According to Jiwire, there are around 823,314 free and paid Wifi hotspots in the world. There are 135,758 in the United States alone, meaning there’s a pretty good chance you have used at least one of these hotspots at a hotel, the subway station, the nearest Starbucks or even the bus, yet, not many people are aware of the vulnerabilities they expose themselves to while using these hotspots, which include stolen social network, banking and e-mail information to name but a few.
But, don’t panic.
The Prey Team is here to help you with your device’s safety and so we present you 7 tips to take into account when using Wi-Fi hotspots.
As most iOS users know, it is extremely easy to uninstall apps in your iDevice. Just press an app icon long enough until it starts to shake uncontrollably and a little x will appear on the corner. Press it and the app is gone as quick as a bunny. But, have you ever asked yourself if there was a way to make uninstalling your favorite anti-theft software, a.k.a. Prey, less easy in iOS? Well, we have and we found a way. It is very easy and I will show how.
Cellphone theft has been rising quite considerably. So much so that the chances of getting your device snatched is becoming a scarily common occurrence. In London, 314 phones are stolen everyday, which is 70% of all the personals taken. In San Francisco, 40% of all the robberies in 2012 were of cellphones. This is no wonder when we take into account that carrying a smartphone, the majority of phones stolen, is akin to carrying $300+ in one tiny piece of equipment and that there is plenty of black market for such products in the world.
So, here are some pointers to protect yourself and your phone from criminals (gathered personally by the security gnomes from Prey Labs):
Nobody is off limits when it comes to laptop theft. We use these portable devices for a myriad of things: to take notes at school (or randomly browse the internet at a boring lecture), for work, to store our important files, music, memories, and more. Sadly, no matter how much time or money we invest securing them, the chances of your laptop getting stolen are there, and according to your lifestyle, they can vary quite significantly.
Every service on the web will ask you for your email address, even when you’re creating a new email account. An email is always a backup plan for times when you can’t remember your password, or you can’t access your account; and since that’s the simplest way to confirm your identity, almost every site will do that. But what if someone hacks, and successfully hijacks your email account? With the current authentication services, a hacker could take over your whole online identity, including every site you care about.
But we don’t want that to happen, so follow these simple tips to transform your email address in the stronghold you need to keep your online identity safe and sound.
IFTTT stands for If this, then that. It’s a super cool website that claims to help you put the internet to work for you. It lets you create connections between 59 different web services using statements like the one above, for free, and it’s so simple that anyone could use it. You choose the ingredients and then make your recipes, which you can share with the world if they make you proud. And if you’re not in the creative mood, you can browse more than 50,000 public recipes available discovering some interesting stuff.
As you might have seen, we get lots of recovery stories from our users. They tell us how their stuff got stolen and how they got it back, and in some cases, how they managed to do this even from a different country.
So we decided to do a small research and list the top five places where laptops get stolen, according to the hundreds of stories we’ve received so far. This might reduce the chance of your laptop from being stolen, so go grab a cup of coffee and read this carefully.
Passwords and data leaks are so common nowadays that you can’t be sure about what site was last hacked. In the last couple of months, users from big companies such as Last.fm, Linkedin, Yahoo!, Blizzard Entertainment and even Sony got hacked and their personal data exposed.
A Last.fm password hack doesn’t seem particularly harmful but the truth is that most people use the same login/password for every site they have an account on. That means if someone got your password in Last.fm, they’ve possibly got your Gmail and PayPal passwords, and use your information for an identity theft and account hijack.
Here are a few tips to make your digital life a bit safer.
You’re planning to attend the London Olympics. Great! London is a beautiful city, full of life and places to visit. While it’s not a particularly dangerous place to travel to, it’s important you take some precautions just in case. Keep on reading for a few tips for your safety during the Games.
Almost every day we get emails asking for tips on what to do after installing Prey. So we figured, given that our software is usually installed on new devices, why not share a few other tips as well?
So here’s our list!