Word Mongrel - Word Smith
Someone who lives by the written or spoken word.
Google Maps Has Been Tracking Your Every Move
By: Amando Flavio Via anonhq.com
It has emerged that Google has been tracking Smartphone users everywhere they go, indicating it with a red dot on a map to mark and make their location much clearer for identification.
If you do not believe this, you remember what appeared in the scene of the Minority Report, where Tom Cruise is on the run from the law, but is unable to avoid detection because everywhere he goes, there are constant retina scans feeding his location back to a central database? That is exactly what we are talking about here.
You can even track yourself to see whether what we are talking about is true or not. Just log in with the same account you use on your Smartphone. You will be able to see records of everywhere you have been from day one of that month.
Just follow this link:
https://maps.google.com/locationhistory/b/0
It is an established fact that no matter what privacy settings you may try to implement, your information is still being collected and stored somewhere by our governments.
But somehow, you can minimize your tracking by adhering to the following procedure below.
Just follow the following steps carefully and share this information with your friends, families and anybody you know.
How To Disable Tracking & Erase Your Past History
To check whether location history is enabled on your account, go to the Google Maps Location history page and click the gear-icon button to access History settings.
You can disable or enable the service there. Disabling location history however, does not remove your past history.
If you would like to erase the locations Google Maps has stored for the past 30 days, go back to the Location history page. The default time period shows location history for the current day, so you may not see any plots on the map. Use the pull-down menu below the calendar on the left to show your history, up to 30 days.
If you choose a time period in which Google Maps has tracked your location, you will see the points where you have been on the map. Below the calendar, you will see options to delete your history from the time period you have chosen or to delete all history.
Keeping Your Social Security Number Safe
Here’s a secret way to keep your identity—and that of your loved ones—secure: Don’t give out your Social Security number unless it’s absolutely required.
That’s right. Most of the time, it’s OK to say no to schools, doctor’s offices, sports clubs and many other organizations that may ask for this nine-digit identifier. In fact, safeguarding SSNs is a key first step to protecting against identity theft and other fraud.
Here are 10 places that have no business asking for a SSN:
1. Job applications
2. Hospitals or medical and dental offices
3. Pharmacies
4. Public schools
5. Sports clubs
6. Children’s camps
7. Supermarket loyalty programs
8. Charities
9. Airline ticketing and frequent flyer programs
10. Email messages
Unsure how to respond when someone asks for this number? It’s important to never hand it over blindly, Levin said. He recommends following these steps when determining how to react:
1. Stop and think. Take a moment to consider if there is a legitimate need for the SSN. Many places blindly ask for it, but some places, such as the IRS, Department of Motor Vehicles or military, may legitimately need it.
2. Negotiate. There are other identifiers, such as a driver’s license or account number, that may be used instead. Fight to use them.
3. Get assurance. If you must share your SSN, make sure there are strong security measures in place to protect it.
That’s right. Most of the time, it’s OK to say no to schools, doctor’s offices, sports clubs and many other organizations that may ask for this nine-digit identifier. In fact, safeguarding SSNs is a key first step to protecting against identity theft and other fraud.
Here are 10 places that have no business asking for a SSN:
1. Job applications
2. Hospitals or medical and dental offices
3. Pharmacies
4. Public schools
5. Sports clubs
6. Children’s camps
7. Supermarket loyalty programs
8. Charities
9. Airline ticketing and frequent flyer programs
10. Email messages
Unsure how to respond when someone asks for this number? It’s important to never hand it over blindly, Levin said. He recommends following these steps when determining how to react:
1. Stop and think. Take a moment to consider if there is a legitimate need for the SSN. Many places blindly ask for it, but some places, such as the IRS, Department of Motor Vehicles or military, may legitimately need it.
2. Negotiate. There are other identifiers, such as a driver’s license or account number, that may be used instead. Fight to use them.
3. Get assurance. If you must share your SSN, make sure there are strong security measures in place to protect it.
Internet of Things – Smart Technology
As smart home trends progress and more devices connect to the internet in a growing Internet of Things (IoT), it’s now a concern that your thermostat, lights or baby monitor could be hacked. Recently, CloudPets kids’ toys were breached, leaking 2.2 million voice recordings between parents and their children.
Even if you swear off all smart home technology, you probably still have everyday devices in your home that are susceptible to hacking. These can include:
• Digital video recorders (DVRs)
• Printers
• Security cameras
• Smart Televisions
• Tablets
• Smart Phones
• Routers
• Webcams
In October 2016, these types of devices were all used in a massive attack on internet servers. Hackers infected IoT devices with malware instructing them to ping the servers of Reddit, Spotify, The New York Times and other websites until they crashed from overuse. This type of incident is called a distributed denial of service (DDoS) attack.
Once they have control of your device, perpetrators have the freedom to do whatever they want – whether that’s turning on and recording via your security camera, changing passwords to lock you out or even printing something on your printer ‒ as one hacker did in early February 2017 to 150,000 printers.
Luckily, there are plenty of steps you can take to arm your devices and greatly reduce the chances of them being compromised
1. Update login credentials. Some devices like cameras and routers with weaker security come pre-loaded with default usernames and passwords. No matter what these preset credentials are, make sure you change them immediately if you haven’t done so already. When unprotected, smart home devices are some of the easiest devices for internet crawlers to get into – after all, they don’t even need to guess your login information!
2. Have a strong password. Lengthy passwords are the way to go. We even recommend using sentences at least 12 characters long. While it might be tempting, don’t reuse passwords across accounts. That way, if someone figures out your Facebook password, at least they can’t use the same password to log into your smart lock, unlock your door and stroll right in. Have unique passwords for all of your accounts. Write down your passwords and keep the list in a safe place separate from your computer – or consider using a password manager to help you set and store your strong, unique passwords.
3. Shop around for secure gadgets. Some companies put in the extra resources and efforts to secure their gadgets, while others do not prioritize it at all. The key is to research and ask yourself: what security measures does this company have in place for keeping my information safe? Look beyond just a username and password. Additional protection might include https connection, two-factor authentication, third-party penetration testing and AES 128-bit encryption.
Right now, there are thousands of routers and devices using generic logins. Hackers can deploy a simple internet crawler to discover these devices – it’s low-hanging fruit for them. As long as you protect your network and devices with strong, unique passwords, you are much less likely to have problems with suspicious activity.
Stolen ID
A man who assumed the identity of a baby who died in 1972 was arrested on charges of Social Security fraud and aggravated identity theft after the child’s aunt discovered the ruse through Ancestry.com.
Prosecutors said Jon Vincent stole Nathan Laskoski’s identity after escaping from a halfway house in March 1996 and used his new name to start another life. Vincent had been convicted of indecency with a child. The real Nathan Laskoski died at age 2 months in 1972.
Authorities said Vincent first obtained a Social Security card as Laskoski in 1996. He held jobs, received a driver’s license and married and divorced as Laskoski. When Nathan’s aunt did a search on Ancestry.com, a genealogy website, his name came up as a “green” leaf on the website, meaning public records showed he was alive.
The aunt told Nathan’s mother, who did more research and learned that someone had obtained a Social Security card under her son’s name. Nathan’s mother also found public marriage and divorce records, and filed an identity theft complaint with the Social Security Administration.
Traveling with Electronic Devices
Times are changing for people choosing to travel with electronic devices; not so much within the US but certainly international flights.
Electronic devices are not longer just laptops, now they are cellular phones, tablets, readers, and gamers.
When you approach the boarding gate you may be informed that your electronic device MUST be checked that it is no longer permissible to carry the device on board. You will be given a baggage claim check and instructed to collect it along with all other luggage at the baggage carousel.
The question posed, how safe is your data that is on the electronic device, how secure is the collection process - will photo id be required, who has access to the device, do you have data stored that may not be secure. What kind of personal or confidential information have you stored on your cellular phone, computer, or tablet?
Always check with the airlines to find out what their policy is concerning the transport of electronic devices, both domestically and internationally. Ask about security in handling and in retrieving.
Electronic devices are not longer just laptops, now they are cellular phones, tablets, readers, and gamers.
When you approach the boarding gate you may be informed that your electronic device MUST be checked that it is no longer permissible to carry the device on board. You will be given a baggage claim check and instructed to collect it along with all other luggage at the baggage carousel.
The question posed, how safe is your data that is on the electronic device, how secure is the collection process - will photo id be required, who has access to the device, do you have data stored that may not be secure. What kind of personal or confidential information have you stored on your cellular phone, computer, or tablet?
Always check with the airlines to find out what their policy is concerning the transport of electronic devices, both domestically and internationally. Ask about security in handling and in retrieving.
Medicare Cards and Social Security Numbers
Many consumers complain that while they remove their Social Security cards from their wallets, the Social Security number is still on their Medicare cards.
The ITRC would like to make the following recommendation. This simple tip could keep an identity thief from getting your Social Security number and protect yourself from becoming a victim of identity theft.
• Photocopy your Medicare card, front and back.
• Put your original card in a safe, locked area. Only carry it with you on the days you know you will need it.
• Using scissors, cut the photocopies of your Medicare card down to wallet size, cutting off the last four (4) numbers of your Social Security Number.
• Staple these two business card size papers together, adding a third blank paper to the packet.
On this blank sheet, write down following:
• Emergency contact with the name and phone number of a person who can be reached in the event of an emergency. Your emergency contact person should have a sheet of paper with the last 4 numbers of your Social Security number and the following:
1. Your pertinent medical history
2. The name of your doctors
3. A list of all the prescriptions you take, including over-the-counter pills.
The ITRC would like to make the following recommendation. This simple tip could keep an identity thief from getting your Social Security number and protect yourself from becoming a victim of identity theft.
• Photocopy your Medicare card, front and back.
• Put your original card in a safe, locked area. Only carry it with you on the days you know you will need it.
• Using scissors, cut the photocopies of your Medicare card down to wallet size, cutting off the last four (4) numbers of your Social Security Number.
• Staple these two business card size papers together, adding a third blank paper to the packet.
On this blank sheet, write down following:
• Emergency contact with the name and phone number of a person who can be reached in the event of an emergency. Your emergency contact person should have a sheet of paper with the last 4 numbers of your Social Security number and the following:
1. Your pertinent medical history
2. The name of your doctors
3. A list of all the prescriptions you take, including over-the-counter pills.
Subscribe to:
Posts (Atom)