ARCHIVED BLOG POSTS
2014
0
Comments
Data breaches need not be launched maliciously in order to be very troublesome, as was the case involving about 3,700 Medicare Advantage members. Freedom Blue and Security Blue members received risk assessment results that actually belonged to other individuals. The addresses, birthdates, member ...
08/22/2014
4
Comments
Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire money for that new car or vacation package is most probably a rip-off. And the crooks behind these ...
08/21/2014
A few bungling burglars will be paying lots of time for their crime: one in prison and one six feet under. The surviving robber has been charged with the death of his alleged accomplice, even though the accomplice was shot dead by the owner of the home that they were apparently intending to rob. ...
08/20/2014
2
Comments
If you think that retailers are the biggest target for cyber criminals, you have it more than a wee bit wrong. Hackers are really going after the healthcare and pharmaceutical industries. In fact, “Will Healthcare Be the Next Retail?” is the name of a recent report released by BitSight Technologi...
08/19/2014
1
Comments
“You have won!” Yippeeee! NOT! Let’s see if you’re in that percentage of the population who will fall for this lottery scam. The alert can be an e-mail, snail mail or phone call, claiming you won a bundle of money. But keep this alert a secret due to some “mix-up in names” and you must contact a ...
08/18/2014
3
Comments
It’s August which for parents (and kids) means it is back to school time. It can be easy to reminisce about your school days—passing notes to the cute girl or boy in class, late-night study sessions with friends, or playing tag on the playground. But your kids’ school experience is way different ...
08/17/2014
1
Comments
The Better Business Bureau says beware of big summertime scams: five in particular. “Wow, it’s a steal!” No, that’s not necessarily from the customer; it’s from the crook who entices the consumer with an irresistible deal involving airfare and room and board. If you see a deal that seems too good...
08/17/2014
3
Comments
The purpose of antivirus (AV) software is to detect, neutralize or eradicate malware (malicious software). AV software not only will identify and destroy the computer virus, but it’s also designed to fight off other kinds of threats such as phishing attacks, worms, Trojan horses, rootkits and mor...
08/15/2014
1
Comments
It’s well-worth your time and money to make a burglar’s job very difficult. Employ the following home security tips: Lock up! How many times have you read about a home intruder who “entered through an unlocked window”? Keep your windows and doors locked as much as possible. Deadbolts. A deadbolt ...
08/14/2014
1
Comments
Some may remember the James Kim case out of Oregon in December 2006. Kim inadvertently chose an old logging road while driving home, getting lost in the woods. He left his wife and two young kids in the vehicle while he sought help, promising to return by early afternoon. He never did and his bod...
08/13/2014