Cyber Security Articles & News

WATCH: It Only Takes Hackers 60 Seconds to Steal Your Identity - Here’s How you Can Prevent It

Did you know that it only takes 60 seconds for hackers to do a quick internet search and steal your social security number, date of birth and your mother’s maiden name? Pretty scary, huh? 

Think about it -- according to Kevin Mitnick (who happens to be the world’s most famous and formerly most wanted hacker), Sarah Palin’s account was hacked by a college student about a year ago all because he guessed a simple password reset question! It’s not as hard to do as you might think.

Check out his helpful tips below -- they could save your bank account!

Tip 1: Sign Up for Credit Card Transaction Alerts
Many credit card companies offer the option to notify you via text, phone call or email every time a transaction is made over a certain dollar amount. You can then verify whether it was a legitimate purchase, or tell the credit card company that it wasn’t you.

Tip 2: Use Random Passwords for Every Website
Password managers are very popular and can help protect your online accounts. Mitnick says popular ones are LastPass, 1Password and KeePass Password Safe. These programs will automatically generate a random password, fill it in for you, and every time you revisit that site, the login information automatically gets entered. 

Tip 3: Use a 2-Factor Authorization to Log Into Accounts
Not only will you need a username and password to log in, you’ll also need to enter a security code that changes every 60 seconds -- this way if someone figures out your username and password, they still can’t get in without the code! All you need to do is download an app, and it’ll generate the code you need to get access.

Tip 4: Cover Your Webcam
Mitnick says webcams are always being hacked -- in fact, anyone could be watching you from anywhere in the world! (Creeped. Out.) A simple, inexpensive solution is to simply cover your webcam with a sticky note or piece of opaque tape like duct tape or masking tape (aka, NOT clear tape). Ta daaa!

Tip 5: Use a VPN When Using Shared Internet Connections
So many of us are guilty of this one -- hanging out in a coffee shop browsing the internet with their free wifi. (New Yorkers, we’re looking at you!) The person sitting next to you could potentially be eavesdropping on all of your communications! 

“It’s so easy, a 14-year-old could do it,” says Mitnick.

Okay, we’re listening.

He says one thing we could do is purchase a portable internet device from your mobile operator, or subscribe to a VPN service (Virtual Private Network) and it costs about $60 a year. So when you’re using a hotspot, connect to your VPN provider and everything will be encrypted. 

For more tips on protecting your privacy, check out Mitnick’s book “The Art of Invisibility,” in stores now.

Watch the very cool segment and others at the source.

Source: The Rachael Ray Show

Topics: VPN, identity theft, cover webcam, hackers, internet, keynote speaker, Password, Rachael Ray Show, Random Passwords, Sarah Palin, virtual private network, Credit Card Transaction Alerts, 2 factor authorization, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Spear Phishing vs Phishing: Recognizing the Difference

Since the dawn of the internet, there have been threat actors looking to exploit systems, steal data, and compromise the integrity and reputation of p..

Read more ›

Kevin Mitnick Security Awareness Training: Microsoft Teams

Kevin Mitnick — founder of Mitnick Security and Knowbe4’s Chief Hacking Officer — helps organizations find and remediate vulnerabilities through penet..

Read more ›

What is a Red Hat Hacker? Top Things to Know

Cyber attackers shouldn’t all be painted with the same brush. There are many different types, all with separate motivations and tactics for launching ..

Read more ›
tech-texture-bg