Episode #35: Using Non-Administrator Accounts

In this podcast we discuss Non-Administrator or Standard Accounts: How they keep you safe and instructions for creating one. What to avoid ransomware and other threats? Make sure you are using a standard account whenever online performing high risk activities.

For more details on this or to keep up with all the cyber threats that may affect you go to our website at HomeCyberDefense.net and subscribe to our weekly newsletter.

After listening to our podcasts, and if you feel our information is a valuable asset for public consumption, please go to our website and either consider being a sponsor to our Home Cyber Defense program, or simply leave us a donation so we can afford to continue our series and protect consumers from Cyber Threats!

To learn how to keep yourself safe from cyber threats please download our new Ebook “Personal Cyber Protection” from the iBooks Store or Amazon!

Standard Account

 

 

Episode #34: Who is Tracking You on the Web?

Who is Tracking You on the Web: Do you realize how much you are being tracked while online? In this podcast we look at who, how & why companies, organizations and sometimes bad guys track you. 

For more details on this or to keep up with all the cyber threats that may affect you go to our website at HomeCyberDefense.net and subscribe to our weekly newsletter.

After listening to our podcasts, and if you feel our information is a valuable asset for public consumption, please go to our website and either consider being a sponsor to our Home Cyber Defense program, or simply leave us a donation so we can afford to continue our series and protect consumers from Cyber Threats!

To learn how to keep yourself safe from cyber threats please download our new Ebook “Personal Cyber Protection” from the iBooks Store or Amazon!

 

th

Episode #33: The Importance of Software Updates

A major preventative measure to take to keep your computer secure is to always have the latest updates installed. Unfortunately, many people find software update notifications and the process of installing new software updates insignificant and disrupting. In this podcast we look at why you should not ignore those software update notices and the difference between software updates and software upgrades.

For more details on this or to keep up with all the cyber threats that may affect you go to our website at HomeCyberDefense.net and subscribe to our weekly newsletter.

After listening to our podcasts, and if you feel our information is a valuable asset for public consumption, please go to our website and either consider being a sponsor to our Home Cyber Defense program, or simply leave us a donation so we can afford to continue our series and protect consumers from Cyber Threats!

To learn how to keep yourself safe from cyber threats please download our new Ebook “Personal Cyber Protection” from the iBooks Store or Amazon!

 

Software-update-300x216

Episode #32: The Rise in LinkedIn Fraud

Are you getting a large number of connection requests from people you don’t know? Many of these are fraudsters trying to engineer you for information. In this podcast we will discuss why cyber criminals are doing this and their endgame goals.

For more details on this or to keep up with all the cyber threats that may affect you go to our website at HomeCyberDefense.net and subscribe to our weekly newsletter.

After listening to our podcasts, and if you feel our information is a valuable asset for public consumption, please go to our website and either consider being a sponsor to our Home Cyber Defense program, or simply leave us a donation so we can afford to continue our series and protect consumers from Cyber Threats!

To learn how to keep yourself safe from cyber threats please download our new Ebook “Personal Cyber Protection” from the iBooks Store or Amazon!

Learn-How-To-Hack-Linkedin-Account-Password-Free

Episode #31: How to Recognize a Credit Card Skimmer – Video Podcast

The most common way cyber-criminals steal credit and debit card numbers is through card skimmers. If you ever swipe your card at a gas station pump, withdraw cash from an ATM, or buy tickets from a vending machine, then you are at risk. In our first Video Podcast, we will show you what credit card skimmers look like and how they operate to steal your financial information.

For more details on this or to keep up with all the cyber threats that may affect you go to our website at HomeCyberDefense.net and subscribe to our weekly newsletter.

After listening to our podcasts, and if you feel our information is a valuable asset for public consumption, please go to our website and either consider being a sponsor to our Home Cyber Defense program, or simply leave us a donation so we can afford to continue our series and protect consumers from Cyber Threats!

To learn how to keep yourself safe from cyber threats please download our new Ebook “Personal Cyber Protection” from the iBooks Store or Amazon!

 

Episode #30: Avoiding Ransomware

A recently released report states that 93% of all phishing emails during the month of March contained ransomware. (Up from 5% a year ago.) This is a rapidly increasing threat that you need to be aware of. This podcast will talk about the newest types of ransomware and what you need to do to avoid being a victim.

For more details on this or to keep up with all the cyber threats that may affect you go to our website at HomeCyberDefense.net and subscribe to our weekly newsletter.

After listening to our podcasts, and if you feel our information is a valuable asset for public consumption, please go to our website and either consider being a sponsor to our Home Cyber Defense program, or simply leave us a donation so we can afford to continue our series and protect consumers from Cyber Threats!

To learn how to keep yourself safe from cyber threats please download our new Ebook “Personal Cyber Protection” from the iBooks Store or Amazon!

FB Book Promo

Episode #29: Dangers of Instagram

The App that Kids Love – and Some Parents Loathe

Are you raising a budding photographer or just have a social butterfly who likes to take myriads of pictures, or a child that just likes seeing the pictures that other people take? If so, chances are that your child has seen, used, or downloaded Instagram. Do you know what Instagram is – and why it might pose a danger to your child? In this podcast we look at what Instagram is, how it’s used, and how it can be misused.

For more details on this or to keep up with all the cyber threats that may affect you go to our website at HomeCyberDefense.net and subscribe to our weekly newsletter.

After listening to our podcasts, and if you feel our information is a valuable asset for public consumption, please go to our website and either consider being a sponsor to our Home Cyber Defense program, or simply leave us a donation so we can afford to continue our series and protect consumers from Cyber Threats!

To learn how to keep yourself safe from cyber threats please download our new Ebook “Personal Cyber Protection” from the iBooks Store or Amazon!

FB Book Promo

 

Episode #28: Detecting Cyber Attacks

Detecting Cyber Attacks:

A particularly hard to stop cyber attack uses social engineering to get through digital security. This type of attack can create noticeable symptoms on your system that we will outline for you.

For more details on this or to keep up with all the cyber threats that may affect you go to our website at HomeCyberDefense.net and subscribe to our weekly newsletter.

After listening to our podcasts, and if you feel our information is a valuable asset for public consumption, please go to our website and either consider being a sponsor to our Home Cyber Defense program, or simply leave us a donation so we can afford to continue our series and protect consumers from Cyber Threats!

CyberWar

Episode #27: New Phishing Attacks

It seems like as much publicity is out there about phishing, everyone would be very aware of it. Yet this is still the number one avenue that hackers use to implement cyber attacks. This podcasts discusses the current techniques used and how to protect yourself.

For more details on this or to keep up with all the cyber threats that may affect you go to our website at HomeCyberDefense.net and subscribe to our weekly newsletter.

After listening to our podcasts, and if you feel our information is a valuable asset for public consumption, please go to our website and either consider being a sponsor to our Home Cyber Defense program, or simply leave us a donation so we can afford to continue our series and protect consumers from Cyber Threats!

Phishing

Episode #26: Doxing- An Increasingly Popular Form of Online Harassment

In this Podcast we will discuss Doxing, which is becoming a prevalent form of Online Harassment. 

For more details on this or to keep up with all the cyber threats that may affect you go to our website at HomeCyberDefense.net and subscribe to our weekly newsletter.

After listening to our podcasts, and if you feel our information is a valuable asset for public consumption, please go to our website and either consider being a sponsor to our Home Cyber Defense program, or simply leave us a donation so we can afford to continue our series and protect consumers from Cyber Threats!

Doxing