensive stores sell foreign clothing from China, Indonesia, etc. The bed bugs are coming in on the clothing as these countries do not consider them a problem. He recommends that if you buy any new clothing, even underware and socks, sheets, towels, etc. that you bring them into the house and put them in your clothes dryer for at least 20 minutes. The heat will kill them and their eggs. DO NOT PURCHASE CLOTHES AND HANG THEM IN THE CLOSET FIRST. It does not matter what the price range is of the clothing, or if the outfit comes from the most expensive store known in the U.S. They still get shipments from these countries and the bugs can come in a box of scarves or anything else for that matter. That is the reason why so many stores, many of them clothing stores have had to shut down in NYC and other places. All you need is to bring one item into the house that has bugs or eggs and you will go to hell and back trying to get rid of them. He travels all over the country as an advisor to many of these stores, as prevention and after they have the problem.

Send this information on to those on your e-mail list so that this good prevention information gets around quickly.

Origins: This helpful heads-up about bed bug infestations began landing in the snopes.com inbox in early October 2010. While it is true the U.S. is experiencing an explosion in its bedbug population, this phenomenon is not due to the critters' suddenly arriving on clothing manufactured in countries where their presence is winked at — the bedbug problem has been on the rise in the U.S. for years, with all 50 states reporting epidemic levels as far back as 2007. The National Pest Management Association (NPMA) has seen a 71 percent increase in bedbug infestations since 2001, mainly due to international travel.

Xenophobic commentary about clothing imported from China and Indonesia notwithstanding, the email's advice about treating wearables with a lengthy session in the clothes dryer is generally valid. (The warning about new clothing appears a bit over the top, though; we've yet to happen upon credible reports of bedbugs being found in such garments.) Bedbugs will not survive a hot tumble in that appliance, provided the temperature in its interior reaches (and then doesn't go below) 113°F. (There is some dispute about the minimum temperature required to eradicate bedbugs; we've also seen it credibly listed as 120°F.) The length of time clothing needs to be treated in this fashion to fully exterminate bedbugs also varies from source to source: while 20 or 25 minutes are the figures most commonly cited as the duration necessary to kill the lurking bugs, we've also seen recommendations of as little as 5 minutes and as much as 45 minutes.

Bedbugs are the ultimate hitchhikers, quickly taking up residence in suitcases and backpacks set down in infested areas. They are almost unimaginably hardy, capable of surviving for more than a year without eating (which means a house that has sat empty for that length of time could still contain a bedbug population with the potential of driving its new homeowner mad) and able to resist extremes of temperature, from freezing to 113°'F. Despite their name, bedbugs reside everywhere in any given room, not just in its bed. While their most common hiding spots are in the cracks and crevices of mattresses and box springs, they can also hide in furniture, baseboards,
electrical outlets, or any other small space or fabric surface near humans.

The process of eradicating bedbugs that have taken up residence in one's home is a daunting process, generally involving three separate sessions of extermination, with each of those comprising a number of different methods. It's lengthy, expensive, and frustrating, and if any of the bugs are missed, the bedbugs will be back in force in short order.

The best remedy is to not bring bedbugs into your home from other sites in the first place. When staying in hotels, place your bag on a suitcase stand rather than on the floor or the bed. Bed bugs can't easily climb metal, which means your bag and its contents should be relatively safe from them provided you place your valise on a metal-legged suitcase rack. Keep the suitcase rack away from walls and any wooden furniture, thereby preventing the bugs easy access to your belongings. If your hotel room lacks this amenity, you might try leaving your bag in the bath tub. (We've heard bedbugs can't easily climb enamel.) Consider keeping everything in your suitcase during your stay (rather than unpacking its contents) and keeping your bag encased in a thick plastic bag when not in immediate use.

At home, store luggage outside the domicile (in a shed, for example) to prevent any bedbugs that got onboard despite your precautions from entering your house. Immediately wash all clothing you took on your travels, as opposed to letting them sit for a bit in the laundry basket. Be wary of acquiring used furnishings, especially beds and couches. (If you must take on such items, inspect them very carefully for signs of bedbug infestation.) Run any second-hand clothing you've acquired through the dryer as soon as you bring it into the house.

Monday, October 4, 2010

Travel Safety - Warning on Vehicle Air Conditioning

The below is true in that: you should roll down the windows for a brief period of time prior to running the air conditioner. Many folks have no idea whatsoever as to what the "film" is on their windows after they have let their car sit for some time with the windows/door closed. Personally, you should always "crack" the windows slightly.

Stanford Hospital & Clinics Warning on Car Air Conditioning

No wonder more folks are dying from cancer than ever before. We wonder where this stuff comes from but here is an example that explains a lot of the cancer causing incidents. Many people are in their cars first thing in the morning and the last thing at night, 7 days a week. As I read this, it makes me feel guilty and ill. Please pass this on to as many people as possible. Guess it’s not too late to make some changes.

Here's why:

According to a research, the dashboard emits Benzene, a cancer-causing toxin (carcinogen - take time to observe the smell of heated plastic in your car.

In addition to causing cancer, Benzene poisons your bones, causes anemia and reduces white blood cells.

Prolonged exposure will cause Leukemia, increasing the risk of cancer.

Can also cause miscarriage.

Acceptable Benzene level indoors is 50 mg per sq. ft. A car parked indoors with windows closed will contain 400-800 mg of Benzene.

If parked outdoors under the sun at a temperature above 70 degrees F, the Benzene level goes up to 2000-4000 mg, 40 times the acceptable level.

People who get into the car, keeping windows closed will inevitably inhale, in quick succession, excessive amounts of the toxin.

Benzene is a toxin that affects your kidney and liver. What's worse, it is extremely difficult for your body to expel this toxic stuff.

So friends, please open the windows and doors of your car and give time for the deadly interior air to clear out before you enter.

Thursday, September 30, 2010

Home Security - Demand for Home Security Systems on the Rise


While perusing for articles that may be of interest to our readers, we found that the demand for security systems and even owning guns has been steadily rising in almost all locations this past year.

We found this article out of Tennesse that is demonstrative of the near constant flush of articles on home invasion, burgularies and such pushing sales of Home Security Systems.

Demand for home security systems on the rise in East Tennessee
By JAMIE LYNN DROHAN
6 News Reporter

KNOXVILLE (WATE) - Experts say 22 percent of Tennessee homes have electronic security systems, and local security companies say they're seeing a significant increase in the demand for home protection.

"They're not coming in the middle of the night like they used to. They are coming in plain daylight," said John Knox, of the Electronic Security Association.

"With the economy the way it is, we're just crazy busy installing security systems. Everybody wants to put their systems back online. Maybe they had them 10 years ago, but now they want to re-do them," said Robert Macauley, of Knox Integrated Systems.

Experts say video surveillance is the most popular request right now.


"The prices have been lowered where it's more affordable, more attainable for people. The quality is much better and it's just a good way of documenting a lot of things. It helps the police in a lot of ways," Knox said.

Homeowner Knick Myers is a big believer in security systems after his father's home was burglarized.

"After that event, it definitely changed the way he thought because the fear of someone actually being in his home while he was asleep was a very, very scary thought. Especially after the fact when you think of what could have been," Myers said.

Experts say if you're considering an alarm system, do your homework.

"AsK if all the doors are protected or what if they come through a window? What if they touch your phone lines? Who are the people in my house installing this system?" Knox said.

"People are aware of what is happening around them, and they want to do what they can to prevent that from happening to them," Myers said.

Sunday, September 26, 2010

Personal Security - Be aware of Office Photocopier's

This excellent short article came out of the Daily Green News blog, written by Brian Clark Howard, pertaining to digital photo copiers that can retain information and images that you otherwise want to remain undisclosed.


Did you know that most office photocopiers are built to save digital images of documents? It's true.

When CBS News recently purchased some used photocopiers that were destined for new customers, their computer technician was able to easily retrieve thousands of pages of sensitive documents from their hard drives: perfect images of personal medical records, pay stubs, and tax forms -- even the blueprint of a building near Ground Zero and reports of sex and drug crimes from the Buffalo, N.Y., police department. There were home addresses, social security numbers, and medical histories aplenty.

The data isn't particularly easy to view and sort, but a thief who knows what he's looking for can download free software from the Internet that can be used to mine this treasure trove of personal data.

Still, before you run screaming from your nearest Kinko's, there are a few things you should know.

"It's a real issue, and it's something we've been talking about for a long time," Larry Kovnat, manager of product security for imaging company Xerox, told The Daily Green. "There have been a lot of inquiries and plans put in place to institutionalize the use of encryption and data overwrite on copiers, to protect the data," Kovnat added. Encryption encodes the data so only someone who has the "key" can make sense of it, and overwrite erases each previous scan.

Kovnat explained that some manufacturers offer image overwrite as an optional extra (according to the CBS story, the vendor charges $500 for that). "We offer it standard because we think the issue is important," said Kovnat. "We want people to use the features, and they don't slow down the devices."

Still, each office's machine administrator needs to know to turn the security settings on, and to make sure care is taken when the device is no longer needed. "Before you drop off that used machine to a lessor or for a charitable write-off, make sure that you have totally erased the hard disk or removed and destroyed it," cautions Peter Fannon, the vice president of technology policy for Panasonic.

Fannon adds that Panasonic has built-in security features into all their imaging products since 2005, and that the company works to educate authorized dealers to tell users to enable them. According to Fannon, the products ship with such security features as image overwrite, encryption, hard disk lock (which prevents the drive from being used in any other device), and security passwords that prevent making unauthorized changes. However, the default setting of these features is off, so they have to be activated by the user.

"Fax machines also have large image memories that can store a significant amount of data. To eliminate concerns about that, we have the option Panasonic Image Memory Eraser Function, which erases all fax data after each transmission, including where it is being sent, the sending number, and all data," Fannon adds. As for older copiers, Fannon said they sometimes came with a combination of physical locks and password protection.

Neither expert was aware of a single proven case in which sensitive information was taken off a copy machine and used maliciously. Still, both recommend that consumers take precautions. As it stands, the Federal Trade Commission is currently evaluating the way manufacturers present their security procedures.

Before copying anything sensitive, Kovnat says one should ask the administrator how the machine is set up. "Ask, does it have a disk? Is encryption enabled? Is image overwrite enabled? If you can't get a good answer, I wouldn't take the risk," explained Kovnat.

"These are sophisticated machines; don't think of them as 'just a copier,'" he added. "You wouldn't use a laptop without thinking about security or updating software."

Saturday, September 25, 2010

Internet Security - Burglars Picked Houses Based on Facebook

Burglars Picked Houses Based on Facebook Updates

From an article on yahoo finance by Nick Bilton.


If you plan to log into your Facebook account and announce to the world that you're heading to the beach for the weekend, you might want to append the status update with a warning that your home is under 24-hour surveillance, you have a 140-pound Rottweiler who hasn't eaten in a week and that you own a really good alarm system.


If you don't, you personal belongings could be fodder for some tech-savvy burglars.

According to New Hampshire's WMUR Channel 9 News, three local men, Mario Rojas, Leonardo Barroso and Victor Rodriguez, have burglarized more than 18 homes in the Nashua area of New Hampshire simply by checking status updates on Facebook and then pillaging houses of victims who announced on the social network that they were not home.

Police told the news outlet that they recovered between $100,000 and $200,000 worth of stolen property as a result of the investigation.

According to local police, investigators tracked down the burglars by listening for the sound of a specific kind of fireworks stolen from a home. When they heard it, they apprehended the suspects and their loot.

A Web site called Please Rob Me had noted when people informed the world they weren't home by their status updates and check-ins on some location-based social networks. But the site has since shut down, noting that the site's founders are "satisfied with the attention we've gotten for an issue that we deeply care about."

Ron Dickerson, captain of Nashua 's Police Department, told the local news that people need to "Be careful of what you post on these social networking sites."

Wednesday, September 22, 2010

Communications Security - Telephone Scam - 90#

Beware of the 90# Telephone Scam

I dialed '0', to check this out, and asked the operator, who confirmed that this was correct so please be aware of this telephone scam.

It applies to cell phones too.

You may receive a telephone call from an individual identifying himself as an AT&T or other telephone company Service Technician. They state they are trouble shooting problems on the lines and to complete the test he needs you to touch nine(9), zero(0), the pound sign (#), and then hang up.

What happens is that, by pushing 90#, you give the requesting individual full access to your telephone line, which enables them to place long distance calls billed to your home phone number. This includes the 1-900 sex lines and send text for charity lines.

This scam has been originating from many local jails/prisons.

DO NOT press 90# for ANYONE.

Verizon also said it was true for their cell phone networks, so do not dial 90# for anyone!!

Sunday, September 19, 2010

Electronic Security - Situational Awarness on the Phone

As a father, mother, or family guardian, we need to be more situationally aware of what we say over the phone around people. In this day and age of social networking with Facebook, My Space, Twitter, etc., we tend to air out a lot of personal information without reservation as well. It’s no wonder why criminals start eavesdropping, checking social network areas – as well as private corporations and the government for that matter. We as a society forget there is someone next to you listening in on your cell phone call, or placing private or situational schedules on social networks.

The following article caught my eye and I thought I should post it for your situational awareness.

Stay safe out there!



Cellphones, social networks make eavesdropping OK?

By Sharon Jayson, USA TODAY

David Smith has heard — or rather overheard — it all while on planes, including the sexual details of a stranger's hookup at a business meeting.

"It feels like you're eavesdropping, but in another sense, you're forced to share something that falls under the heading of 'too much information,' " says Smith, 54, of Austin, a retired consultant and frequent business traveler.

A century ago, when the first home phones were "party lines" shared by neighbors, "worrying you were being listened in on was a common feature of American culture," says sociologist Claude Fischer of the University of California-Berkeley.

Oh, how times have changed.

Now, we're not only unconcerned about overheard phone calls, we purposely broadcast our personal business to large groups of "friends" and "followers" on social networks such as Facebook and Twitter.

SECRETS: Some people still keep a diary in age of Facebook and blogs

As a result, we're fast becoming a nation of casual eavesdroppers, where every day we tune in to a constant stream of updates on what others are saying and doing, from where they're about to eat lunch (complete with photos) to their conversations with others.

All this sharing, some experts say, may be feeding a tendency toward exhibitionism, and devaluing the very privacy that earlier generations so desired.

But not everyone says the rise of widespread social snooping is such a bad thing.

Eavesdropping is an "evolved human practice that is natural and often beneficial," says John Locke, a linguistics professor at the City University of New York.

"We teach people they should mind their own business," he says, but "that's extremely bad advice. It's dangerous because you won't see the terrorist next door making a bomb; you won't see the kids being abused, or the husband beating up a wife. If there wasn't any eavesdropping, if people minded their own business and ignored what they saw and heard, how would you prevent and how would you solve crimes?"

Locke, author of a new book, Eavesdropping: An Intimate History, says apes keep an eye on each other to maintain order, and we humans have neighborhood watch programs.

But eavesdropping is more than just listening in. It's glancing over at someone else's laptop screen to see what they're doing. It's peering into an apartment window as you walk by. It's catching a glimpse through a door that's slightly ajar. It's trolling Facebook to see what your friends are saying to others.

And yes, it's a bit thrilling, he says. "There is something quite tantalizing about this behavior."

But is it really eavesdropping if they're broadcasting and we can't help overhearing?

"I don't regard it at all as me eavesdropping," says Etti Baranoff, who has overheard plenty of cellphone conversations in 15 years of traveling twice a week as an associate professor of insurance and finance at Virginia Commonwealth University in Richmond . "We think no matter where we are, we are in our own living room, but we are not. We are walking with our phones as if we are in our own homes."


No keyholes needed

"It's a generational and cultural change," says W. Keith Campbell, a professor of psychology at the University of Georgia in Athens .

"That old image of sticking your ear to a keyhole — we don't need to do it anymore," Campbell says. "Our personal lives are much more open."

What's changed is that more private behavior, such as personal phone calling, happens in public today, says social psychologist Robert Kraut of Carnegie Mellon University in Pittsburgh .

It may seem like eavesdropping, but the "victim" is no longer the person being eavesdropped on, he says — it's "the overhearers, who can't get away. What had once been private behavior is now being shoved in their face."

Fischer, author of Made in America: A Social History of American Culture and Character, says it's ironic that "a cellphone call overheard while walking down the street is a throwback to (party lines) where everybody knew everybody's business."

Whether eavesdropping is by choice or forced makes a big difference, Locke says.

"If someone is speaking low, people will lean in the direction of the message. But if people are speaking loudly on a cellphone, they'll back the other way. We resent the fact they are broadcasting personal information. We want the option of tuning in."

This dichotomy is evident in new research on public cellphone use. One study, to be presented to the National Communication Association in November, included 15- to 20-minute observations of 19,741 people using cellphones on a college campus from 2005 to 2008. Researcher Yi-Fan Chen of Old Dominion University in Norfolk , Va. , found that mobile devices "blurred boundaries between public and private spaces." Her 2009 survey found cellphones were most often used on the street, observers said, "in a loud or annoying manner."

Another study, in the journal Behaviour & Information Technology in 2004, found cellphone conversations "significantly more noticeable and annoying than face-to-face" at the same volume.

"There is an idea in social psychology that you can talk about intimate things to strangers because they are not part of your network and are not considered to be a risk," Campbell says. "If you're actually in public and clearly don't know people, it's almost seen as a private space."

Some say today's mix of easy information sharing and celebrity-driven media culture is making us more narcissistic. With Facebook and Twitter, we're more willing to showcase our lives for all who want to look or listen. We can tell our friends our innermost thoughts, but those who aren't so close also see.

"Go into an airport and you hear people talking in a particularly loud voice, so people think they're important or have status. There's a subset of people that ties in more with narcissism and attention-seeking that are using these channels to get attention," says Campbell , co-author of The Narcissism Epidemic.

Gleaning new information


But the fact that you can watch or listen on social networks without engaging "has some real advantages," says Keith Hampton, assistant professor of communication at the University of Pennsylvania in Philadelphia .

"It's exposure to little bits of information you would never otherwise have had access to," he says. "And little bits of information can be really important. You have access to new ideas, and not from very close social ties that know what you know."

Pop culture expert Richard Lachmann, a sociology professor at the University at Albany , State University of New York, says it's not just the idea of privacy that has changed. He believes the very nature of eavesdropping is up for debate, since people are willing to share more and more personal information.

"Everybody still has a notion of eavesdropping. It's somebody trying to hear something they haven't been invited to hear. What's changing is what goes in that category," he says.

"It used to be people had a real long list of things that were private and only heard by a few, and a short list of things that would be public. For many people, that's moved from one list to another."

Thursday, September 16, 2010

Internet Security - 6 Things You Should Never Reveal on Facebook

Article from Kathy Kristof, MoneyWatchBnet.com

The whole social networking phenomenon has millions of Americans sharing their photos, favorite songs and details about their class reunions on Facebook, MySpace, Twitter and dozens of similar sites. But there are a handful of personal details that you should never say if you don't want criminals — cyber or otherwise — to rob you blind, according to Beth Givens, executive director of the Privacy Rights Clearinghouse.


The folks at Insure.com also say that ill-advised Facebook postings increasingly can get your insurance cancelled or cause you to pay dramatically more for everything from auto to life insurance coverage. By now almost everybody knows that those drunken party photos could cost you a job, too.

Your Birth Date and Place


Sure, you can say what day you were born, but if you provide the year and where you were born too, you've just given identity thieves a key to stealing your financial life, said Givens. A study done by Carnegie Mellon showed that a date and place of birth could be used to predict most — and sometimes all — of the numbers in your Social Security number, she said.

Vacation Plans


There may be a better way to say "Rob me, please" than posting something along the lines of: "Count-down to Maui ! Two days and Ritz Carlton, here we come!" on Twitter. But it's hard to think of one. Post the photos on Facebook when you return, if you like. But don't invite criminals in by telling them specifically when you'll be gone.


Home Address


Do I have to elaborate? A study recently released by the Ponemon Institute found that users of Social Media sites were at greater risk of physical and identity theft because of the information they were sharing. Some 40% listed their home address on the sites; 65% didn't even attempt to block out strangers with privacy settings. And 60% said they weren't confident that their "friends" were really just people they know.

Confessionals


You may hate your job; lie on your taxes; or be a recreational user of illicit drugs, but this is no place to confess. Employers commonly peruse social networking sites to determine who to hire — and, sometimes, who to fire. Need proof? In just the past few weeks, an emergency dispatcher was fired in Wisconsin for revealing drug use; a waitress got canned for complaining about customers and the Pittsburgh Pirate's mascot was dumped for bashing the team on Facebook. One study done last year estimated that 8% of companies fired someone for "misuse" of social media.

Password Clues

If you've got online accounts, you've probably answered a dozen different security questions, telling your bank or brokerage firm your Mom's maiden name; the church you were married in; or the name of your favorite song. Got that same stuff on the information page of your Facebook profile? You're giving crooks an easy way to guess your passwords.

Risky Behaviors

You take your classic Camaro out for street racing, soar above the hills in a hang glider, or smoke like a chimney? Insurers are increasingly turning to the web to figure out whether their applicants and customers are putting their lives or property at risk, according to Insure.com. So far, there's no efficient way to collect the data, so cancellations and rate hikes are rare. But the technology is fast evolving, according to a paper written by Celent, a financial services research and consulting firm.

Tuesday, September 14, 2010

Financial Security - Letter of Credit Fraud

In this day and age where the economy is fragile and the majority of us are walking that fine line of credit failure, there are scams out there that can push us over the edge. Be mindful of credit fraud. The FBI has some helpful tips, which are below.


Legitimate letters of credit are never sold or offered as investments.

Legitimate letters of credit are issued by banks to ensure payment for goods shipped in connection with international trade. Payment on a letter of credit generally requires that the paying bank receive documentation certifying that the goods ordered have been shipped and are en route to their intended destination.

Letters of credit frauds are often attempted against banks by providing false documentation to show that goods were shipped when, in fact, no goods or inferior goods were shipped.

Other letter of credit frauds occur when con artists offer a "letter of credit" or "bank guarantee" as an investment wherein the investor is promised huge interest rates on the order of 100 to 300 percent annually. Such investment "opportunities" simply do not exist. (See Prime Bank Notes for additional information.)

Some Tips to Avoid Letter of Credit Fraud:

1) If an "opportunity" appears too good to be true, it probably is.

2) Do not invest in anything unless you understand the deal. Con artists rely on complex transactions and faulty logic to "explain" fraudulent investment schemes.

3) Do not invest or attempt to "purchase" a "Letter of Credit." Such investments simply do not exist.

4) Be wary of any investment that offers the promise of extremely high yields.

5) Independently verify the terms of any investment that you intend to make, including the parties involved and the nature of the investment.

Sunday, September 12, 2010

Protect Against Retail Store Fraud

Check Your Receipts Before Leaving Any Cashiers Station.

Make sure everyone in your family understand this retail store fraud technique.

I bought a bunch of stuff, over $150, and I glanced at my receipt as the cashier was handing me the bags. I saw a cash-back of $40. I told her I didn't request a cash back and to delete it.

She said I'd have to take the $40 because she couldn't delete it. I told her to call a supervisor.

Supervisor came & said I'd have to take it! I said NO! Taking the $40 would be a cash advance against my Discover & I wasn't paying interest on a cash advance!!!!! If they couldn't delete it then they would have to delete the whole order.

So the supervisor had the cashier delete the whole order & re-scan everything!

The second time I looked at the electronic pad before I signed & a cash-back of $20 popped up. At that point I told the cashier & she deleted it. The total came out right. The cashier agreed that the electronic pad must be defective. (yeah, right!)

Obviously the cashier knew the electronic pad wasn't defective because she NEVER offered me the $40 at the beginning.

Can you imagine how many people went through before me & at the end of her shift how much money she pocketed?

Just to alert everyone. My coworker went to Milford, DE Wal-Mart last week. She had her items rung up by the cashier. The cashier hurried her along and didn't give her a receipt.

She asked the cashier for a receipt and the cashier was annoyed and gave it to her. My coworker didn't look at her receipt until later that night. The receipt showed that she asked for $20 cash back. SHE DID NOT ASK FOR CASH BACK!

My coworker called Wal-Mart who investigated but could not see the cashier pocket the money. She then called her niece who works for the bank and her niece told her this.

This is a new scam going on. The cashier will key in that you asked for cash back and then hand it to her friend who is the next person in line.

Please, please, please check your receipts right away when using credit or debit cards! This is NOT limited to Wal-Mart, although they are the largest retailer so they have the most incidents.

I am adding to this....My husband and I were in Wal-Mart North Salisbury and paying with a credit card. When my husband went to sign the credit card signer, he just happened to notice there was a $20 cash back added. He told the cashier that he did not ask nor want cash back and she said this machine has been messing up and she canceled it. We really didn't think anything of it until we read this email.

I wonder how many "seniors" have been, or will be, "stung" by this one?? To make matters worse ...THIS SCAM CAN BE DONE ANYWHERE, AT ANY RETAIL OR WHOLESALE LOCATION!!!

BEFORE LEAVING THE CASHIER'S STATION!! CHECK YOUR RECEIPT!!

Friday, September 10, 2010

Child Safety - Car Seats

From a Yahoo! News article - Car Booster Seats to Avoid
by Blake Ellis, Staff Reporter

The good news is that booster seats are getting safer. The bad news is that there are still some seats out there that may not protect your child in a crash, a report released Wednesday showed.

Because seat belts are typically designed for adults, booster seats are meant to lift children so that lap belts fit flat across their upper thighs and shoulder belts hit mid-shoulder, according to the Insurance Institute for Highway Safety.

Out of the 72 boosters evaluated, 21 were recommended as "best bets" because safety belts fit well across most vehicles, while seven models were "good bets" and eight were not recommended. This was the first time top performers outnumbered the worst performers, with only nine boosters rated as "best bets" last year.

The eight models that failed the institute's evaluations were Eddie Bauer's Deluxe and Deluxe 3-in-1, Evenflo's Express, Generation 65 and Sightseer, Safety 1st's All-in-One and Alpha Omega Elite and Harmony's Baby Armor.


Engineers found that these boosters provided poor belt fit, meaning that the lap belt came too high on a child's stomach or the shoulder belt hit too close to a child's neck or fell off the shoulder.

"If the booster isn't doing a good job -- if the lap belt is up on your son or daughter's tummy or if the shoulder belt is falling off your child's shoulder -- then find a replacement booster seat as soon as practical," said Anne McCartt, Institute senior vice president for research.

"Best bets" included Chicco's Keyfit Strada and Graco's TurboBooster Crawford. While one of its boosters failed the test, Harmony Juvenile Products boasts five "best bet" booster seats, more than any other manufacturer.

Among the "good bets" were Combi's Kobuk Air Thru, Britax's Parkway SG and Maxi-Cosi's Rodi.

Booster seat manufacturer Dorel Juvenile Group, which makes Eddie Bauer and Safety 1st seats, pointed out in a company statement that five of its seats were rated "good" or "best bets" by the institute, although four were listed as "not recommended."

"We evaluate and continue to evolve current products to enhance their performance with new technologies and designs that reflect our leadership in child passenger safety," Dorel said in its statement.


The manufacturers of Evenflo and Harmony booster seats did not immediately respond to a request for comment. Both of those manufacturers had seats listed among the "best bets" as well as among the "not recommended" seats.

Thirty-six boosters fell between "not recommended" and "good bets," because the safety belts didn't consistently fit well when they were tested in a variety of vehicles.

"Unlike the top performers, consumers can't assume boosters in the in-between group will work in every family vehicle," said McCartt. "Some may be fine, but parents still need to try them out to see if the lap and shoulder belts fit their kids correctly."


To gauge booster safety, engineers placed a crash test dummy the size of an average 6-year old into each seat and measured the fit of the safety belts. Booster seats are designed for children ages four through eight.

For a full list of booster seats and ratings, visit: http://www.iihs.org/news/rss/pr090810.html