Posts tagged "Security"

Biometrics are Like Passwords You Leave EVERYWHERE

biometrics,jpgBiometrics are like passwords, but worse.

Biometrics are like passwords that you leave everywhere (fingerprints, facial recognition, voice patterns), except that unlike passwords, you can’t change them when they’re lost or stolen. It’s easy to change your password, a bit harder to get a new retina. Like passwords, risk goes up as they are stored globally (in the cloud) versus locally (on a physical device).

In addition to the biometrics mentioned above that most of us have come to accept as commonplace, there are many other methods in use or under exploration:

  • hand geometry
  • vascular pattern recognition (analyzing vein patterns)
  • iris scans
  • DNA
  • signature geometry (not just the look of the signature, but the pen pressure, signature speed, etc.)
  • gait analysis
  • heartbeat signatures

Posted in Cyber Data Security by Identity Theft Speaker John Sileo.
Tags: , , , , , , , , ,

Snapchat Hacked? Duh! Of Course It Was.

Snapchat

Snapchat Hacked! Is there any sense of wonder left when another Internet giant (or any corporation, for that matter) gets hacked and loses your private information? No, the mystery died years ago, which is why we’ve basically forgotten about Target already. Of course Snapchat.com was hacked. Here’s the recipe for how your corporation can be like theirs:

  1. Collect a ga-gillion pieces of user data all while…
  2. Paying lip service to privacy and security measures until…
  3. Your database is hacked, the press circles & customers revolt while…
  4. You pay expensive recovery costs and belatedly decide to…
  5. Implement security & privacy measures that could’ve saved you a ga-gillion.

Breach Happens, no matter how big or how small you are. But breach destroys only when you are unprepared.  When it comes to privacy, the most effective medicine is getting burned. Snapchat is lucky to have experienced it early in their lifetime. When will you get hacked? Will it disappear in 11 seconds…

Posted in Cyber Data Security, Online Privacy by John Sileo, Identity Theft Speaker.
Tags: , , , , ,

12th Day: Holiday Security Tips All Wrapped up Together

Would you like to give the people you care about some peace on earth during this holiday season? Take a few minutes to pass on our 12 privacy tips that will help them protect their identities, social media, shopping and celebrating over the coming weeks. The more people that take the steps we’ve outlined in the 12 Days of Christmas, the safer we all become, collectively.

Have a wonderful holiday season, regardless of which tradition you celebrate. Now sing (and click) along with us one more time.

 On the 12th Day of Christmas, the experts gave to me:

12 Happy Holidays,

11 Private Emails

10 Trusted Charities

9 Protected Packages

8 Scam Detectors

7 Fraud Alerts

6 Safe Celebrations

Fiiiiiiiiiiive Facebook Fixes

4 Pay Solutions

3 Stymied Hackers

2 Shopping Tips

Posted in Identity Theft Prevention by John Sileo, Identity Theft Speaker.
Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

Sileo Speaking at NAFCU Technology and Security Conference

Credit Union Members: A special thanks to NAFCU for having me back a second year to present at their Technology and Security Conference.  Join us in Vegas for some fun and really get into the nuts and bolts of cyber security.

Screen shot 2013-09-09 at 11.04.06 AM

 
 

Posted in Cyber Data Security by Identity Theft Speaker John Sileo.
Tags: , , , , , , , ,

How To Turn Off Facebook Graph Search

Do you want to know how to turn off Facebook Graph Search?

If you walk onto a used-car lot and brag to the salesman that you’re rich, who’s to blame: the salesman for exploiting that information to sell you a car for more than it’s worth, or you for naively sharing in the first place? Both! The same is true in the hacking of the Facebook Graph Search data; Facebook AND poorly informed users SHARE the responsibility for this latest breach.

In case you haven’t heard the latest, Brandon Copley, a mobile developer in Dallas, Texas, was able to exploit Facebook’s Graph Search to collect 2.5 million phone numbers of Facebook users.  Copley is not a malicious hacker; he was simply trying to show how vulnerable the information is that people leave “public” on Facebook.

Posted in Online Privacy, Social Media Privacy by Identity Theft Speaker John Sileo.
Tags: , , , , , ,