Google Maps Has Been Tracking Your Every Move


By: Amando Flavio Via anonhq.com

It has emerged that Google has been tracking Smartphone users everywhere they go, indicating it with a red dot on a map to mark and make their location much clearer for identification.
If you do not believe this, you remember what appeared in the scene of the Minority Report, where Tom Cruise is on the run from the law, but is unable to avoid detection because everywhere he goes, there are constant retina scans feeding his location back to a central database? That is exactly what we are talking about here.

You can even track yourself to see whether what we are talking about is true or not. Just log in with the same account you use on your Smartphone. You will be able to see records of everywhere you have been from day one of that month.

Just follow this link:
https://maps.google.com/locationhistory/b/0

It is an established fact that no matter what privacy settings you may try to implement, your information is still being collected and stored somewhere by our governments.
But somehow, you can minimize your tracking by adhering to the following procedure below.
Just follow the following steps carefully and share this information with your friends, families and anybody you know.
How To Disable Tracking & Erase Your Past History
To check whether location history is enabled on your account, go to the Google Maps Location history page and click the gear-icon button to access History settings.
You can disable or enable the service there. Disabling location history however, does not remove your past history.
If you would like to erase the locations Google Maps has stored for the past 30 days, go back to the Location history page. The default time period shows location history for the current day, so you may not see any plots on the map. Use the pull-down menu below the calendar on the left to show your history, up to 30 days.
If you choose a time period in which Google Maps has tracked your location, you will see the points where you have been on the map. Below the calendar, you will see options to delete your history from the time period you have chosen or to delete all history.

Keeping Your Social Security Number Safe

Here’s a secret way to keep your identity—and that of your loved ones—secure: Don’t give out your Social Security number unless it’s absolutely required.

That’s right. Most of the time, it’s OK to say no to schools, doctor’s offices, sports clubs and many other organizations that may ask for this nine-digit identifier. In fact, safeguarding SSNs is a key first step to protecting against identity theft and other fraud.

Here are 10 places that have no business asking for a SSN:

1. Job applications
2. Hospitals or medical and dental offices
3. Pharmacies
4. Public schools
5. Sports clubs
6. Children’s camps
7. Supermarket loyalty programs
8. Charities
9. Airline ticketing and frequent flyer programs
10. Email messages

Unsure how to respond when someone asks for this number? It’s important to never hand it over blindly, Levin said. He recommends following these steps when determining how to react:

1. Stop and think. Take a moment to consider if there is a legitimate need for the SSN. Many places blindly ask for it, but some places, such as the IRS, Department of Motor Vehicles or military, may legitimately need it.

2. Negotiate. There are other identifiers, such as a driver’s license or account number, that may be used instead. Fight to use them.

3. Get assurance. If you must share your SSN, make sure there are strong security measures in place to protect it.

Internet of Things – Smart Technology


As smart home trends progress and more devices connect to the internet in a growing Internet of Things (IoT), it’s now a concern that your thermostat, lights or baby monitor could be hacked. Recently, CloudPets kids’ toys were breached, leaking 2.2 million voice recordings between parents and their children.

Even if you swear off all smart home technology, you probably still have everyday devices in your home that are susceptible to hacking. These can include:

• Digital video recorders (DVRs)
• Printers
• Security cameras
• Smart Televisions
• Tablets
• Smart Phones
• Routers
• Webcams

In October 2016, these types of devices were all used in a massive attack on internet servers. Hackers infected IoT devices with malware instructing them to ping the servers of Reddit, Spotify, The New York Times and other websites until they crashed from overuse. This type of incident is called a distributed denial of service (DDoS) attack.

Once they have control of your device, perpetrators have the freedom to do whatever they want – whether that’s turning on and recording via your security camera, changing passwords to lock you out or even printing something on your printer ‒ as one hacker did in early February 2017 to 150,000 printers.

Luckily, there are plenty of steps you can take to arm your devices and greatly reduce the chances of them being compromised

1. Update login credentials. Some devices like cameras and routers with weaker security come pre-loaded with default usernames and passwords. No matter what these preset credentials are, make sure you change them immediately if you haven’t done so already. When unprotected, smart home devices are some of the easiest devices for internet crawlers to get into – after all, they don’t even need to guess your login information!

2. Have a strong password. Lengthy passwords are the way to go. We even recommend using sentences at least 12 characters long. While it might be tempting, don’t reuse passwords across accounts. That way, if someone figures out your Facebook password, at least they can’t use the same password to log into your smart lock, unlock your door and stroll right in. Have unique passwords for all of your accounts. Write down your passwords and keep the list in a safe place separate from your computer – or consider using a password manager to help you set and store your strong, unique passwords.


3. Shop around for secure gadgets. Some companies put in the extra resources and efforts to secure their gadgets, while others do not prioritize it at all. The key is to research and ask yourself: what security measures does this company have in place for keeping my information safe? Look beyond just a username and password. Additional protection might include https connection, two-factor authentication, third-party penetration testing and AES 128-bit encryption.

Right now, there are thousands of routers and devices using generic logins. Hackers can deploy a simple internet crawler to discover these devices – it’s low-hanging fruit for them. As long as you protect your network and devices with strong, unique passwords, you are much less likely to have problems with suspicious activity.

Stolen ID


A man who assumed the identity of a baby who died in 1972 was arrested on charges of Social Security fraud and aggravated identity theft after the child’s aunt discovered the ruse through Ancestry.com.

Prosecutors said Jon Vincent stole Nathan Laskoski’s identity after escaping from a halfway house in March 1996 and used his new name to start another life. Vincent had been convicted of indecency with a child. The real Nathan Laskoski died at age 2 months in 1972.

Authorities said Vincent first obtained a Social Security card as Laskoski in 1996. He held jobs, received a driver’s license and married and divorced as Laskoski. When Nathan’s aunt did a search on Ancestry.com, a genealogy website, his name came up as a “green” leaf on the website, meaning public records showed he was alive.

The aunt told Nathan’s mother, who did more research and learned that someone had obtained a Social Security card under her son’s name. Nathan’s mother also found public marriage and divorce records, and filed an identity theft complaint with the Social Security Administration.

Traveling with Electronic Devices

Times are changing for people choosing to travel with electronic devices; not so much within the US but certainly international flights.

Electronic devices are not longer just laptops, now they are cellular phones, tablets, readers, and gamers.

When you approach the boarding gate you may be informed that your electronic device MUST be checked that it is no longer permissible to carry the device on board. You will be given a baggage claim check and instructed to collect it along with all other luggage at the baggage carousel.

The question posed, how safe is your data that is on the electronic device, how secure is the collection process - will photo id be required, who has access to the device, do you have data stored that may not be secure. What kind of personal or confidential information have you stored on your cellular phone, computer, or tablet?

Always check with the airlines to find out what their policy is concerning the transport of electronic devices, both domestically and internationally. Ask about security in handling and in retrieving.

Medicare Cards and Social Security Numbers

Many consumers complain that while they remove their Social Security cards from their wallets, the Social Security number is still on their Medicare cards.

The ITRC would like to make the following recommendation. This simple tip could keep an identity thief from getting your Social Security number and protect yourself from becoming a victim of identity theft.

• Photocopy your Medicare card, front and back.
• Put your original card in a safe, locked area. Only carry it with you on the days you know you will need it.
• Using scissors, cut the photocopies of your Medicare card down to wallet size, cutting off the last four (4) numbers of your Social Security Number.
• Staple these two business card size papers together, adding a third blank paper to the packet.

On this blank sheet, write down following:
• Emergency contact with the name and phone number of a person who can be reached in the event of an emergency. Your emergency contact person should have a sheet of paper with the last 4 numbers of your Social Security number and the following:
1. Your pertinent medical history
2. The name of your doctors
3. A list of all the prescriptions you take, including over-the-counter pills.

What happened to "drinking and driving"?


Are you ready to believe this? A drive up bar/social club! I came across this in Slidell, MS.

Diabetes Supply Scam

A database containing personal information of 918,000 seniors seeking discounts on diabetes supplies was revealed to be exposing its contents for months freely online.

The seniors provided their personal financial and health information to a program promising them discounts on diabetes supplies. But, according to a report on Naked Security, a Sophos blog, the database on which the information was stored ended up exposed for months after a software developer in the employ of a telemarketing firm uploaded a backup copy to the internet.

The database was found by a Twitter user, calling himself Flash Gordon, on an Amazon Web Services (AWS) instance at an IP address. He is said to have used Shodan, a search engine for connected devices that "crawls the internet, connecting to likely services, logging what comes back, and creating a searchable index of the results," according to the blog post.

Flash Gordon notified DataBreaches.net – a data security site run by a health care professional – about his discovery. At that point, DataBreaches.net reached out to security researchers for help. They found that the database was not from an entity liable under HIPAA laws, such as a health care provider. Rather, they discerned it was from a telemarketer as the data included scripted comments to use when engaging with patients.

The database included names, addresses, dates of birth, telephone numbers, email addresses, taxpayer IDs, health insurance carrier, policy numbers, and information about what types of health problems the individuals had.

The database has since been taken down.

The Sophos researchers advised that when called by a telemarketer offering great deals on diabetes supplies, be wary of providing personal information as there's no way to know whether the caller is legitimate. Additionally, any information a caller provides might get duplicated for use in other telemarketing campaigns.

How to Recognize Fake Homeless People From Real

"Are they really in need or just scamming me"?

While most people love to give to those in need, there are those people who panhandle as a method of income.

1. Their Gratitude or Attitude

One thing that helps to see if a person is truly in need is their attitude. While many people are leery of giving money, offer to buy them a sandwich or something to drink or even a days work for pay.

If they refuse the food, then they must not be in need.

Many alcoholics and drug dealers find that begging is one of the best ways to get the money they need for their next fix with meth, heroin or their drug of choice. Anyone that is truly down on their luck will gladly take any food that is offered to them, even if they just ate.

2. Their Appearance

If someone is homeless, you don’t expect them to be sitting there in nice clothes. Look for things that might tip you off that they are faking. Things like piercings, nice clothes, and even tennis shoes can be an indication of a fake. However, that doesn’t mean that people haven’t donated to them either. If they are a homeless person, they probably will need a good bath and may have an odor to prove it.

Also, a good indication of someone in real need is what they have with them. Someone in real need is going to have a bag or two, sometimes a sleeping bag with them. Think all their worldly possessions in a couple of bags. They are not going to put their stuff out of eye sight. People that are scamming you will NOT have these items so be on the lookout.

3. Observe the Surroundings

If the person is running a scam, they could be part of a larger group in operation. They may have a cell phone on them, or they may have a car parked close by for a quick getaway. Look for any abandoned cars or a bike close to them. If this is a group operation, the individuals may communicate via cellphone so they know where to relocate or when to make a quick get-away.

4. You See the Same Person Over and Over

People who panhandle on a daily basis are often habitual and play off the sympathy of others. It’s possible that they are doing it as a job not out of need. And yes, there are a lot of the same people that frequent the same areas.



Two reports from HUD, roughly 60% of people panhandling are actually not in need, leaving roughly 4 in 10 people either homeless, penniless or simply in need of work.

Is it good to help others, yes indeed! BUT helping a scammer doesn't help truly needed people.

However, if you REALLY WANT TO HELP, then donate to a local organization that works with the homeless, those in need of food and clothes and organizations that help place families in housing too. You can find a list of them here.

Hospital – Medical Breaches

Teaching hospitals are affiliated with medical schools, which use the facilities to help train future doctors. Teaching hospitals may offer more cutting edge technology and thinking, but also are typically more susceptible to patient data breaches. More people have access to patient data, increasing the risk and likelihood of personal information being left secure resulting in medical identify fraud in which someone else obtains medical care in your name and leaves you with bills and falsified medical records.

Data breaches affect health insurers, doctors' offices, hospital, laboratories, and other types of medical facilities. Reports must be submitted to the Department of Health and Human Services and to the media whenever the personal information of 500 or more people is breached.

Between 2009 and the end of 2016 141 hospitals reported breaches in patient information. The hospitals that reported data breaches were more likely to be major teaching hospitals than smaller teaching hospitals or nonteaching hospitals.

Limit the personal information you provide. Think twice before allowing the hospital to photocopy your driver's license or state ID, and if you permit this, make sure paper copies are shredded after they are scanned into a computer. Requests for SSNs are relics from the days when the number was necessary to bill you for services. Consider refusing and explain that you are concerned about security.

Travel – Boarding Passes

The seemingly innocent act of sharing a pic of your pass on social media could have serious repercussions.

According to KrebsonSecurity, websites exist that can read the barcode on your boarding pass and then hack your personal information, like your phone number, frequent flyer number, and info about all future flights you book through the same number.

That means they can then change your seat on your flight, cancel future flights, and even reset your account PIN entirely.

Click Control

Think before you click.

Bad guys often use shock headlines or pictures to catch your attention. These links could lead you to malicious website links, viruses or Trojans.

Credit Card Fraud – Account Takeover

According to research firm ‘Javelin’, identity fraud was up 16 percent to a record high 15.4 million new victims in 2016. Though so-called ‘chip cards’ were introduced as a safe way to use credit, they can still be used at less-secure ‘swipe’ card machines. Adding to the problem, a device called a ‘shimmer’ can steal card-user information just like the skimmers often found in the past designed to target swipe cards.

Crooks are simply finding other ways to steal personal information. The most common is account takeover, up 61 percent in 2016.

By simply changing someone’s address through the Post Office, your identity can be stolen and all your personal accounts compromised. With the stolen information, the fraudster can then signed up for new credit cards.

You may get a change of address letter of confirmation from the Post Office but by then, the damage is done

ATM Shimmers – Skimmers

An ATM skimming device that can be inserted into the mouth of the cash machine’s card acceptance slot and used to read data directly off of chip-enabled credit or debit cards.

The “shimmer,” so named because it acts a shim that sits between the chip on the card and the chip reader in the ATM — recording the data on the chip as it is read by the ATM.

Cards equipped with a computer chip are more secure than cards which rely solely on magnetic stripes to store account data. Although the data that is typically stored on a card’s magnetic stripe is replicated inside the chip on chip-enabled cards, the chip contains an additional security components not found on a magnetic stripe.

One of those is a component known as an integrated circuit card verification value or “iCVV” for short. The iCVV differs from the card verification value (CVV) stored on the physical magnetic stripe, and protects against the copying of magnetic-stripe data from the chip and using that data to create counterfeit magnetic stripe cards.

Banks can run a simple check to see if any card inserted into an ATM is a counterfeit magnetic stripe card that is encoded with data stolen from a chip card. But there may be some instances in which banks are doing this checking incorrectly or not at all during some periods, and experts say the thieves have figured out which ATMs will accept magnetic stripe cards that are cloned from chip cards.

The bad guys have also learned which retailers are using the old card readers that do not yet accept the chip credit cards.

Investment – Financial Services

What security measures are available through the investment house you use?

Scottrade Bank, a subsidiary of Scottrade Financial Services, Inc., recently secured a MSSQL database containing sensitive information on at least 20,000 customers that was inadvertently left exposed to the public.

The exposed database had no encryption and included 48,000 lessee credit profile rows and 11,000 guarantor rows, Vickery explained. Each row contained information such as Social Security Numbers, names, addresses, phone numbers, and other information that one would expect a bank to possess.

Medicare Benefits Scam

People submitting medicare claims for services not provided.

Always check any benefits statement you get to assure you actually received the benefits reported.

This is a typical scam used to report benefits or services provided to children or the elderly.

Mortgage Foreclosure Scam

Scammers are targeting people having trouble paying their mortgages. These so-called foreclosure rescue companies promise to stop foreclosure. But they're out to make a quick buck, and can turn a homeowners distress into disaster.
Well, I had been going through a dry spell – I had not traveled for three whole months, so Thursday evening I called my friend Debra Slone and asked how she felt about going on a road trip, starting the next morning. She thought about it for about 30 seconds and said sure. She had previously mentioned she would be interested in a road trip so, I now suggested we go to San Antonio.

Friday morning we hit the road and all was well. We spent the night in Slidell, LA and I had intended for our first stop to be New Orleans, however, in my usual ability to plan trips – that is a joke - I was without maps and had no idea how to find the French Quarter. Consequently, we – meaning me – managed to simply drive through New Orleans, missing the French Quarter all together. Who would have thought they would not have a sign on the interstate pointing out the direction to the French Quarter! Before I knew it, we were driving through Baton Rouge.Thought you might enjoy seeing the current capitol building and the old capitol building.


Between a morning rain shower and a marathon that was being run, streets and businesses were closed. We generally we were not impressed so decided we would just head west – toward Galveston, TX. Again, being the ingenious person that I am, and traveling without maps, I decided to take a road other than the interstate.

Driving along the Gulf of Mexico coastline we saw some interesting architecture. Debbie is now convinced I had lost my mind – if I ever had one – because I was taking pix left and right. It is a good thing there were very few other vehicles on the road we were on.

If you have never seen a library on stilts – don’t feel bad, neither had I. I also have no explanation as to how they handle handicap access. This caught my attention – warped as it is. The clearance for “book drops” is 9’6”.The was a gorgeous sculpture at the front of the library building.


The churches were also on stilts – as well as the police department and all the other government buildings.I do not know how they accommodate handicapped persons.Did you ever see a Catholic church with gargoyles?


Of course, I guess you have to appreciate the rationale of putting a double wide mobile home on stilts.How about a single-wide on stilts? These appeared to be raised at least 20’.Even the electrical service is on stilts.Whole subdivisions were built as what appeared to be year round homes and summer homes.


I could not guess why this farmer had all these porta- potties lined up across his yard.

That actually was sort of fun until we ran out or road. The road ended at a line of cars, boarding a ferry so we got in line with everyone else. The fellow directing the loading was really very nice, but didn’t quite know what to say when I asked where we were going.

When we got off the ferry we were greeted by a rather large billboard that “welcomed” us to Texas.

So far, two things were very clear to us and both things contradicted what should have been. Every town or city we had driven through was very hazy and it was extremely windy. It boggles the mind how it can be windy and still hazy. The beaches along the Gulf were certainly not inviting. The beaches were trashed and the water was rough and swelling. The Gulf Coast really should be named the “land of bridges” because we must have crossed over a 100 bridges, causeways and overpasses as we traveled through southern Louisiana and Texas.

One of many bridges and note how thick the haze is.You want to see pipeline, you should see all the pipe running above ground across Louisiana and Texas.


Again, as luck would have it, we ran out of road and ended in line to board another ferry. On the first ferry there were only about nine vehicles, but, on the second ferry there were probably, at least, 100 vehicles – and it was free and landed us in Galveston.
The background is as clear as it is going to get – that is haze you are seeing and the pipeline runs down the middle of the beach for literally miles.

The thing I love about Galveston is the architecture. If you want to see beautiful homes from the 1800s go there! But, the haze is overwhelming and the wind will beat you senseless.
This is a lift seat for a handicap person so they can get into the pool. This was installed at our hotel and the first I had seen such a device.
I had to sneak this pix of a police officer from the University of Texas campus. The interesting thing is, all the way around her back and front waist, she has weapons of some type. There is no spot that was not used. Both her leg pockets were also full. Do you wonder what is happening on the UT campus?

There are tree sculptures scattered all over Galveston. We saw a few, but I kept getting distracted looking at the houses.

This is a Sacred Heart hospital.

Typical victorian architectural. This “social, or garden, club” was built in 1876 by a group of German businessmen. Only Germans or German speakers could hold stock in the club.

After Galveston we finally made it to San Antonio, where we did the Hop-On Hop-Off tour to gather an overview of the history of the area. Right off the bat the tour guide said something that confused me and I could not immediately reason out the facts. The guide said that the “Alamo” was not and never was a fort but was always a church. Well, the statement forced me to do a little research.

The Alamo and was founded in the 18th century as a Roman Catholic mission and fortress compound for the purpose of educating area American Indians after their conversion to Christianity.

The mission was secularized in 1793 and then abandoned.

Ten years later, it became a fortress housing the Second Flying Company of San Carlos de Parras military unit, who likely gave the mission the name Alamo. During the Texas Revolution, Mexican General Martin Perfecto de Cos surrendered the fort to the Texian Army in December 1835, following the Siege of Béxar. A relatively small number of Texian soldiers then occupied the compound for several months. They were wiped out at the Battle of the Alamo on March 6, 1836. When the Mexican army retreated from Texas several months later, they tore down many of the Alamo walls and burned some of the buildings.

So, by my research, I would say while it was not called “Fort Alamo”, it served as a fort and suffered through battles, therefore, it was a fort.

Welcome to the Buckhorn Restaurant and Museum where you can find over 500 different stuffed animals on display.

Apparently, the use of cell phones in the schools is not a problem.

The is a mural on the side of the Goodwill store across from the Market Square.

This is where the locals, and tourist, hang out - at “The Friendly Place”.
You can always take a carriage ride, but the gagas just don’t seem the perfect fit in “old town” San Antonio.

Of course we visited Riverwalk at ate at “Dick’s Last Resort”. I had eaten there before; the food was good, but not as good the second time around. You probably have to be a party animal and half soused to appreciate the atmosphere.

The Market Square hasn’t changed since I was there – it still has many beautiful items, but as with everywhere else, it is not all made locally or in Mexico.



Like Galveston you have to enjoy the architecture of San Antonio.

After San Antonio we headed back to New Orleans, determined not to miss a visit to the French Quarter.

We got a late start and had to wait out a thunderstorm, but finally made it to the French Quarter. After driving around for a while, or I should say sitting around in traffic, just absorbing the atmosphere, we finally made our way to the Welcome Center and joined the Hop-On Hop-Off tour so we could learn a little history.

New Orleans was founded in 1718 by Jean-Baptiste Le Moyne de Bienville. The city developed around a central square. That square, the oldest part of the city, became known as the French Quarter. The architecture is a mish mash of styles from the creole cottages, shotgun houses, and American town houses which have multi-levels built with brick or stucco and have a balcony. The Creole town houses are also built with brick or stucco, but have cast iron balconies and courtyards. The shotgun houses are only 12’ wide and one story. There are the double gallery (looks like a balcony, but is not called a balcony) – homes built with columns that supported the galleries and they have side gable roofs. The California bungalow was spread out rather than tall and has a concrete porch with a roof overhang. The construction styles were originally heavily influenced by the Spanish, Greek and French. By the 19th century the influence was American and French.

The Spanish influence was never strictly Spanish. It was Creole, which is a mixture of the French and Spanish with a dab of Carribbean for good measure.

Many buildings and homes have the cast iron and wrought iron railings and banisters.

Here are two samples of how they have painted scenes on their buildings.


Maintaining the architectural style, the facades are left intact and everything else is removed. The new construction is then attached to the old façade.

Want to know what is happening everyday at the Little Gem Saloon, just read the board posted outside the Saloon.

This is not a heavy traffic day – yeah right! Before the hurricane damage, we were told, 1.5M people lived in New Orleans; now only about 350,000. So, they say today, it is not crowded.

It is a festive past time to see who can land strings of necklaces in trees or on balconies.

Architectural styles


Bridge over the Mississippi River.

Here is an interesting fact for you. New Orleans has the oldest continuously operating street railway system in the world.

The warehouse district is not really warehouses any more. It is now the arts district and includes a new convention center that runs one mile in length.

The garden district is not a garden – it was named that because the homes each contained a garden.

We went by where the television program NCIS New Orleans is shot, as well as many other television programs and movies. There was a glimpse of where all the Mardi Gras floats are made and stored. I did see the new WWII museum and wish we had time to visit. The tour bus drove by the French Market and Flea Market but we opted to call it a day. We had seen all we wanted to see by that time.

Driving back through Mississippi the water was smooth as glass, the sun was shining, traffic was light, the homes along the Gulf Coast through Long Beach, Gulfport and Biloxi were breathtaking. There are still numerous vacant lots as a result of the hurricane damage, but the area is still a sight to behold.

Well, Debbie and I covered 2,350 miles during our eight day road trip to San Antonio. Now, it is good to be home.

That’s all for now - until next time.

ONLINE SHOPPING TIPS


• CONDUCT RESEARCH: When using a new website for purchases, read reviews and see if other consumers have
had a positive or negative experience with the website.

• WHEN IN DOUBT, THROW IT OUT: Links in emails, posts and texts are often the ways cybercriminals try to steal your information or infect your devices.

• PERSONAL INFORMATION IS LIKE MONEY: VALUE IT AND PROTECT IT: When making a purchase online, be
alert to the kinds of information being collected to complete the transaction. Make sure you think it is necessary for the vendor to request that information. Remember, you only need to fill out required fields at checkout.

• USE SAFE PAYMENT METHODS: Credit cards are generally the safest option because they allow buyers to seek
a credit from the issuer if the product isn’t delivered or isn’t what’s ordered.

• DON’T BE DISAPPOINTED: Read return and other policies so you know what to expect if the purchase doesn’t
go as planned

• PROTECT YOUR $$: When shopping, check to be sure the site is security enabled. Look for web addressed with https:// indicating extra measures to help secure you information. Being a safe and secure shopper starts with STOP. THINK. CONNECT.: take security precautions, think about the consequences of your actions online and enjoy the conveniences of technology with peace of mind while you shop online. Remember these tips during all online purchases.

SHOPPING ON THE GO
• NOW YOU SEE ME, NOW YOU DON’T: Some stores and other locations look for devices with Wi-Fi or
Bluetooth turned on to track your movements while you are within range. Disable Wi-Fi and Bluetooth when not in use.

• GET SAVVY ABOUT WI-FI HOTSPOTS: Limit the type of business you conduct over open public Wi-FI
connections, including logging on to key accounts, such as email and banking.

BASIC SAFETY AND SECURITY TIPS
• KEEP A CLEAN MACHINE: All web-connected devices – including PCs, smartphones and tablets – free from
malware and infections by running only the most current versions of software and apps.

• LOCK DOWN YOUR LOGIN: Fortify your online accounts by enabling the strongest authentication tools
available, such as biometrics, security keys or a unique one-time code through an app on your mobile device. Your usernames and passwords are not enough to protect key accounts like email, banking and social media.

• MAKE BETTER PASSWORDS: If your passwords are weak, improve them by adding capital letters, numbers and
symbols using different passwords for every account.

Medicare Card Changes Means Opportunities for Scams

Congress passed a law in 2015 that requires the Centers for Medicare and Medicaid
Services to remove Social Security numbers from all Medicare cards, which they will start
doing in April 2018. New beneficiaries will get the modernized cards first, and then new
cards will be issued to existing beneficiaries. This is an important change to help prevent
fraud and protect people’s identity, but with any new change, scammers are taking
advantage of potential confusion.

What You Should Know:

Medicare beneficiaries are getting calls claiming to be from Medicare asking for
payment to receive their new Medicare card, or asking them to verify their
Medicare number.

Medicare will NEVER call to verify your number because they already have it.
There is no cost to get your new card.

What You Should Do:

If you get a call like this, hang up immediately and report it to Senior Medicare
Patrol. Find the number to call for your state at www.smpresource.org.

Imposter – Spear Phishing


This is targeted phishing, where the attacker digs up your personal information, such as your family history, where you live, your mother’s maiden name, your social security number, or possibly, your mortgage or banking information.

The perpetrator will call, pretend to be your mortgage company, notifying you by email that your mortgage has been sold to another company and instructing you to now send payments to a new company name and address. A link will be provided in the email that will take you to a fake website.

Wiring Money


Unless it is your idea, and you initiated a call, never wire money.

Always verify the institution’s credentials and the recipient's identity.

Research all the who, what, why, when and where on the web before committing.

Bait and Switch Advertising


Businesses sometimes advertise a product or service at an irresistible price that is impossible to get. The business then uses a hard sell technique to up-sale or substitute the product. You end up purchasing something you did not want or need or never intended to purchase.

Dell Computers paid $4M in 2009 to settle a charge by NY state that it was deceiving customers by advertising low prices that weren’t available to most people.

COSTCO settled a lawsuit as well for advertising handbags at a very low price to lure customers when few if any were available to purchase.

Bogus Memberships

Be wary of online memberships or the tradition of purchasing something that results in ongoing purchases.

Emails may allude to a subscription or purchase you did not make, with links to cancel or contact the company. Once you click on the link, you expose sensitive information to scammers.

You may get an unsolicited offer to renew a favorite magazine or service for a rock-bottom price. It looks legitimate. You enter your personal and credit card information into a bogus website.

Gift Cards


The value you purchased may not be the value provided on the card because of shaved undisclosed terms, conditions and fees.

Scammers go to gift card displays and scan a card’s number. The unique digital number stores and keeps track of the balance on the card. After you purchase the card, the thief can call the issuer and check the balance to see if it is below the original value. If so, the crook knows the card has been activated and knows how much money is left to be stolen.

Returns


Ask about return policies and fees.

Some merchants will charge a large fee for the privilege which you may not catch. Check your credit card or debit card account to assure you received the proper amount or were not charged a return fee.

Credit Card Company – Bank Card Con


You receive a call from your bank or credit card company. The called indicates there is a problem with your account and asks you to verify your personal information and account number.

Hang up!

Travel


Do not wire money to a company without completing your research.

If you receive unsolicited email offering deals too good to believe, they probably are.

Check the cancellation policies before sending deposits.

If you lose your cell phone and a good Samaritan call, promising to mail your phone to you, it is probably a delay tactic.

While staying at a hotel, if you get a call asking to verify your form of payment, do not give them the information – go to the front desk.

Make sure the hotel or B&B even exist. The rate may be too good to believe because it does not exist.

If someone offers to take your pix, using your camera, it may be a ploy to steal your camera.

Do not use outside ATM’s – go inside the bank or place of business. Look over your shoulder, protect your input.

IRS – Debt Collectors

The IRS has contracted with four companies to go after people with lingering federal tax debt. The law was passed in late 2015 to capture some of the $400B in tax debt that eludes the IRS.

Private contractors will be assigned accounts. Those targeted will get a letter in the mail before anyone calls to alert them that their account has been transferred to a private agency.

The collectors will be allowed to identify themselves as IRS contractors. They won’t take money directly but they will lay out options for people to pay the US Treasury by check or electronically.

Buying a New or Used Car

You’re looking to buy a used car and want some peace of mind, so you choose a dealer that advertises rigorous, bumper-to-bumper safety inspections. You can drive off the lot with confidence, right? Not so fast.

Today the FTC announced that General Motors Company, Jim Koons Management Company, and Lithia Motors have agreed to settle charges they deceptively marketed their used cars when they made claims about their comprehensive inspections.

The issue? According to the FTC, many of the cars they advertised as having undergone thorough inspections still had open recalls for safety-related defects, including recalls for defective ignition switches — a fact they didn’t make clear to prospective buyers.

Dealers aren’t required to — and sometimes can’t — fix manufacturer recalls on the used cars they sell. But if they say they’ve done an extensive inspection on a car, the FTC says they also need to say whether there are still unrepaired recalls. That way, buyers know to get them fixed, or can decide to buy another car instead.

Under the settlement, the companies must stop making deceptive claims about their recall repair practices, and must notify recent customers who may have bought a used car subject to a recall. When you shop for a used car, keep in mind that federal law doesn’t require dealers to fix recalls.

So make sure you:
• Ask questions. Ask the dealer if the car you’re considering has a recall, and whether the dealer will fix it before you take the car home.
• Check for yourself. Take down the VIN number of a car, and enter it at the National Highway Traffic Safety Administration’s recall look-up website safercar.gov. You also can get information to help you follow up with a manufacturer or dealer about a recall.
• Check out the vehicle history report. The report will tell you about a car’s title, odometer, theft, or salvage history, and might also provide recall information. Ask your dealer — they’ll often provide them for free. For links to companies that sell the reports, go to vehiclehistory.gov.

Paid Monitoring Services

There are “paid” services that claim they will monitor your financial accounts and promise you will not suffer from identity theft; and help you when the worst happens. Are they doing anything over and above what you can do or will be expected to do, under their direction, yourself. Is the offer legitimate? Some protection is automatically provided through your bank, credit card companies, insurance companies, etc. Verify what protection you already have. Nobody can guarantee you won’t experience identity theft. Those services offer identity monitoring and repair — things you can do yourself, for free.

Concern about identity theft has spawned many companies that watch information sources — most notably, your credit report — for signs that an identity thief may be using your personal information to get loans, open credit card accounts, or otherwise cause financial havoc. You can pay them to alert you to possible trouble, or simply keep watch yourself.

What if you find an identity thief has struck? You can get free recovery help at IdentityTheft.gov.

You can report identity theft to the FTC and get a personal recovery plan that:

• walks you through each recovery step
• tracks your progress and adapts to your changing situation
• pre-fills letters and forms for you to send to credit bureaus, businesses, debt collectors, and the IRS

Telephone Scams

The IRS will never call to demand immediate payment, nor will the IRS call about taxes you owe without first mailing you a bill. If you get a live or pre-recorded call claiming to be from the IRS and demanding payment right away, hang up. If you know you owe taxes or think you might owe, you can call the IRS at 1.800.829.1040 to explore your options.

Don’t trust your caller ID. Scammers can make caller ID look like anyone is calling: the IRS, a business or government office. If they tell you to pay money for any reason, or ask for your financial account numbers, hang up. If you think the caller might be legitimate, call back to a number you know is genuine – not the number the caller gave you.

Any phone call that starts by asking a question that will prompt a “Yes” for response – hang up and do not hold a conversation with the caller. The call will be recorded and then your voice will be spliced into a conversation “agreeing” to purchase some product or service.

Income Tax Scam

The IRS doesn't initiate contact with taxpayers by email, text messages or social media channels to request personal or financial information. In addition, IRS does not threaten taxpayers with lawsuits, imprisonment or other enforcement action.

An aggressive and sophisticated phone scam targeting taxpayers, including recent immigrants, has been making the rounds throughout the country. Callers claim to be employees of the IRS, but are not. These con artists can sound convincing when they call. They use fake names and bogus IRS identification badge numbers. They may know a lot about their targets, and they usually alter the caller ID to make it look like the IRS is calling.

Victims are told they owe money to the IRS. Fake debt collectors will attempt to pressure you into paying taxes owed through a non-traceable source, such as a money order.

The IRS saw an approximate 400 percent surge in phishing and malware incidents in the 2016 tax season.

Taxpayers are receiving emails that appear to be from TAP about a tax refund. These emails are a phishing scam, where unsolicited emails which seem to come from legitimate organizations — but are really from scammers — try to trick unsuspecting victims into providing personal and financial information. Do not respond or click the links in them

Be assured that the tax professional that you use is actually a tax professional. Some unscrupulous people will open shop during tax season for the sole purpose of stealing identities. Be leery of the promised big refunds. Review your returns closely to make sure the deductions and income claimed are true and reported accurately.

Using your name, someone else files your tax return, using your social security number, claiming extra dependants or deduction, with your personal information but a different address. There is a refund, but it does not come to you. You file your tax return and the IRS notifies you it is a duplicate return.

If you get an email from the IRS, forward it to: phishing@irs.gov. If by letter, contact: Treasury Inspector General for Tax Administration at 1-800-366-4484.

If working with an accountant, you should query them on what measures they take to protect your information.

Health Care and Personal Hygiene Products


Scammers create fake websites, use fake endorsements from public figures and of course, lie about the effectiveness of their products. The sites appear to be “news releases or broadcast” and use public figures such as Stephen Hawking and Anderson Cooper. The spoof sites are sales pages.

Research products and talk to your doctor before you purchase anything that appears as a “wonder” drug or product.

Ineffective wonder drugs and medications such as “brain pill”, CogniPrin and FlexiPrin were offered risk-free with a trial period and guarantees based on unsubstantiated health claims.

Ads displaying a “doctors seal” may not be legitimate - did the doctor really review the product, or is the doctor a real doctor?

Debt Collector and Mortgage Scam Calls


This scam involves phony debt collectors posing as attorneys, debt collection agencies, or law enforcement officers demanding immediate payment on delinquent loans or on loans consumers received but for amounts they do not owe. Often times, consumers are threatened with lawsuits or arrests, if payments are not made.

An India based telephone call center over a period of six months posed as debt collectors for government agencies, credit card companies and businesses. They sent “mules” or “runners” to collect the money, immediately. $1.5M dollars were scammed from 3,000 people before they were caught.

During 2015-16, the FTC and 70 law enforcement and regulatory partners brought more than 165 actions against illegal debt collectors. The FTC went after 20 unlawful debt collection enterprises. We added 44 collectors to the banned debt collectors list in 2016 alone, and won three important summary judgements.

Mortgage scammers falsely claimed they can lower consumers’ mortgage payments and interest rates or prevent foreclosure.

Local Scams

CAUTION!! SCAM ALERT!! – GRAND JURY PHONE SCAM has started again.

We have received multiple reports in reference to a phone scam. The person calls and tells the victim that he is with the Columbia County Sheriff’s Office and that the victim has missed jury duty and a warrant has been issued for their arrest. To prevent being arrested, they are told that they need to pay a fine by purchasing a pre-paid card at a local store and provide the numbers to the caller to confirm the funds.

Please be advised that these individuals DO NOT represent our agency and Sheriff’s Office DOES NOT conduct business in this manner. Once a warrant is written and signed by a judge, it will be served.

We DO NOT accept money, i.e. cash, Green Dot money pack, Western Union or otherwise for the disposal of a warrant. If you are faced with a situation similar to this it is best to hang up.

*******************
The Columbia County Sheriff's Office wants to warn the public that there is an IRS scam currently in operation. The scammers pose as IRS agents and call victims to warn them that they are delinquent on their taxes. They then have the victims call a phone # and try to gain personal information from them and even threaten that the victim will be arrested if they don't pay the delinquent taxes.

This is a scam. DO NOT give out any personal information over the phone.

**************
The Lake City Police Department has become aware of a scam that is confirmed to have occurred locally.

The scammer approaches victims identify themselves as a traveling prophet and healer. They are primarily targeting elderly citizens that attend church. The scammers ask victims to open a bank account to support them and their church as they travel.

The suspects then deposit counterfeit "Mobile Deposit" checks. After the deposits are made the scammers asks the victim to make a withdrawal. The victim is held accountable when the checks are discovered later to be fake.

Please be aware of this scam and do not open bank accounts for others. Legitimate faith-based organizations have other means to collect income. If you encounter this scam, please call us immediately.

Telephone Query


Telephone Number displayed on the Caller ID: ____________________
Name as it appears on the caller ID: ____________________________

Name of Caller: _________________________________________________
Telephone Number: _______________________________________________

Name of Supervisor: _____________________________________________
Telephone Number: _______________________________________________

Name of Company: ________________________________________________
Type of Company: ________________________________________________
Address of Company: _____________________________________________
_________________________________
Company Telephone Number: _______________________________________
Company Federal Tax ID Number: __________________________________
Company State Tax ID Number: ____________________________________
Company Website: ________________________________________________

Do You Subscribe to the Federal Do Not Call Registry __ Yes __ No
Do You Subscribe to the State Do Not Call Registry? __ Yes __ No

If the call was a Robo/Computer generated call (pre-recorded
sales pitch) – Do you (the Caller) have written permission from
me that authorizes you to call me? _____ Yes _____No

What is the purpose of your call: ________________________________
__________________________________________________________________
__________________________________________________________________

Do you understand I will provide, nor confirm any personal information:
_____ Yes _____No

Are you a registered/licensed Telemarketer? _____ Yes _____No

What process do I follow to activate the “Opt-Out” option so that
you never contact me again. _____________________________________
__________________________________________________________________

Do Not Call

Those who violate the National Do Not Call Registry or place an illegal robo call can be fined up to $16,000 per call.

The National Do Not Call Registry is only for personal phone numbers. Business-to-business calls and faxes are not covered.

Consumers may place their cell phone number on the National Do Not Call Registry to notify marketers that they don't want to get unsolicited telemarketing calls.

Federal Communications Commission (FCC) regulations prohibit telemarketers from using automated dialers to call cell phone numbers without prior consent. Automated dialers are standard in the industry, so most telemarketers are barred from calling consumers' cell phones without their consent.

Placing your number on the National Do Not Call Registry will stop most telemarketing calls, but not all. Calls from or on behalf of political organizations, charities and telephone surveyors are permitted.

Exemptions to the DNC:

1. If you have an established relationship with a business, it can call you for up to 18 months after your last purchase, payment or delivery — even if your number is on the National Do Not Call Registry.

2. If you make an inquiry or submit an application to a company, it can call you for three months afterward.

3. Any questionnaire, lottery, contest, sweepstakes, request for free products or coupons – anything you originate or initiate, anything you sign, affix your signature to or provide an email address will be exempt.

Florida also has a Do Not Call List, however, there are also exceptions.

1. A prior or existing business relationship exists.
2. In response to an express request of the person called.
3. From a newspaper publisher.
4. In connection with an existing debt or contract.
5. A real estate agent responds to a yard sign or other advertisement.
Charitable organizations, political candidates, research or survey companies seeking an opinion and collection agencies attempting to collect on a debt are also allowed to call subscribers because their calls are not considered a “commercial telephone solicitation”.

Most commercial telemarketers are prohibited from calling any number on the list to sell a consumer goods or services. Florida law also prohibits a telephone sales call made with a prerecorded message and without a “live” person to introduce that message. Additional, it is a violation for companies to make telephone sales calls before 8AM or after 9PM, local time or refuse to provide the solicitor’s name or telephone number to the party called.

The FTD reported that in one case defendants allegedly made more than 1.3 million illegal calls to consumers nationwide, 80 percent of which were to numbers listed on the DNC Registry. Over a two month period in 2016 defendants placed at least 800,000 calls to numbers listed on the Do Not Call Registry.

Background check


A multitude of websites will be happy to run a background search for you, for a fee, some charge as little as 99 cents. You might be surprised as to what information is available.

Type your name into a website browser search page to see what you may find.

Credit Card Reporting Agencies


Equifax: Call (800) 525-6285 or visit www.equifax.com
Experian: Call (888) 397-3742 or visit www.experian.com
Trans Union: Call (800) 680-7289 or visit www.transunion.com

Only one website is authorized to fill orders for the free annual credit report you are entitled to under law — annualcreditreport.com. Other websites that claim to offer “free credit reports,” “free credit scores,” or “free credit monitoring” are not part of the legally mandated free annual credit report program.

You're entitled to one free copy of your credit report every 12 months from each of the three nationwide credit reporting companies. You may order your reports from each of the three nationwide credit reporting companies at the same time, or you can order your report from each of the companies one at a time. The law allows you to order one free copy of your report from each of the nationwide credit reporting companies every 12 months.

Order online from annualcreditreport.com, the only authorized website for free credit reports, or call 1-877-322-8228. You will need to provide your name, address, social security number, and date of birth to verify your identity.

The FCRA specifies who can access your credit report. Creditors, insurers, employers, and other businesses that use the information in your report to evaluate your applications for credit, insurance, em¬ployment, or renting a home are among those that have a legal right to access your report.

A credit reporting company may not provide information about you to your employer, or to a prospective employer, without your written consent.

Consumer Alerts & Scams


Today, thieves are coming up with more and more devious ways to try and trick you into giving them your personal information, one of which is through scams. Scams can take the form of emails, text messages, phone calls, through social media accounts and more.

It is of prime importance to know the scams that thieves use to trick you into giving information. They then use the information to steal your identity.

The FTC has identified several types of fraudulent and deceptive schemes that affect and are targeted specifically toward seniors:

Sweepstakes, prize promotions and lotteries
Timeshare sales and resales
Health care products and services
Investments, business opportunities and work-from-home programs
Technical support services
Charitable donations

What information do thieves want?

Social Security Numbers
Bank account or credit card numbers
Driver’s license number
Insurance policy numbers (medical and auto)
Date of birth
State or employee identification number.

Universal Rules

If something sounds too good to be true, it probably is.
A bank, credit card company, or utility company will never ask for your personal information by email, whether you have an account or not, period.
Never give out personal information, credit card or account numbers on calls/emails/texts that you didn’t initiate.
Before clicking on any links within emails or text messages, be sure to confirm the sender is legitimate.
Always be on the lookout for bad English and grammatical errors.

Types of Scams

The Home Security Scam: This scam involves replacing or installing a new home security system. The majority of the salespeople are not licensed to sell door to door. The contract may actually be a three phases scam: installation, monitoring and sales, with each representative collecting a part of the commission. Canceling the contract becomes a nightmare and typically the consumer will hang up out of frustration.

Lottery, Prize Scams: Lottery scams target consumers under the guise of winning the lottery. The scam begins with a telephone call congratulating the consumer. Once the caller convinces the consumer of their new-found wealth, the only thing left to do is claim the jackpot. To do this, the consumer is told they have to send money to cover fees and taxes associated with their winning.

Financial Scam: Without your knowledge, someone opens a bank or credit card account or took out a loan in your name, using your personal information. How did they get the information? They took it from your street mailbox, from your trash or off the internet, or even by listening to a conversation at a store checkout. Shred any documents that contain personal information. Get a lockbox mailbox. Be extra careful what you post on social networks.

Unclaimed Property Scam: A company calling themselves The Florida Department of Financial Restitution has been contacting consumers claiming to be on contract with the Department of Financial Services and trying to collect a $600 upfront fee to recover unclaimed property. There is no legal entity named The Florida Department of Financial Restitution, and consumers should not agree to this offer, sign a contract or send any money to the Florida Department of Financial Restitution.

Social Network Scam: Someone goes into your account, steals your ID and pix, basically goes in reports the account has been compromised, changes the password and has access to your personal information and contacts.

Banking Scams: Someone pays you by check or asked you to cash a check for them. You present it to your bank and learn it is a fraudulent check. You receive a check, perhaps for a refund or as a prize for merchandise you did not order or a contest you did not participate. You cash the check. By cashing the check, and not reading the fine print, you agreed to purchase some wonder drug every month for the discounted price of $125 or entered a legal agreement to purchase a new car.

Medicare – Insurance Scams: This can range from enrollment scams for supplemental or drug coverage to doctor visits or prescription meds. The scammers may ask to confirm your personal information, credit card or banking information. This could be presented as wanting to clarify information, or to confirm information prior to sending out to insurance cards. Charged might show up on your monthly or quarterly statements implying you have received treatment and incurred costs when you did not.Your health plan rejects your legitimate medical claim because the records show you’ve reached your benefits limit. A health plan won’t cover you because your medical records show a condition you don’t have.

Government Will Pay Your bills for you Scam: The presentation usually happens to church congregations where the speaker announces that for an upfront administration fee, the government will take over the automatic payment of your bills. The government will NEVER pay your bills for you!

Travel Scams and Safety

Travel scams target consumers under the guise of winning a free trip. The scam begins with a telephone call congratulating the consumer. Once the caller convinces the consumer of their “free” vacation, the only thing left to do is claim the present. To do this, the consumer is told they have to send money to cover fees and taxes associated with their winning.

The universal keys to a successful and safe trip are:

Use common sense
Plan and then plan some more so that all details are “detailed”
Leave a copy of all pertinent documents with someone you trust, at home.

Tips for traveling safely:

1. If you are not a savvy traveler, always travel with a companion.

2. Pack light. You do not need to take everyone you have at home with you. Do not take more than you are prepared to handle yourself.

3. Leave a copy of the front and the back of your credit cards at home, but also take a copy with you – but, keep it in a different place than you keep your credit cards.

4. Leave a copy of your passport at home – but, but also take a copy with you – but, keep it in a different place than you keep your passport.

5. Do not carry all your credit cards. Just take one or two.

6. Notify your credit card companies when you will be traveling – both national and international.

7. Make sure your Will and other legal paperwork are up to date.

8. Carry your proof of medical insurance – confirm that you are covered as you travel.

9. Do not carry big purses and bags. Carry a cross-the shoulder bag or fanny pack.

10. Do not carry all your money in a visible way – keep only a few dollars readily available. Stash the rest.

11. Leave your itinerary with someone at home.

12. Take a “red-eye” flight when you can – the planes are probably cleaner.

13. Don’t plan on arriving in the middle of the night. Schedule daytime arrivals.

14. Know where your embassies and consulates are.

15. Always carry the name, address and telephone number of the places you are staying.

16. Discuss fare before you get into a cab – get information from your hotel as to anticipated costs.

17. Do not take off with strangers offering to act as tour guides or to show you direction.

18. Do you need medical insurance?

19. Do you need travelers insurance?

20. Will you need an international driver’s license.

21. Verify all travel details, in writing and a copy of the cancellation and refund policies, before making a purchase. No information should be ambiguous. You want names, addresses, and telephone numbers for all lodgings, airlines and cruise ship information as well as detailed information on the tour company.

22. Remember when you get that “too good to be true” telephone call or post card telling you that you won a free trip – it probably is not free. At some point you will be asked for money via your bank account or credit card, or other source, such as Pay Pal.

23. Check and double check if VISAs or Inoculations or other special preparations are required.

24. What are the requirements concerning foreign monies?

25. Are credit cards widely accepted – even at hotels? Not always so check.

Smart Devices - Are you smarter than your smart devices?

Laptops, computers, thermostats, tablets, cellular phones, televisions, GPS, Google Home, Amazon Echo, Smart Helmets. These devices come in the form of adult devices, adult toys, home appliances, and children’s toys. These are devices that have “automated content recognition (“ACR”)” features. They listen, they monitor and they communicate.

We have smart devices that are able to talk to other devices all because of the invention of the internet. This is through the sophistication of smart voice or virtual assistants.

By the first quarter of 2017 an estimated 15M smart devices will be used by consumers. This voice interaction has come about since 2014.

National Cyber Security Alliance introduces catch phrases such as:

Stop – Think – Connect
Internet to Things
Internet to Me

On Feb. 28, families around the nation woke up to find out that CloudPets toys had been hacked and more than 800,000 user accounts and 2 million voice recordings – mostly of children and family members – were exposed in a major data breach.
11 Million Vizio Smart TV was purchased by consumers last year.

Now it is time to learn how to navigate through your continuously connected life!

Every day we are connected to the internet in ways we have not even begun to realize. These connections affect our personal and business interests and privacy. Someone always has access and is or will use the information received and data stored. While these smart devices may make our life easier, and more fun, they decrease our safety 100%.

Research the process for keeping your smart devices secure before you purchase them, make sure that you know how your data is being used on newly connected devices and take extra measures (like assigning new passwords) to safeguard your devices.

Understand what information your devices collect and how it’s managed, used, and by whom, and stored.

Fortify your online accounts by enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time code through an app on your mobile device. Your usernames and passwords are not enough to protect key accounts like email, banking and social media. Do not overlook your internet routers, which control access to your smart devices.

Learn how to secure your smart devices. Use a strong password to protect the device, keep it up to date and name it in a way that won’t let people know it’s in your house.

Check the cybersecurity history of devices before purchasing to see if there have been any previous security or privacy issues and if they have been resolved. Research on the internet, do not take the word of the sales clerk.

Uninstall or removed unwanted and unused software and apps from your smart devices. As long as they are there, they are vulnerable and continue to store and share personal information and data. Android devices require you to give permission to let them have access to other features on your device before installation. Apple devices do not.

As more and more consumers are shopping with mobile apps, fraudsters are following the money. There are fake phone apps popping up that impersonate well-known retailers in order to steal your personal information. Their names are similar to well-known brands, and their descriptions promise enticing deals or features.

But these fraudulent apps can take your credit card or bank information. Some fake apps may even install malware onto your phone and demand money from you to unlock it.

Some known “talking” devices:

iPhone – Siri
Amazon – Echo
Amazon – Echo Dot
Amazon Tap
Alexa
Google Home
Cubic Robotic
Ivee
Ubi
Homey
Earity
Navdy
Petcell – GPS Tracker for animals
Cayla – Children’s Toy
i-Que – Children’s Toy

Preventions:

Turn off the voice recognition feature when you are not using it.

Turn off your WIFI when you are not using it

Turn off your computer, laptop, tablet, etc. when you are not using it.