Rebecca Sounds Reveille – Wake Up To – Online Stranger Danger, Who’s Vulnerable?
WATCH TLBTV SHOW BELOW INTRO ARTICLE
Safety, Identity Theft, Social Media Monitoring, Web Monitoring
Who is vulnerable?
By TLB Media Director & RSR Show Host: Rebecca L. Mahan
Parents and other family members, friends, friends of friends, companies, predators, potential employers, our government, and even other countries from hackers to ISIS … There is no one who surf’s the internet, uses Bluetooth devices, cell phones, wifi connections, or even toys, who is safe from being monitored, hacked, having information stolen, or even being victimized.
There are numerous events that most of us have heard about. Things like having adware, malware, and vicious attacks on personal and professional computers, seem to be common place. Often critical damage to computers happen. Companies who make electronic products and those who create software, usually take action in protecting your computer from malicious hacks such as theses. Sometimes it can be too late. Other companies have created programs to identify malicious programs, alerting you to remove, or remove them for you. These are known as security or virus protection programs. Unfortunately, villains still manage to create viruses that have not been invented.
There is identity theft that can not only evolve from malicious attacks, but steal your personal information, such as, social security number, bank account numbers, address, passwords, and other personally identifying information- even tax returns and medical information. Anything you save or type on your computer is at risk. Oh yes, even if it has been deleted!
But wait…. There’s more!
Cyber bullying and child predators are taking advantage of social media. Bullying has now come out of the playground and landed in your child’s room, or at least in your house, or where they access the internet. Children aren’t the only ones either to be victimized by the cyber bully, adults are too. Child predators are no longer contained to their house and having to remain “x” amount of feet from a school, daycare center, or where children play. Though there are orders issued by the courts to predators about internet usage, it still happens. Predators are just targeting children, but anyone who seems vulnerable. That can be elderly, single, disabled, really anyone.
Think about the information you look at online, from your bank account to your medical records, from social media to online shopping. Think about the information you post on the net. How easy is it to piece together your life and the others around you?
We get excited to share with friends and family what we are interested in, where we go, and the things we do. We share everything! Even if you set your social media accounts to private, there are times when it reverts to public, there are hackers, and fakes- yep, people who make fake accounts. We get duped.
There are methods to protect ourselves from a number of scenarios, though not fool proof … nothing is. As we have been told time and time again, we need to get in the habit of protecting ourselves in every way we possibly can… and know what to do if something goes awry.
On this episode, I discuss the below headlines and offer tips and suggestions to do just that. Protect yourself as best you can!
Here are some interesting headlines…
“And we’re not talking professional hackers,” a report states “It’s easy enough for almost anyone to do.”
A study found that four toys have major vulnerabilities that could allow access to strangers:
• Furby Connect
• I-Que Intelligent Robot
• Toy-fi Teddy
• CloudPets cuddly toy
In each of the toys, the Bluetooth had an insecure connection, meaning any person could access the software without a password, code or authentication.
“That person would need hardly any technical know-how to ‘hack’ your child’s toy,” a related report states.
The range of Bluetooth is typically limited to 32 feet, so the report warns that the immediate concern is malicious people nearby.
However, there are methods for extending Bluetooth range, and it’s possible someone could set up a mobile system in a vehicle to trawl the streets hunting for unsecured toys … Which toys?
Can it get any worse … ?
Watch this informative presentation …
So, what are things you can do to protect yourself and your children?
I personally offer and provide (off the show) FREE Personal Safety classes. Classes can be taken online individually or as a group. They can be taken in person individually, in groups, for children, teens, adults, and businesses. You may email me direct at firstname.lastname@example.org for more information. PUT “FREE CLASS” in the email subject line.
Here are some safety links specifically for children:
If you would like to write, host a TLBTV show, for The Liberty Beacon Project, or be a guest on Rebecca Sounds Reveille or another show on TLBTV, click the email link on this page or email Rebecca directly at: email@example.com
About your host Rebecca L. Mahan: Rebecca is The Liberty Beacon Project Media Director, Host of TLBTV’s Rebecca Sounds Reveille, a United Stated Marine Corps veteran and a retired police officer of over 10 years. Rebecca is a published author and had been a long running columnist for a community college newspaper. She has also been an award winning radio show host and has produced, booked, and interviewed guests for her shows. Her education includes: Associates degrees in Christian Studies, General Education, General Business Management, and Law Enforcement. Rebecca also has a Bachelor’s degrees in Church Ministry and Occupational Studies -Vocational Arts, as well as a Master’s degree in Biblical Studies. She is a certified Mediator and Event Planner.
Click on the image below to visit TLB Project on twitter …