Openbook

Here's another great tool for understanding Facebook privacy and security. Openbook uses the programming interface that Facebook provided to the public to create a keyword search engine for Facebook.

This allows you to easily find information that many people thought was private, but wasn't. For example, this handy list of people who've cheated on their husbands:

Did this person mean to publicly declare their sexual orientation. Did that person intend to announce to the whole world that their HIV test came back positive? Do some searches of your own to find out just how easy it is to find your personal information on Facebook if you don't properly secure it (which they make pretty hard to do).

Their stated goal: "Our goal is to get Facebook to restore the privacy of this information, so that this website and others like it no longer work."

And their advertising policy: "Thanks for the offer but we're not interested in running ads at this stage. We're making a statement about the awful state of privacy on Facebook and we don't want anything to detract from that message."

This site is doing everything right. I have more respect for what they're doing and how they're doing it than I can say. For now, the only support I can give them is to promote them, but that's exactly what I intend to do! Please visit them and share them with others.

And if you happen to find something of yours or your friends' on there that shouldn't be, be sure to check out Reclaim Privacy.

You can visit them here: http://youropenbook.org/

Tags:

Friending Your Kids on Facebook

I just read an article online about how almost half of parents have “friended” their kids on Facebook.

many parents see the value in trying to "friend" their kids on social networks, even though it might be a bit awkward at times. According to Retrevo, most parents who are Facebook friends with their kids have teenagers—only 8 percent of parents said kids under 12 should have Facebook accounts in the first place—and they say that they learn a lot about their teens this way.

Original article here:

I agree that monitoring your child’s use of the Internet is very important and friending your kids is one way to do it. But like I just showed you, your kids can separate friends by group (real friends, school friends, my mom and dad) and then customize what your friends see by the group they’re in.

Everyone can see this, except Mom and Dad!

That means that your kids can post whatever they want and exclude you from it, just by adding you to a special group ("Outcasts", "Enemies", etc). For kids that are no longer living at home or have earned your trust when it comes to protecting themselves online, just friending them might be enough. Let them try to use the privacy controls to keep you out of things they don’t want you to share with you and then call them on mistakes. They’ll learn very quickly how to be careful about what they post and who can see it (a very valuable privacy skill).

But for younger kids or ones who just don’t “get it”, there’s a better way. Make use of these sites conditional based on you having their password to the account. Rather than being their friend, you can log in as them and see and control everything. In this scenario, you have the opportunity to discuss with them the things they say, do, and see in the system without them being able to restrict your visibility.

While they are quite sure to resent your presence, if you pick your battles and only get involved when you really need to (sexting, cyber bullying, weighing in on their “friends” selection, and helping them learn what information is too sensitive to post), you will likely be able to accomplish your goal of parenting without generating too much resentment.

A word of caution; this balance is very important! If you smother them too much, they’ll likely create a second account that you don’t know about and use it instead. Of course, finding out if your kids are posting online in places you don't know is a separate conversation entirely.
Tags: ,

Unlocker – Delete Or Modify Locked Files in XP

Do as I say stupid Windows!

It's hard to describe the pure, violent RAGE I feel every time I try to delete a file and Windows says you can't without any way to over-ride it and MAKE IT DELETE.

(I'm getting mad just thinking about it now)

Enter Unlocker. A simple, free utility that makes Windows work the way they should have designed it in the first place! Now, when you get the message, just click the "OK" button and a second window will open allowing you to kill the processes that are holding on to the file or at least force the program to "let go" of the file.

Even if you don't run the Unlocker utility in the background (which I wouldn't want to do to save resources), you can right-click any file and select Unlocker to do the same thing. Right on!

Tags:

Bug Me Not – Login Avoidance Tool

Avoid logins entirely with Bug Me Not!

This website is very cool. It's a consolidated list of user name and passwords for common websites and services. This gives you the ability to log in without giving up your precious information.

This is particularly useful for sites that promise not to use your information and don't require a fee for access. If those two conditions are true, then they don't need your info anyway! So you might as well not waste the time filling it in.

The key is that you don't really want an account, you just need one-time access to something and figure you'll probably never come back. Give it a try, but use it responsibly. I have never, and never plan to use it for sites that require a fee for access (which by bug-me-not policy aren't posted anyway)

Tags: ,

10 Minute Mail – Self Destructing E-mail Service

Self-destructing short-term e-mail address

Here's a useful tool;a self-destructing e-mail address!

The way it works is you go to the website, click the link and it will provide you with an e-mail address you can use when filling in account creation forms on a website. When that site sends you the confirmation e-mail, it will show up on the 10minutemail.com screen where you can respond to it (which all happens online and doesn't require any software download).

After you've confirmed the e-mail, you can forget about it forever as 10minutemail will destroy it after… 10 minutes (see how that works?). The main reason to use this is if you never want any communication from the site you're registering with (remember that means you won't be able to reset your password either).

If you're unsure if you want further communication, you should use your buffer e-mail account instead. On the other hand, if you're sure you have no need of an actual account with the site (other than this one time), see if there's a name and password available on BugMeNot.com (and if not, consider sharing your newly created account there when you're done.

Tags:

Validating Webstores and Services

Do they promise angels, but deliver devils?

Remember that there are a lot of bad guys out there and the web makes them able to look and sound just as safe and reputable as anyone else. Even if the site you're dealing with is totally honest, that doesn't mean that they can keep your data safe from hackers or bad employees.

Following privacy principles is your best bet for handling their weak security (they can't lose what they don't have after all), but when it comes to identifying the companies with bad service and lousy deals, following is the method I use:

Search Engines

The quickest way possible to get information about any retailer is to do a web search using your search engine of choice. Rather than just search for the name, try these combinations:

  • companyname sucks
  • companyname scam
  • companyname ripoff

See if any interesting results come up. Read what they say and see if there's a recurring trend. In the case of Lifelock, you can find everything you need to know at the first link 🙂

A Google search for LIFELOCK SUCKS brings up a very informative page in the very first link.

Ratings Websites

The Better Business Bureau

They can't tell you everything you need to know about a business because they only track complaints that have been filed with them (which is probably how Lifelock manged to get an A+ rating). Where the BBB really helps is when you find negative reviews and complaints.

In other words, a positive BBB review might not really mean anything, but a negative one definitely does.

Web of Trust

Again, Lifelock skates by so you clearly can't trust the positive reviews absolutely, but Web of Trust is still another useful site with user-driven reviews and ratings for a site and company's trustworthiness.

ResellerRatings.com

Similar to the others, this is a website that has ratings for various sellers online. Use it as another resource to find the bad stuff about the company you're planning to deal with.

Answer Sites

Answer websites like Answers.com, Yahoo Answers, or Just Answer.com can be a great resource. You post a question and see what people have to say about it. Something like "Can I trust this site" is a good start.

Summary

After checking around, you should be able to find out if the site or service you're planning to deal with is something you should avoid. At the very least, you'll be able to avoid the most obvious scams.

Tags:

Shopping Online

There's nothing like shopping online. You can do tons and tons of research, verify and compare prices, and even get e-mail alerts when the prices of certain items drop! All without having to run from store to store and deal with salespeople.

Along with these advantages comes risk however. If your payment information is captured during trasmission. Or, as is more likely the case, a store stores your credit card details against your will for "future use" and then loses it in a data breach (as in the TJX example).

However, there are several things you can do to benefit from the good while avoiding the bad:

If you like to keep your money and safe yourself the trouble and hassle of getting nailed by a bad or fraudulent retailer online, you need to learn to identify them before it's too late.
Before you buy anything, utilize the vast power of the Internet to research products and pick the best one possible.
You're about to pay for something, but what's the safest way to do it?

Related Guide

Once you've gone through the trouble to make an online account with a company, make sure you protect your passwords properly

Password Mugging

Hopefully you've already figured out the damage someone could do to you if they get into your e-mail account. They can impersonate you causing problems with your personal and professional contacts. They could read all your stored e-mails and anything medical, financial or otherwise important in them. And, of course, they can unlock your other accounts and do even MORE damage.

Invade my e-mail account? Why SURE!

So knowing that, why is that people give up their passwords willingly to services like Facebook, MySpace, and other social networking sites?

They promise not to store the password or peek at anything except your contacts which they say they'll use to find out if anyone with those e-mail accounts is already using the same service. This way they can add your friends for you without you having to do it manually for each one. Sound tempting? So did Snow White's apple.

Consider the following:

  • If the company or anyone working for them has more plans than they say, there's nothing to stop them from storing the password or anything else they find in your mailbox.
  • Does your login and password and all the other details they send back and forth from your e-mail account have any kind of protection to keep it safe while it's being sent? Chances are that it doesn't and all that important information (including your password) will be sent all over the net unprotected.
  • No matter what they promise, if they don't use HTTPS for transmission, you're at risk anyway!
  • Even if all the above were somehow safe, the very practice of asking people for passwords is a violation of one of the most basic rules of computer security. Call it a personal rant, but it's irresponsible to train users to engage in risky security. It's an abuse of trust.
  • And speaking of abusing trust, if you're not very careful about reading all that small print, you may end up embarrassing yourself when they use your e-mail contacts for more than you expected.

E-mail Account Abuse

"You've just been added to John Doe's Reunion.com Address Book!"

"John Doe wants to connect with you! I looked for you on Reunion.com, but you weren't there…"

Any of these messages look familiar? If so, a friend of yours (or at least someone who has your email address in their address book) has fallen prey (knowingly or not) to what many say is an overly aggressive way to coerce people into joining Reunion.com's "get in touch with old friends" service.

In this article you can read a description of how Reunion.com abused the trust of their users and sent out spam e-mails to everyone in their contact list when they gave up their password.

I received an e-mail just like the ones described above that said something like "Someone's looking for you on Reunion.com! Sign in to find out who it is!". Immediately following that was this e-mail:

From: [obviously I'm not going to tell you]
Subject: My apologies to everyone who recieved this Re-Union E-mail

My apologies to everyone who recieved this Re-Union E-mail, I understand that this was bothersome. You will not recieve it again. There is no need for response.. Eric

Consider that this poor guy had personal and business contacts in his address book all of whom got this spam from Reunion. He was more than a little embarrassed.

What To Do

Remember that unlike places like Best Buy and Kmart online, social networking sites make money by collecting and selling people and their data. Reunion isn't the only one training people in bad security by asking for passwords, they ALL do it:

  • LinkedIn
  • MySpace
  • Facebook
  • Twitter

They're not providing the service for fun or your benefit, they want as many subscribers as they can so they can serve ads or sell your data to data brokers.

Give Us Your Bank Info!

Mint. Give us your bank and credit card passwords!

You would think people would know better than to give up their banking information, but that appears to not be the case. Consider mint.com, a personal finance website where you can supposedly give them "read-only" access to your online banking so they can show you where your money goes and help you better manage it.

This is all good in theory, but they say in their "About Us" page:

Mint.com offers valuable insights and analytic tools to help you better understand your money…but Mint.com is a "read only" service. Meaning: you can view and organize your money with Mint.com, but you cannot move money between—or out of—your bank, credit union or credit card accounts.

YOU can't move money… But can they? And even if they're claiming they can't, did you verify that with your bank first? Unless your bank tells you that they've determined a service such as this is safe, supported, and that they will back up and fraud or accidents, why would you ever take such a risk?

That's not to say that Mint.com is bad (because I don't know that for sure) and, in fact, I think it's a great idea in theory. The problem is that the only thing protecting you once you've given up a password is their "promise" which historically companies aren't very goo about keeping.

Even Mint.com is nothing compared to these guys!

Even if Mint.com employees and everyone else who has access to the data (the network and data administrators) is safe and trustworthy, they still become a target of hackers. The first one to get into their system will have a goldmine of completely defenseless bank accounts to play with.

You might say, "So what's the difference? Banks have accounts too!" True. But banks also have strong regulation, stiff penalties, and financial responsibility for breaches. Does Mint?

What to Do

Remember to distrust new sites and services until and unless you've verified and validated them personally. But most importantly:

Make good passwords, keep them safe, and NEVER willingly give them away.

Cross-site Login

The last thing to watch for are the sites that let you log in with multiple different credentials. It's natural to think "oh hey! I can login with a name and password I already have instead of creating a new account on this site… sweet!". What you should be thinking is "this site wants the name and password to my other accounts! Heck no!"

Example of a site with login options

First, the site you're logging into might just be collecting your login information for their own use. Second, if they're legit, there still could be security or implementation issues (like not using https during the transmission from their site to the service that actually owns that login). Third, I'd bet there's at least one if not more ways to trick a site into letting someone into an account when they use this kind of cross-site login.

This is a risky thing to do and should be treated the same as giving away your password for adding contacts.

What to Do

This site wants the name and password to my other accounts? Heck no!

If there's an option to avoid login, do so. In the example I provided, you can leave a comment anonymously or with a simple name/url combo (neither require a password). Otherwise, if you want to use a site or service, just make a new account or use Bug Me Not to see if there's a shared name and password available.

About the only exception is for sites that are owned by others such as the case of Google who owns Youtube and Yahoo who owns Flickr. In those cases, you can go to the main website (Google or Yahoo) and sign in THERE. Then try going back to the supposed "partner site" and see if you're already logged in. If so, they really do have some kind of relationship.

You MAY want to consider the privacy implications of tying all your photos or videos to companies that already know so much about you (Google and Yahoo). For Privacy reasons, it might still be worth creating an entirely separate account on each site.

Password Protection

So now you have a great password. That doesn't matter a whole lot of you don't protect it properly.

Storage

Sticky Notes

This laptop has a full list of passwords right on it.

Granted using sticky notes is a bad idea, but writing them down isn't necessarily a bad thing. The key is to make sure that the passwords are safe or non-obvious. Keeping them in a notebook in a safe is one idea. Putting them in a file cabinet is another as long as other people don't know that you're doing that.

So this puts you at some risk for the other people in your house/office, that's way better than putting them in an unprotected computer file!


Password Files

Believe it or not, these are worse than sticky notes

A new trend is for people to put all their passwords in a spreadsheet or text file. This is convenient, but a huge risk! There are so many ways that bad guys can get a peek at the files on your computer that if one of those files is a full listing of names and passwords, then the bad guy has hit the jackpot!

I'm not actually against this in practice, but the key is to protect them (similar to having a notebook in a safe). If you make such a file, make sure it's protected by some strong form of encryption. In my case, Trucrypt.

This is also useful in case you need to send that file somewhere over the Internet or put it on a portable device of some kind. If it's encrypted then an online eavesdropper won't be able to access it and if you lose a portable device, the file will be inaccessible.

Password Managers

There are many password management programs out there, but I can't recommend any. That's not to say they're not great because they may be, but I've never had need to use one since I just encrypt the file itself.

Sure those managers might come with extra features like being able to recognize the site you're on and filling your password for you, but those extra features create another risk. Maybe I can trick the manager into thinking I'm on a different site or to put your password into a plain text field where I can capture it. There are lots of possibilities so I just avoid them.

If you do want to look into this, I've heard that KeePass is good (and it does not autofill your passwords which is good).

Transmission

"Remember Me"

A risk with very little benefit

Granted this will save you about 6 to 8 seconds every time you log in, but consider the risks of using the "remember me" function on a webpage. What this does is place some identifying information on your computer that the site will use instead of a name and password.

So what happens if someone eavesdrops on the transmission of that identifier? Or if that's protected, what if you computer/cellphone is lost or stolen? Beyond that, I already talked about how there are many ways someone can get into your computer. If they browse around and find one of those files and make a copy, they can log in as you without your name and password!

This is a risk that's just not worth the benefit. On some sites you can select to remember the login name without the password which still saves time and is less of a risk, but there's really no justification for remembering the password. It's a risk with no real benefit.

If you're still not sure, just ask Michael who probably used his Mom's computer to check his Facebook when he was home on break from college:

Don't save passwords. Don't let it ''Remember You'' or this could happen to you too!

HTTPS

If you enter your name and password without first making sure you have a secure connection from you to the site you're on, anyone else on your network, in your nearby area (if you using wireless), or on the Internet between you and them can see it!

Read my full HTTPS article here for a full description of what it is, why to use it, and how.

The Single Password Issue

Here's something you might not have ever thought about, but should; if someone knows your username and password, they're very likely to try it at major websites and services to see if it will work there. How to they get your username and password? You give it to them!

A typical online registration asks for a username, e-mail address, and a password; everything a bad guy needs to get into every other account you have if you use the same password for all of them.

Every time you go to a website and it requires signup or registration, you have to give a username an e-mail address and a password. But what do you know about the people who own and operate the site? What if a disgruntled or greedy employee decides to try a little identity-theft on the side?

You handed them your e-mail address so what happens if they were to go to that web service and enter the e-mail address and password you gave them? If you keep good passwords nothing happens, but if you're the one-password-for-everything type, you're toast.

Even if that doesn't work, does that e-mail/username and password combination work at Facebook? eBay? PayPal? They could try hundreds of the best known sites all using a simple web program. The only defense you have is to not use single passwords!

The Challenge Question Issue

Another major problem is when you are asked to fill in challenge questions. First, if you follow my Geek Privacy Principle, you would never willingly give away information that wasn't necessary. Do you really want to hand over your mother's maiden name to some random website?

Second, if you fill these in, the password reset function may be triggered by the challenge questions instead of your e-mail. That means that if I have or can guess the challenge responses, I may be able to unlock your account without having access to your e-mail account first!

Just ask President Obama who's Twitter account got taken over and used for spam just because he entered real answers to challenge questions (and go figure that someone in the world knew where he lived, what his dog's name is and so-forth)!

The simplest solution for this is to use a privacy alias. By using fake data that you can easily remember, you're not only making the data you provide worthless to the site you've given it to, but a bad guy won't be able to guess.

The only disadvantage is that you're still giving away the data for your one and only privacy profile. A way around this if you use a password file like I do is to make up challenge answers on the spot and just "write them down" in the file. That way you can remember them while eliminating the risk of that information being used against you somewhere else.

Password Tips and Tricks

It's impossible to expect people to be able to use a password like j8^bEr3$k7 without writing it down or worse. But does that mean that if you don't make your passwords long, complex, and mostly meaningless, you're at risk? Not necessarily. There is a middle ground.

The Phrase Trick

Caution: Popular or famous phrases aren't a good option.

While short phrases and exceedingly famous ones are likely in hacker dictionaries, the vast majority in the world won't be. "Four score and 7 years ago" would likely be no good becuase it's so well known, but "The needs of the many7of9" would.

Phrases are great because they're very long, but at the same time very easy to remember. No matter what you pick, be sure to make it abnormal in some way. To simplify this, I recommend you come up with personal password rules that you'll do for all your phrase passwords. For example:

  • Always capitalize each word (Capitalize Each Separate Word)
  • All numbers spelled out or written using numbers (forty four, 44)
  • Use * instead of spaces (this*is*a*sentence)
  • Replace the word "the" with "bat" (It was bat worst of times)

It doesn't really matter what you choose, just be consistent. It won't do you any good to remember the phrase, but not the changes that you made to it.

The Suffix Trick

The suffix trick is a method of quickly taking weak passwords and adding length and complexity to them in a simple way. For example, say you have three passwords at three different sites: cat, money and camero.

These are all strikingly weak passwords, but you may have used them for a long time and not want to get rid of them. Fair enough. But take my advice and you can secure them all without changing them too much.

To use the suffix trick, first pick your suffix. Here are some suggestions:

  • @site.com – Where "site" is any word you want and ".com" is any domain (like ".gov", ".org", ".co.uk" etc.). Here you are making your password into something that looks like an e-mail address. The beauty of this one is that it adds special characters and good length while being super easy to remember.

    For example, you could use "@hubris.jp" or "@gonzo.uk". Note that using country codes works well because they're more random than ".com".

  • 2^3=8 – Math is great because it's all numbers and symbols, but it's easy to remember and understand.

    2+5=7
    9-1=8
    6*10=60

    See?

  • 3141592 – Pure numbers. This is good for sites that don't let you use special characters in your password. You can go completely random, but in this case, it's pi. Another really great trick here is to use a number that means something to you, but no one else. For example, a friend used his 6-digit employee number from a company he used to work for.
  • three3 – Numbers and letters. Again, useful for sites that don't let you use special characters.
  • &7sh3 – This is truly random. Pick something as complicated as you can think of (so long as it's only 4 to 6 characters). This is better than some of the other picks because even if a web site admin looks at your password, they probably won't figure out the trick (where some of the other suffixes are pretty obvious).

    Again, good length and now your passwords have numbers AND special characters.

Now that you have a suffix, you're going to go to every website and webservice that you can and add the suffix to your passwords. No matter how long or hard the suffix is, since you're using the same one everywhere, it becomes easy to remember.

For example: cat2^3=8, money2^3=8, and camero2^3=8

Even if someone were to figure out the trick you're using (which is unlikely unless they can already see several of your passwords), they still have to guess the rest of your password (which will be at least as strong as your password was without the suffix).

The suffix trick is the quickest and easiest way to increase your online security right now.

In other words, there's a chance that someone might be able to figure out your trick and your passwords lose the extra security, but in all other cases, your entire online web presence has become more secure with very little effort. This is the least you should do right now until you have time to pick better passwords for your more important accounts.

For a quick and easy proof of this theory, go check your current password at the online Password Meter and then try it again with your chosen suffix.

The Levels Trick

You don't really have to have a completely unique password for absolutely every online account. The question to ask is, "what level of password is needed?"

Low Level

For example, I have a special account name and password combination I use for any site I don't like, don't trust, don't care about or think I'll never come back to (but that has something I want and requires registration).

For those sites, I use my "throwaway" information which might look like this:

  • Username: Hotdog
  • Password: relish808

Even if a site requires e-mail address as a login, I still use the throwaway password if I just don't care about them and if that account gets hacked.

Now, if I ever come to a site that requires login and I think I might have been there before, I can try my throwaway information first and see what happens.

Mid-level

For sites that would be inconvenient, but not drastically bad to lose control of, I use what is probably the easiest possible way to make secure passwords that anyone can remember. Here's how it works:

  1. Pick rule that you'll use on a website's name. It doesn't matter what it is so long as you are consistent and use it the same from now until you die. For example, let's say I choose 5 characters, proper case (meaning the first letter is uppercase and the rest lower).
  2. Next, choose a suffix from above. Math is pretty easy, but anything is fine so long as you pick a good one.

So now you have two pieces. Put them together like this:

If the site is… Then the password is…
yahoo.com Yahoo4*4=16
bofa.com Bofa4*4=16
telegraph.co.uk Teleg4*4=16
youtube.com Youtu4*4=16
bettycrocker.com Betty4*4=16

Note that because bofa.com (Bank of America) is less than 5 characters, I stop when I run out. Your rule could be to fill the fifth slot with the '&' sign or whatever you want.

Now have good length, upper, lower, numbers and special characters, but the second you see the website, you instantly know the password since the suffix is the same EVERYWHERE and the rest of the password is based on your rule.

High-level

All accounts that protect your money, your reputation, or privacy should use your strongest, most important, most secure password of all. For example, take your most important online account of all… your e-mail. "E-mail? Are you kidding!?", you say? Actually, I'm not.

These forms make every account at risk if someone can get in your e-mail

What you see here is a password reset form. Using it, I can enter your e-mail address and a quick verification number that's shown on the screen and they'll either send the password back to me or reset it to some random value (which they'll send to me). Either way, if I'm in your e-mail, I can unlock your account.

Because of password reset forms, access to your e-mail account is access to your world. Keep your e-mail account secure!

For these websites, I most recommend using the phrase trick or anything that's both long and complicated. If you have to write it down, go ahead, just don't keep the password in an easy-to-access place like your wallet or laptop bag.

If you use these tricks, you'll be more safe and secure than the vast majority of people though you still need to protect your passwords.

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

shopping online Tutorial
|INDEX|next: Research Products
If you like to keep your money and safe yourself the trouble and hassle of getting nailed by a bad or fraudulent retailer online, you need to learn to identify them before it's too late.
Before you buy anything, utilize the vast power of the Internet to research products and pick the best one possible.
You're about to pay for something, but what's the safest way to do it?

Related Guide

Once you've gone through the trouble to make an online account with a company, make sure you protect your passwords properly

... or check out any of my other guides and tutorials by clicking here!

Bug Me Not - Login Avoidance Tool

For sites the require registration, but don't really need it, save time and see if someone has left a common-use login and password at BugMeNot

[Click for full description]

Validating Webstores and Services

It can be hard to know who to trust and who to not trust online, but there are things you can do to verify who the good guys and bad guys are before it's too late.

[Click for full description]

Research Products

One of the best things about shopping online is the ability to research information online.

[Click for full description]

Paying Online

Ever been nervous about paying online for something. Just take a second to learn about the various options and put your mind at ease.

[Click for full description]

Using HTTPS For Secure Login and Payment Online

Making online accounts is useful and fun, but doesn't mean much if someone can capture your login information and use it against you. Make sure to use this simple trick to prevent that from happening.

[Click for full description]

Data Abuse

Data brokering is the practice of collecting as much data as possible about customers or visitors into profiles. Then the data is sold, shared, or lost in data breaches to be used in targeted marketing or ID Theft.

[Click for full description]

Validating Webstores and Services

It can be hard to know who to trust and who to not trust online, but there are things you can do to verify who the good guys and bad guys are before it's too late.

[Click for full description]

Research Products

One of the best things about shopping online is the ability to research information online.

[Click for full description]

Paying Online

Ever been nervous about paying online for something. Just take a second to learn about the various options and put your mind at ease.

[Click for full description]