TLBTV: Rebecca Sounds Reveille – Wake Up To – Online Stranger Danger, Who’s Vulnerable?

Rebecca Sounds Reveille – Wake Up To – Online Stranger Danger, Who’s Vulnerable?

WATCH TLBTV SHOW BELOW INTRO ARTICLE

Safety, Identity Theft, Social Media Monitoring, Web Monitoring 

Who is vulnerable?

By TLB Media Director & RSR Show Host:  Rebecca L. Mahan

Parents and other family members, friends, friends of friends, companies, predators, potential employers, our government, and even other countries from hackers to ISIS … There is no one who surf’s the internet, uses Bluetooth devices, cell phones, wifi connections, or even toys, who is safe from being monitored, hacked, having information stolen, or even being victimized.

There are numerous events that most of us have heard about. Things like having adware, malware, and vicious attacks on personal and professional computers, seem to be common place. Often critical damage to computers happen. Companies who make electronic products and those who create software, usually take action in protecting your computer from malicious hacks such as theses. Sometimes it can be too late. Other companies have created programs to identify malicious programs, alerting you to remove, or remove them for you. These are known as security or virus protection programs. Unfortunately, villains still manage to create viruses that have not been invented.

There is identity theft that can not only evolve from malicious attacks, but steal your personal information, such as, social security number, bank account numbers, address, passwords, and other personally identifying information- even tax returns and medical information. Anything you save or type on your computer is at risk. Oh yes, even if it has been deleted!

Unwittingly, unless you read every privacy policy and terms of agreement, on every website you go to, prior to typing any personal information, you more than likely have allowed that sites to retain your information, put cookies on your computer, pass your information on to third party companies (who then may sell your information), and/or use your information for targeted advertising on you. Should you be the person who does read it all, you may still not be able to circumvent these things from happening. Doesn’t all this seem overwhelming?

But wait…. There’s more!

Cyber bullying and child predators are taking advantage of social media. Bullying has now come out of the playground and landed in your child’s room, or at least in your house, or where they access the internet. Children aren’t the only ones either to be victimized by the cyber bully, adults are too. Child predators are no longer contained to their house and having to remain “x” amount of feet from a school, daycare center, or where children play. Though there are orders issued by the courts to predators about internet usage, it still happens. Predators are just targeting children, but anyone who seems vulnerable. That can be elderly, single, disabled, really anyone.

Think about the information you look at online, from your bank account to your medical records, from social media to online shopping. Think about the information you post on the net. How easy is it to piece together your life and the others around you?

We get excited to share with friends and family what we are interested in, where we go, and the things we do. We share everything! Even if you set your social media accounts to private, there are times when it reverts to public, there are hackers, and fakes- yep, people who make fake accounts. We get duped.

There are methods to protect ourselves from a number of scenarios, though not fool proof … nothing is. As we have been told time and time again, we need to get in the habit of protecting ourselves in every way we possibly can… and know what to do if something goes awry.

On this episode, I discuss the below headlines and offer tips and suggestions to do just that. Protect yourself as best you can!

Here are some interesting headlines…

•  Your Facebook Likes Can Tell Advertisers If You’re an Introvert or Extrovert

•  Pentagon Accidently Exposes Web Monitoring

•  Social Media to be Monitored by the Federal Government (Canada)

•  Calif. School District Monitoring Social Media Activity

•  BEN BERNANKE VICTIMIZED BY IDENTITY THEFT RING

•  IDENTITY THEFT IN THE U.K. MORE THAN DOUBLES IN A YEAR

•  Uber reveals cover-up of hack affecting 57M riders, drivers

•  Secret Code Is Recording Every Keystroke You Make On More Than 400 Of The Most Popular Websites On The Internet

•  These popular gifts aren’t stranger-danger proof (BY KAITLYN ALANIS, The Wichita EAgle)

“And we’re not talking professional hackers,” a report states “It’s easy enough for almost anyone to do.”

A study found that four toys have major vulnerabilities that could allow access to strangers:

• Furby Connect

• I-Que Intelligent Robot

• Toy-fi Teddy

• CloudPets cuddly toy

In each of the toys, the Bluetooth had an insecure connection, meaning any person could access the software without a password, code or authentication.

“That person would need hardly any technical know-how to ‘hack’ your child’s toy,” a related report states.

The range of Bluetooth is typically limited to 32 feet, so the report warns that the immediate concern is malicious people nearby.

However, there are methods for extending Bluetooth range, and it’s possible someone could set up a mobile system in a vehicle to trawl the streets hunting for unsecured toys … Which toys?

My Friend Cayla’ Doll Records Children’s Speech, Is Vulnerable to Hackers

Can it get any worse … ?

Here’s What You Need to Know About KRACK, the Worst Cyber Threat Yet

Watch this informative presentation …

So, what are things you can do to protect yourself and your children?

I personally offer and provide (off the show) FREE Personal Safety classes. Classes can be taken online individually or as a group. They can be taken in person individually, in groups, for children, teens, adults, and businesses. You may email me direct at rebeccamahan@publicist.com for more information. PUT “FREE CLASS” in the email subject line.

Here are some safety links specifically for children:

Safety 4 kids – Stranger-Danger

Teaching Children about Stranger Danger

What to Teach Kids About Strangers

Teaching Stranger Safety Skills to Children and Adults With Disabilities

8 TIPS: TEACHING STRANGER DANGER

••••

If you would like to write, host a TLBTV show, for The Liberty Beacon Project, or be a guest on Rebecca Sounds Reveille or another show on TLBTV, click the email link on this page or email Rebecca directly at: rebeccamahan@publicist.com

••••

Visit the Rebecca Sounds Reveille Host page

••••

Watch more episodes of Rebecca Sounds Reveille

••••

About your host Rebecca L. Mahan: Rebecca is The Liberty Beacon Project Media Director, Host of TLBTV’s Rebecca Sounds Reveille, a United Stated Marine Corps veteran and a retired police officer of over 10 years. Rebecca is a published author and had been a long running columnist for a community college newspaper. She has also been an award winning radio show host and has produced, booked, and interviewed guests for her shows. Her education includes: Associates degrees in Christian Studies, General Education, General Business Management, and Law Enforcement. Rebecca also has a Bachelor’s degrees in Church Ministry and Occupational Studies -Vocational Arts, as well as a Master’s degree in Biblical Studies. She is a certified Mediator and Event Planner.

••••

Click on the image below to visit TLB Project on twitter …

Be the first to comment

Leave a Reply

Your email address will not be published.


*


%d bloggers like this: