Watch Out! Do Not Fall For World Cup Scams

Screen Shot 2014-06-24 at 10.43.45 AMHackers and scammers capitalize on big events — and the FIFA World Cup is no exception.

And, as you would expect, there are a number of scams out there aimed at World Cup fans.

These scammers are hoping that eager soccer enthusiasts will let their guard down enough so that they can get their money, access their data, and steal their identities.

But, being vigilant goes a long way!

Here are some ways these World Cup scam artists try to trick you:

#1 Free Prizes & Tickets

Anytime you get an email promising free World Cup tickets — or free anything — from someone you don’t know, you should be on high alert. One of the more common free ticket scams encourages people to click a downloadable zip file which then unleashes a virus that enables your computer to be taken over by a remote administration tool (RAT). Others ask you to click a link or fill out a questionnaire with your personal information.

#2 News & Highlights Reels

Breaking news and World Cup highlight reels are being used to entice recipients to open malicious attachments and downloads. Again, be on high alert should you receive an email which encourages you to click or download something in order to access info about the cup.

#3 Free Online Streaming

These scams show up not only in your inbox but on social media sites as well. Often these scams will ask you to complete a survey or download & install software. Again, be cautious & use your head! If something sounds too good to be true, it likely is.

(There are ways to safely and securely live stream all the FIFA World Cup action online. Read more about that HERE.)

 

Cryptolocker Virus: Hackers Hold Your Computer Hostage

There’s a new form of hacking out there that you may not have heard of, but experts are saying it’s the worst kind of virus out there: it’s complicated, has affected hundreds of thousands of victims, and has cost the victims tens of millions in “ransom” paid to hackers.

Recently exposed on The Today Show, this virus known as “cryptolocker” disguises itself as an attachment in an email from a familiar source, like UPS or FedEx, but when you click on the attachment, it launches the virus and attacks your hard drive. Your screen turns red, a countdown clock appears and all your data is locked…until you pay the hackers’ requested ransom.  And, the kicker is, the longer you wait, the more expensive it gets, and if you choose not to pay up, your data — family photos, sensitive files, music, medical records, etc. — are locked forever.

This sophisticated virus has been linked to a Russian crime ring.  The crime ring’s servers have now been disabled, but unfortunately there are a number of copycat hackers out there hoping to hold your computer for ransom, too!

The best way to protect yourself and your data is to (1) back up your computer regularly, (2) use antivirus software, (3) use extreme caution when opening unknown or unfamiliar emails and attachments, and (4) consider encrypting your data with a VPN service so that hackers can’t seize control.

Watch The Today Show‘s full report on the cryptolocker virus below.

Protect yourself from hackers with your own personal Virtual Private Network.
Read more about about how a VPN can protect you from cybercriminals here.

How To Watch The 2014 FIFA World Cup Online

Watch the World Cup Online

One of the world’s greatest sporting events — The FIFA World Cup — is underway, and many of you us want to watch it online.

But how? 

Fortunately, in 2014, it’s easier than ever to cut-the-cord, and watch all the World Cup games online.

And, we’ve made it extra easy for you to do away with cable with this flow chart (below) that you can follow.

World Cup Flow Chart for Cord Cutters
click for full-size

Flowchart for Watching World Cup Online

IMPORTANT: If you’re watching the cup using either ITV in the UK or CBC in Canada, then you’ll need to use Ghost Path to connect through one of those countries. Why? Because both ITV and CBC have geographic restrictions in place, so you need to be connected through their respective home countries to be able to use the service. But, Ghost Path enables you to bypass those restrictions so you never miss a game!

Ghost Path’s VPN service is just $10/month (or $5 a week), and you get instant access.  Click here to start watching the World Cup online now!

How to Break Through the Great Firewall of China

Screen Shot 2014-05-28 at 11.45.59 AMChina has the largest number of people connected to the internet — more than 600 million in fact.

Yet, despite the prolific use of the internet in one of the world’s biggest economies, freedom of information is hard to come by thanks to the communist government’s attempts to block all information that it considers to be politically incorrect or anti-cultural.

This makes it a real challenge for business people and travelers to access common and popular websites like Facebook and Twitter, as well as many others that people access on a daily basis.

These sites are blocked because the Chinese government simply can’t control how people exchange information on them. The censorship tool that China uses is widely known by the nickname “The Great Firewall of China”, or the Golden Shield Project.

In today’s post, we want to offer you some resourceful tips that will enable you to break through this censorship wall so you can access your favorite websites if you plan to visit or currently reside in China.

A VPN, or Virtual Private Network, allows you to circumvent these blocks by encrypting your data and sending it through secure virtual tunnels so that you can access social media sites as well as location-specific sites such as Netflix. Even better, most VPN services extend coverage to various electronic devices such as your laptop and Smartphone.

But first, let’s delve into the tactics that The Great Firewall of China uses block websites:

  • IP blocking
  • DNS filtering and redirection
  • URL filtering
  • Packet filtering
  • Connection reset

The cool thing is, with a VPN service, you get protection from all these tactics because the service hides your IP address and data, giving you the needed security to access the internet without compromising your access or privacy.

Once you sign up for a Virtual Private Network, you will have to choose your subscription plan depending on how long you will need the service. You can even choose a free service or one with a money-back guarantee to ensure you like it before you commit!

Here’s a step by step guide on how to get your preferred VPN up and running:

  1. After signing up for your preferred subscription method, download the VPN client onto your desktop or phone and install it. This typically takes a couple of minutes.
  2. Sign in via the VPN client user interface using your username and password. (These will be emailed to you once your subscription is active.)
  3. Log in and connect to a server of your choice.
  4. That’s it! Now, you’re all set to surf anonymously and with maximum privacy!

Most VPN services stay secure even in the event of a connection drop, meaning that you have that peace of mind knowing that you’re covered at all times.

With the help of a VPN service provider, you can easily bypass “The Great Firewall of China” and enjoy unlimited access to all your favorite and necessary websites!

To learn more about VPN services or to try it out for yourself, click HERE.

 

12 Tips for Internet Safety While Traveling

Screen Shot 2014-05-19 at 12.28.12 PMWhen we travel it’s often to “get away from it all”, yet we still like to be connected.

And, today, it’s getting easier and easier to stay plugged in no matter where you go thanks to the prolific number of networks that are available to us at coffee shops, airports, hotels, parks, cultural sites, restaurants and more!

But, when you travel, you’re even more at risk for online hacking because you’re often using a public or unsecured WiFi network to get online.

And, if you think just because you’re paying to use a connection or because it’s password protected that you’re safe, think again: “According to Marian Merritt, Internet safety advocate at Norton by Symantec (maker of Norton AntiVirus), the two main risks you face when using a hot spot are having someone track your online movements via the network you’re logged on to or trick you into using a “fake” hot spot, either by offering it up for free or mimicking the name of a legitimate one. In both instances, a hacker can potentially see your passwords, e-mail, social networks, bank accounts, documents, and more.” (Source: Travel & Leisure) Yikes!

The truth is, staying safe while traveling starts at home, well before the vacation begins!

If you’re wondering how to keep your devices, information and data secure even while traveling, we’ve got 12 tips for you.

Before Traveling…

  1. Back-up all your devices.
  2. Create temporary travel passwords, and make sure they’re strong and long.
  3. Turn on your computer’s firewall.
  4. Invest in a VPN (Virtual Private Network) to encrypt your communications and reroute all traffic through a private, secure connection.
  5. Don’t change the security settings on your phone. Generally your phone’s default settings are relatively secure.
  6. Turn off autofill and cookies. If your laptop or phone automatically enters your login info for familiar websites, be sure to turn that off before you travel.
  7. Handle all bank transactions from home, before you leave.

When traveling…

  1. Only connect using encrypted WiFi networks or a hard-wired connection, unless you have your own WiFi hotspot or use a VPN service.
  2. Never use public computers for logging into private accounts like email, Facebook, credit cards, or any other site that has access to your personal info.
  3. Switch off your phone’s wireless connection when you’re not using it.
  4. Cellular networks tend to be secure, so instead of suffering obscene roaming charges, purchase a data plan. Both Verizon and AT&T offer affordable global data roaming packages.
  5. Always use a site’s https address if available — https connections are safer and more secure than standard http.