7 Rules for Safer Online Shopping

For most people online shopping has become the norm.

Our busy schedules prevent us from trekking to the mall every time we need something, so instead we visit online retailers to fulfill our shopping needs.

Safe online shopping

But, not all online shopping destinations are created equal, and while many sites are trustworthy and legitimate, there are a number of fake online retailers that are just waiting to rip you off.

Luckily, a little online shopping savvy can go a long way to protecting you, your money and your identity.

Read through our online shopping rules below to keep yourself safe online.

  1. Stick to sites that you know & trust. Instead of starting your online shopping with a search engine, begin at a trusted retailer like Amazon, Target, Lowe’s or Macy’s. Search engines can lead you to places that are not trustworthy, especially if you venture past the first page or two of search results. Also, check the spelling of the site’s name (Amazon.com versus Amazn.com*). Many “copycat” sites try to get your money by looking “familiar”, and check the top-level domain as well (Amazon.com versus Amazon.net*). *These are fictitious examples.
  2. Use credit cards. Credit cards tend to be the safest option for online shopping because you have recourse. If an ordered item is never delivered or you find fraudulent charges on your card, the credit card company will work with you to remedy those issues and get you your money back. But, if you use a debit card or give access to your bank account, it can be a lot more challenging to get your money back after you fall prey to a scam. Check your statements regularly, and keep an eye out for suspicious activity.
  3. Keep a paper trail. Whenever you make purchases online, be sure to save any and all documentation that you receive via email in an email folder or, better yet, print hard copies of receipts, terms of sale, product descriptions, and any emails that you exchange with the retailer. Again, this will be helpful and necessary should you find yourself the target on an online shopping scam.
  4. Only shop with the “lock”. Any time you’re about to make an online purchase, look for the lock. Make sure that the site has SSL (secure sockets layer) encryption installed. You can determine if it does because an SSL url will begin with https:// (instead of http://). Typically, a little lock icon will also appear next to the site’s url or in the status bar; another indication of a secure site.
  5. Shut down your machine. Do you typically leave your computer running and connected to the Internet 24/7? While that may seem like no big deal to you, it means that you’re leaving your machine open to cybercriminals all day and night. This gives hackers the opportunity to infest your system with malware and commit cybercrimes. Instead, after making a purchase, turn off your computer and protect yourself and your money!
  6. Don’t overshare! Only fill out the necessary (i.e. “starred”) information when making on online purchase. No online retailer needs your birth date, social security number, or other unnecessary personal data to complete your transaction. Don’t make it easy for online criminals, instead be cautious, don’t over share, and you’ll protect yourself from identity theft.
  7. Use a secure connection. Don’t conduct your online shopping while using unsecured public WiFi. This is an open invitation to hackers, peeping Toms, and identity theft. Instead, wait to make online purchases from a secure network like your home or place of work.

If you want to further protect yourself, your money and your identity while shopping online, consider getting a VPN. For more details about how a Virtual Private Network can improve your online experience, visit Ghost Path.

The Actual Time It Takes Hackers To Crack a Password + Celeb Phone Hacking

How long does it take to break a password?Do you ever wonder how secure your passwords are?

In light of the recent celebrity phone hacking scandal which resulted in revealing pictures of 100 celebs being posted and shared online and via social media, you’re probably wondering how secure your own passwords are.

The hacker, in this case, “took advantage of a security flaw in Apple’s online backup service, iCloud. Many online services lock someone out after several unsuccessful attempts to log in, but not Apple’s Find My iPhone app and iCloud. That has been changed by Apple in the aftermath of the nude celebrity photo scandal. But with unlimited guesses, a computer program can generate and test thousands of potential passwords until an account is entered. It is called a brute force attack. The tendency of many people to choose weak passwords and to use the same password for each service helped. Once a celebrity’s Find My iPhone app password is discovered, the same password often can access iCloud. People might never know their accounts have been compromised.” (quote from CNN.com)

With that in mind, if your passwords resemble something along the lines of “123456” or “password” or you use the same password for all sites, you’re putting yourself unnecessarily at risk.

Smart hackers are adept at breaking codes in little time, and when you use a simple or common password, you’re opening yourself up to be the victim of online crime.

Here is the actual time it take a hacker to break a password:

  • Lowercase, 6 characters = 5 minutes
  • Lowercase, 9 characters = 2 months
  • Uppercase & Lowercase, 6 characters = 5.5 hours
  • Uppercase & Lowercase, 9 characters = 88 years
  • 6 characters with numbers & symbols = 8.5 days
  • 9 characters with numbers & symbols = 19,985 years

As you can see, adding a length and complexity to your passwords pays off BIG TIME.

Here’s a little tip, instead of using simple words for your passwords, use phrases. For example: “Time flies when you’re having fun!” becomes “TFlyzwhenurhavinFUN!”

A password like that won’t be cracked for millennia! 

And, be sure to use a different password or password variation for every site with a secure log-in.

For extra protection, look into a Virtual Private Network to protect your data and privacy on all your devices, anywhere in the world! Read more HERE.

For the full scoop on the celebrity phone hacking scandal, watch the video below.

Screen Shot 2014-09-05 at 10.38.23 AM

 

This post was inspired by an element of this infographic.

Cybercrime Report: Are You A Target?

The Internet and computers have become an integral part of our everyday lives.

We wake to our smartphone alarm clock, check our emails over breakfast on our tablet, and settle in at our work desks in front of our computers to conduct the morning’s to-dos…and that’s all before 10am.

Yet, despite the convenience of all this modern technology, it also means that cybercrimes like hacking and identify theft are on the rise.

Norton released their report on cybercrime in 2013, and the data is quite compelling.

First off, though, let’s give a little context as to the depth of this report. Norton collected data from over 13,000 online adults ages 18-64 from 24 different countries.

Below are a few key factors that we found particularly interesting from Norton’s report:

  • 64% of cybercrime victims are male.
  • 66% are millennials (as compared to baby boomers).
  • Common theme noticed in victims: Almost 1/2 of victims don’t use basic precautions like passwords or security software.
  • Among smartphone users, 38% have been a victim of mobile cybercrime in the last year.
  • There are 378 victims per year, which is more than 1 million per day, which translates to 12 victims per second.
  • Risky behavior: 39% of social media users don’t log-out after a session, 25% share their passwords with family & friends, and 31% connect with people they don’t know.

Check out the entire report below:


The Norton Report 2013 

Protect yourself & your data.

Sign-up for a VPN service and never worry again! Register now, and get our 7-day money back guarantee.

Watch Out! Do Not Fall For World Cup Scams

Screen Shot 2014-06-24 at 10.43.45 AMHackers and scammers capitalize on big events — and the FIFA World Cup is no exception.

And, as you would expect, there are a number of scams out there aimed at World Cup fans.

These scammers are hoping that eager soccer enthusiasts will let their guard down enough so that they can get their money, access their data, and steal their identities.

But, being vigilant goes a long way!

Here are some ways these World Cup scam artists try to trick you:

#1 Free Prizes & Tickets

Anytime you get an email promising free World Cup tickets — or free anything — from someone you don’t know, you should be on high alert. One of the more common free ticket scams encourages people to click a downloadable zip file which then unleashes a virus that enables your computer to be taken over by a remote administration tool (RAT). Others ask you to click a link or fill out a questionnaire with your personal information.

#2 News & Highlights Reels

Breaking news and World Cup highlight reels are being used to entice recipients to open malicious attachments and downloads. Again, be on high alert should you receive an email which encourages you to click or download something in order to access info about the cup.

#3 Free Online Streaming

These scams show up not only in your inbox but on social media sites as well. Often these scams will ask you to complete a survey or download & install software. Again, be cautious & use your head! If something sounds too good to be true, it likely is.

(There are ways to safely and securely live stream all the FIFA World Cup action online. Read more about that HERE.)

 

Cryptolocker Virus: Hackers Hold Your Computer Hostage

There’s a new form of hacking out there that you may not have heard of, but experts are saying it’s the worst kind of virus out there: it’s complicated, has affected hundreds of thousands of victims, and has cost the victims tens of millions in “ransom” paid to hackers.

Recently exposed on The Today Show, this virus known as “cryptolocker” disguises itself as an attachment in an email from a familiar source, like UPS or FedEx, but when you click on the attachment, it launches the virus and attacks your hard drive. Your screen turns red, a countdown clock appears and all your data is locked…until you pay the hackers’ requested ransom.  And, the kicker is, the longer you wait, the more expensive it gets, and if you choose not to pay up, your data — family photos, sensitive files, music, medical records, etc. — are locked forever.

This sophisticated virus has been linked to a Russian crime ring.  The crime ring’s servers have now been disabled, but unfortunately there are a number of copycat hackers out there hoping to hold your computer for ransom, too!

The best way to protect yourself and your data is to (1) back up your computer regularly, (2) use antivirus software, (3) use extreme caution when opening unknown or unfamiliar emails and attachments, and (4) consider encrypting your data with a VPN service so that hackers can’t seize control.

Watch The Today Show‘s full report on the cryptolocker virus below.

Protect yourself from hackers with your own personal Virtual Private Network.
Read more about about how a VPN can protect you from cybercriminals here.