Categories

Economy & Politics

Tools

  • Economy & Politics
  • Investing
  • Personal Finance
  • Related Posts


    Gov’t Data Sharpens Focus On Crude-Oil Train Routes
    People From Around the World Discuss ‘Firestone and the Warlord’
    Federal Reserve Announces Sweeping Review Of Its Big Bank Oversight
    How America’s Thanksgiving Turkeys Got So Huge
    U.S. Banks Are Lending To Everyone But Homeowners
    Click-baiting Or Insanity? Florida Paper Calls For Outright Gun Ban
    GQ Magazine Ranks Obama Among ‘Least Influential’ People Of 2014
    HHS Admits Obamacare Optimism Based On Smoke And Mirrors
    UMich Confidence Misses By Most In 13 Months
    Chicago PMI Suffers 4th Biggest Drop Since Lehman
    Prosperity Amidst The Ruins
    Core Durable Orders Drop Most Since Polar Vortex, Core CapEx Lowest Since May
    Initial Jobless Claims Spikes Above 300k To 3-Month Highs, Biggest Miss In 11 Months
    U.S. Drone Strike Math – 41 Terrorists Targeted, 1,147 People Killed
    Caught On Tape: Car Plows Into Demonstrators During Ferguson Rally In Minneapolis


    The Most Dangerous ‘Everyday’ Threat to Your Privacy

    Three powerful forces have come together to dismantle the privacy of U.S. citizens.

    First, government programs and regulations have formed the foundation of a massive tracking grid for all individuals. It has passed laws that give it sweeping “snooping” authority. It can now legally peer deeper into our daily lives than ever before.

    Second, corporations collect huge amounts of our personal data to aid in marketing. The government can also force them to hand over customer records. In essence, banks, Internet service providers, airlines, car-rental agencies, cellphone companies and more have become proxy agents of the government’s domestic intelligence apparatus.

    Third, we live in a hyper-connected technological age. Smartphones, “cloud” computing and credit cards have made it easier than ever to rob someone’s resources — even his or her identity. This provides unprecedented opportunity for crooks to use your data against you.

    This “new” America is a dangerous place. But there are simple steps you can take to protect yourself and your family. I’ll share several with you today.

    In a recent Wired article, one of the magazine’s senior writers described how a hacker “dissolved” his online data:

    In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.

    Among the casualties in this “digital massacre” were all the digital photos he had of his daughter’s first year of life.

    The hacker exploited a weakness in Apple’s security measures. But as the writer discovered, he could have prevented the worst of the damage.

    The No. 1 way people’s accounts are hacked has nothing to do with the actual password. It has everything to do with the password “recovery tools.” These are systems email providers and online stores have in place to help you if you’ve forgotten your password.

    It turns out, every day, folks are providing hackers an easy way to exploit these recovery tools. They’re signing credit card receipts.

    Credit card receipts “X out” all but the last four digits of your credit card number. You may think this provides a strong degree of security. Think again. In Apple’s case, the recovery tools require the last four digits of the credit card linked to the account and the account holder’s billing address.

    Addresses are easily attainable via public record searches. Combine this with the last four digits of a credit card and, voila, you have taken over access to someone’s AppleID. And it’s not just Apple that works like this. Any number of corporations have similar programs.

    But there is a solution.

    From now on, whenever you use your credit card, always black out the last four digits on your receipt. Do this on the business copy as well as your own. If anyone hassles you, explain you have a legal right to do so. The digital transaction has already occurred; you are just keeping your personal data private.

    Another major weakness in password “recovery tools” is the use of “security questions.” These are often mundane questions like “What town were you born in?” or “What is your mother’s maiden name?”

    A simple search of public records and social networking sites (like Facebook) should yield these answers. At the very least, it will give a hacker a short list from which to deduce the correct answers.

    But there is a solution.

    Do not supply answers to these easily identifiable questions.

    If you’re given the option to choose your own recovery question, make it a tough one. Make it nonsensical. Make it something that only you would know. And if you have no choice but to use the stock questions provided, give false answers.

    For example, if the question asks for your mother’s maiden name, make up a name like “MacSmithowitz.” Keep the answers written down on paper (never in digital form) in a secure location that only you can access.

    Finally, the biggest “recovery tool” weakness is your primary email account. That’s because on the Internet, all “roads” lead to your email address. It’s the nexus of your online environment.

    A hacker with access to your email can immediately gain access to your other accounts by resetting their passwords. (The confirmation emails for these are sent to your primary account, which he now has control over.)

    He can also change the password and shut you out from it; peruse financial data and gain partial account numbers, like the last four digits of your credit card and Social Security numbers; rummage through all your private data, including photos, videos and more; gain access to your cloud-based files and devices; and delete things of value to you.

    This is exactly what happened to the Wired writer.

    But there is a solution.

    First, never “daisy chain” your passwords. This means do not use the same password for every account you own. A compromise of one means a compromise of all.

    Also, never select “remember me” or “keep me signed in” on your email website. (This allows others who use the same computer to access your email without needing a password at all.)

    And if it’s offered, always use “two-factor” authentication. For example, in order to log in, you might need your password plus a code sent to an alternate email or mobile device that is associated with your account.

    All these steps may take a little extra time and effort. But think about it this way. Let’s say you own a rare, jeweled necklace. Would you leave this out on a table in your front yard, just so others could admire its beauty? Or would you take steps to keep it safe?

    In the modern age, your personal information is more valuable than exquisite jewelry. And the strategies I showed you today are a few easy ways to keep it safe. You should put them into practice immediately.

    Here’s to our health, wealth and a great retirement,

    —Dr. David Eifrig

    P.S. This is just a small sampling of the privacy techniques I’ve been researching recently. I’ve also figured out a way to make sure no one can track what you are doing online, for example. And I even learned a very clever trick supposedly used by terrorists and cheating spouses to send messages that can never be traced, even if someone has access to your email account. To learn more of these techniques, see my full presentation here.

    This article originally ran on Monday, Dec. 24 at DailyWealth.com.

    Dr. David Eifrig Jr. is the editor of two of Stansberry's best advisory services. One of his advisories, Retirement Millionaire, is a monthly letter showing readers how to live a millionaire lifestyle on less than you'd imagine possible. He travels around the U.S. looking for bargains, deals and great investment ideas. Already his average reader has saved $2,793 since 2008 (documented in each Retirement Millionaire issue). He also writes Retirement Trader, a bi-monthly advisory that explains simple techniques to make large, but very safe, gains in the stock and bond markets. This is a pure finance play and the reason Porter Stansberry loves having "Doc" on the team. Doc holds an MBA from Kellogg and has worked in arbitrage and trading groups with major Wall Street investment banks (Goldman Sachs). In 1995, he retired from the "Street," went to UNC-Chapel Hill for medical school and became an ophthalmologist. Now, in his latest "retirement," he joined Stansberry & Associates full-time to share with readers his experiences and ideas.

    | All posts from Dr. David Eifrig Jr.

    Discuss this Story:

    Comment Policy: We encourage open discussion. Comments including racist statements, profanity, name calling or spam will be removed at our discretion. We use filters for spam protection. If your comment does not appear it is likely because it violates the policy.

    Grant Williams: The Consequences Of Economic Peace
    Saudi, UAE Signal No Push For OPEC Oil Cut
    WTO Postpones Trade Deal By A Day After Last-minute Objection
    U.S. Core Capital Goods Orders Fall For Second Straight Month In October
    U.S. Consumer Spending Rebounds, Income Rises Modestly
    China To Push Growth Of Outsourcing Industry
    Online Protest Delays EU Plan To Resolve U.S. Trade Row
    Juncker Unveils Investment Plan To Kick-start EU Growth
    ECB Outlook Lifts Europe Shares, Australian Dollar Sags
    Bring Congress’s Budget Watchdog Out Of The Shadows
    Will The Republicans Have The Guts To Play Hardball?
    More IRS Employee Hijinks: Out-of-date Tax Records, Lax Enforcement Of Second-job Policy
    Court Action May Set Precedent For Future Cellphone Snooping Attempts By Law Enforcement
    Ron Paul: Defeat Of USA FREEDOM Act Is A Victory For Freedom
    Nigeria Raises Rates, Devalues To Defend Collapsing Currency As Oil-Price Blowback Spreads
    Ferguson In Flames, Shots Fired, Police Car Destroyed, Tear-Gas Deployed, Looting; NYC Brooklyn & Triborough Bridge & LA Freeways Blocked
    Liquidity Does Not Create Solvency
    Mapping Recent “Incidents” Between Russia And NATO
    The Truth About The Keystone XL Pipeline
    U.S. Third-quarter Growth Revised Higher On Consumer, Business Spending
    China Won’t Consider More Rate Cuts Or Easing Until Fourth Quarter Data Out: Official
    Russian Oil Tsar To Meet OPEC As Saudis Keep Market Guessing
    India, U.S. Hold First Trade Dialogue In Four Years
    Bank Of Japan’s Kuroda Resolute In Fight Against Deflation, Says Ready To Ease More
    OECD Sees Gradual World Recovery, Urges ECB To Do More
    European Shares At Two-month High, Oil Flat Ahead Of OPEC
    U.S. Economy Grew At 3.9% Pace In Q3
    All That Wasted Noise Over Benghazi
    Student Debt Vs. Car Loans
    Judge To California AG: Stop Stalling And Comply With Court Order To End 10-day Firearms Wait Period
    Read more from Economy & Politics...

    Liberty Investor Digest

    Get today's most important
    financial headlines all in
    one place by email!



    Sources


    close[X]

    Sign Up For Liberty Investor Digest™!

    Get Liberty Investor Digest FREE By Email!

    Input your name and email address in the fields below and get today's most important financial headlines sent straight to you inbox!

    Privacy PolicyYou can opt-out at any time. We protect your information like a mother hen. We will not sell or rent your email address to anyone for any reason.