Protecting Your Cyberturf - WFXG FOX 54 - News Now

  • Protecting Your CyberturfMore>>

  • Google helps you track how you're being tracked

    Google helps you track how you're being tracked

    Thursday, July 28 2016 12:55 PM EDT2016-07-28 16:55:02 GMT
    If you haven't thought it yourself, you likely know someone who has.  There's an impression that Google just "knows" things.  One thing the company says it knows for sure is that you are concerned about your privacy.  They want to show their customers they are responsive to that.  WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says Google has created an easy way for you to see the data that's being collected about you.  Below she out...More >>
    If you haven't thought it yourself, you likely know someone who has.  There's an impression that Google just "knows" things.  One thing the company says it knows for sure is that you are concerned about your privacy.  They want to show their customers they are responsive to that.  WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says Google has created an easy way for you to see the data that's being collected about you.  Below she out...More >>
  • Before you play Pokemon Go or any smart phone games, a warning

    Before you play Pokemon Go or any smart phone games, a warning

    Thursday, July 21 2016 12:50 PM EDT2016-07-21 16:50:19 GMT
    If you play the hot smart phone crazy Pokemon Go, or any other smart phone app game, there are a few things you have to think about. WBTV Cyber Expert Theresa Payton offered a checklist for you before you agree to play any game on your phone.  Her advice follows: Safety tips: 1.  Check the games settings and make sure it's not accessing "all" of your personal information. 2.  Use a unique email address 3.  Tie in app purchases to a pre paid gift card...More >>
    If you play the hot smart phone crazy Pokemon Go, or any other smart phone app game, there are a few things you have to think about. WBTV Cyber Expert Theresa Payton offered a checklist for you before you agree to play any game on your phone.  Her advice follows: Safety tips: 1.  Check the games settings and make sure it's not accessing "all" of your personal information. 2.  Use a unique email address 3.  Tie in app purchases to a pre paid gift card...More >>
  • A warning if you have "smart" devices controlling your home

    A warning if you have "smart" devices controlling your home

    Friday, July 8 2016 8:17 AM EDT2016-07-08 12:17:33 GMT
    If you have "smart" devices in your home, such as thermostats or light controls, you know if the internet goes down you're in trouble.  Without that connection to cyberspace those devices may not work. WBTV Cyber Expert Theresa Payton has some advice if you want to keep that smart home operating smoothly.  That advice is below: When the internet goes down, consider it as catastrophic as a  power outage if all of your devices are "smart" or Internet...More >>
    If you have "smart" devices in your home, such as thermostats or light controls, you know if the internet goes down you're in trouble.  Without that connection to cyberspace those devices may not work. WBTV Cyber Expert Theresa Payton has some advice if you want to keep that smart home operating smoothly.  That advice is below: When the internet goes down, consider it as catastrophic as a  power outage if all of your devices are "smart" or Internet...More >>
  • Watch for hidden trade-offs for online convenience

    Watch for hidden trade-offs for online convenience

    Friday, July 1 2016 8:03 AM EDT2016-07-01 12:03:16 GMT
    Windows 10 users who enjoy some of it's conveniences have something to consider. WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton wants you to think about a couple of things before you use one of it's features. "WiFi Sense" is meant to help you get online quickly by automatically connecting to WiFi networks.  Payton says the service was also sharing your WiFi password with Outlook and Skype.  Payton explains the information is encrypted, which is...More >>
    Windows 10 users who enjoy some of it's conveniences have something to consider. WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton wants you to think about a couple of things before you use one of it's features. "WiFi Sense" is meant to help you get online quickly by automatically connecting to WiFi networks.  Payton says the service was also sharing your WiFi password with Outlook and Skype.  Payton explains the information is encrypted, which is...More >>
  • Spotting fake tech support scams

    Spotting fake tech support scams

    Thursday, June 23 2016 1:25 PM EDT2016-06-23 17:25:18 GMT

    When cyber criminals find a scam that works, they don't want to retire it.  That's why the fake technical support scams pop up time and again. That's when they call or email pretending to be your device manufacturers "tech support" and claim your device needs a repair.  It is their sneaky way into getting you to let them into your computer so they can mine for personal information. We asked WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton to tell ...

    More >>

    When cyber criminals find a scam that works, they don't want to retire it.  That's why the fake technical support scams pop up time and again. That's when they call or email pretending to be your device manufacturers "tech support" and claim your device needs a repair.  It is their sneaky way into getting you to let them into your computer so they can mine for personal information. We asked WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton to tell ...

    More >>
  • 'Locky' computer virus hitting local computers

    'Locky' computer virus hitting local computers

    Friday, June 17 2016 8:04 PM EDT2016-06-18 00:04:40 GMT

    A new form of malware is making the rounds.  It is striking computers in and around Charlotte. It is called "Locky" and this strain scrambles, encrypts and re-names all of your important files.  You'll know you have it if suddenly your file names end in ".locky". The cybercriminals will tell you that THE ONLY WAY to get your files back is to purchase the decryption key via the dark web and pay roughly $200-$500 in bitcoin which is a digital, untraceable...

    More >>

    A new form of malware is making the rounds.  It is striking computers in and around Charlotte. It is called "Locky" and this strain scrambles, encrypts and re-names all of your important files.  You'll know you have it if suddenly your file names end in ".locky". The cybercriminals will tell you that THE ONLY WAY to get your files back is to purchase the decryption key via the dark web and pay roughly $200-$500 in bitcoin which is a digital, untraceable...

    More >>
  • Hackers targeting Microsoft Office

    Hackers targeting Microsoft Office

    Thursday, June 2 2016 8:33 AM EDT2016-06-02 12:33:02 GMT
    It may seem like Microsoft computers and devices are more often the target of hackers than Apple products, because new alerts seem to be about Microsoft. Apple products can get viruses, but there's something about Microsoft that WBTV Cyber Expert Theresa Payton says is attractive to cyber criminals. "In a new research report, a "White Hat", or good-guy researcher, took a look at the most popular Microsoft malware and viruses and noticed that many of them target Microso...More >>
    It may seem like Microsoft computers and devices are more often the target of hackers than Apple products, because new alerts seem to be about Microsoft. Apple products can get viruses, but there's something about Microsoft that WBTV Cyber Expert Theresa Payton says is attractive to cyber criminals. "In a new research report, a "White Hat", or good-guy researcher, took a look at the most popular Microsoft malware and viruses and noticed that many of them target Microso...More >>
  • Good-guy hackers find a way around sophisticated security methods

    Good-guy hackers find a way around sophisticated security methods

    Friday, May 27 2016 10:42 AM EDT2016-05-27 14:42:44 GMT
    Passwords are a recurring theme in the Protecting Your Cyberturf segment.  We talk about how many all of us have, how secure they are or are not.  We have also talked about other forms of protecting your private information that may in time be the most widely used and secure ways to authenticate who you are. Now we are getting word that even those most secure ways might be vulnerable, too. Many people love the idea of supplying a fingerprint or some type of a physical iden...More >>
    Passwords are a recurring theme in the Protecting Your Cyberturf segment.  We talk about how many all of us have, how secure they are or are not.  We have also talked about other forms of protecting your private information that may in time be the most widely used and secure ways to authenticate who you are. Now we are getting word that even those most secure ways might be vulnerable, too. Many people love the idea of supplying a fingerprint or some type of a physical iden...More >>
  • What would you trade for guaranteed internet access?

    What would you trade for guaranteed internet access?

    Friday, May 20 2016 9:48 AM EDT2016-05-20 13:48:47 GMT
    What would you give up to ensure you had access to high speed internet? That's the question a new study commissioned by wireless carrier AT & T poses.  It gets to the heart of FOMO, or "fear of missing out". The researchers polled people from all 50 states and the District of Columbia.  AT&T admits the findings are not nationally representative but the company asked 2,000 Americans what they would sacrifice to stay online. WBTV Cyber Expert Theresa Payto...More >>
    What would you give up to ensure you had access to high speed internet? That's the question a new study commissioned by wireless carrier AT & T poses.  It gets to the heart of FOMO, or "fear of missing out". The researchers polled people from all 50 states and the District of Columbia.  AT&T admits the findings are not nationally representative but the company asked 2,000 Americans what they would sacrifice to stay online. WBTV Cyber Expert Theresa Payto...More >>
  • 29% of Android phones not getting security updates

    29% of Android phones not getting security updates

    Friday, May 13 2016 9:48 AM EDT2016-05-13 13:48:07 GMT
    Friday, May 13 2016 4:27 PM EDT2016-05-13 20:27:00 GMT
    Each year Google performs an annual security report on the Droid operating system for smart phones.  Its most recent review found roughly 29% of phone users are not receiving important security upgrades.  It is because only phones running the most up to date version of software automatically get those security patches.  In some cases many manufacturers are not sending out timely updates and some users do not have their phones set up to automatically receive the patches...More >>
    Each year Google performs an annual security report on the Droid operating system for smart phones.  Its most recent review found roughly 29% of phone users are not receiving important security upgrades.  It is because only phones running the most up to date version of software automatically get those security patches.  In some cases many manufacturers are not sending out timely updates and some users do not have their phones set up to automatically receive the patches...More >>
  • Scammers threaten jail time if you don't pay a fine

    Scammers threaten jail time if you don't pay a fine

    Friday, April 22 2016 1:06 PM EDT2016-04-22 17:06:46 GMT
    Friday, April 22 2016 4:00 PM EDT2016-04-22 20:00:26 GMT
    Simply by placing a phone call or dropping an email, scam artists are having good luck conning people out of hundreds of dollars if not more. This scam making the rounds sounds pretty intimidating if you're on the receiving end.  It is happening often enough that the US Federal Court System has issued an official warning about it. The scammers claim to be from the court, or from the US Marshall's Office, and they claim you owe a fine because you didn't show up for your assigne...More >>
    Simply by placing a phone call or dropping an email, scam artists are having good luck conning people out of hundreds of dollars if not more. This scam making the rounds sounds pretty intimidating if you're on the receiving end.  It is happening often enough that the US Federal Court System has issued an official warning about it. The scammers claim to be from the court, or from the US Marshall's Office, and they claim you owe a fine because you didn't show up for your assigne...More >>
  • Another security breach serves as a warning

    Another security breach serves as a warning

    Friday, April 8 2016 12:41 PM EDT2016-04-08 16:41:17 GMT
    Friday, April 8 2016 5:00 PM EDT2016-04-08 21:00:21 GMT
    Any security breach of private information should be an opportunity for all of us to make sure we're properly protecting our privacy. That's the warning from WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton. She reminds us of this in the wake of "The Panama Papers".  11.5 million documents were leaked anonymously from a prominent Panama-based law firm that helped create shell companies for the world's rich and famous.  200 countries are mentioned...More >>
    Any security breach of private information should be an opportunity for all of us to make sure we're properly protecting our privacy. That's the warning from WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton. She reminds us of this in the wake of "The Panama Papers".  11.5 million documents were leaked anonymously from a prominent Panama-based law firm that helped create shell companies for the world's rich and famous.  200 countries are mentioned...More >>
  • Using cell signal jammers

    Using cell signal jammers

    Thursday, March 24 2016 11:38 AM EDT2016-03-24 15:38:11 GMT
    Friday, March 25 2016 4:00 PM EDT2016-03-25 20:00:20 GMT
    It may be a lesson your parents taught you.  Just because you can do something, doesn't mean you should. In this case we're talking about using a cell phone jammer.  Jammers prevent phones from working in a certain local area.  The devices are readily available to the average person online  Still, using one could get you into deep trouble. WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says while some organizations and institutions can use jammers,...More >>
    It may be a lesson your parents taught you.  Just because you can do something, doesn't mean you should. In this case we're talking about using a cell phone jammer.  Jammers prevent phones from working in a certain local area.  The devices are readily available to the average person online  Still, using one could get you into deep trouble. WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says while some organizations and institutions can use jammers,...More >>
  • Amazon explores pay by "selfie" system

    Amazon explores pay by "selfie" system

    Friday, March 18 2016 12:14 PM EDT2016-03-18 16:14:29 GMT
    Friday, March 18 2016 4:14 PM EDT2016-03-18 20:14:05 GMT
    We told you recently that credit card giant MasterCard is testing a new way to authenticate payments using a selfie. This week Amazon announced it is attempting to do something similar. WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says Amazon has filed a patent for payment via facial contortion, also known as a selfie.  The company filed for the patent in October. Organizations testing this way to pay say it is a safer form of verification than a password.&nbs...More >>
    We told you recently that credit card giant MasterCard is testing a new way to authenticate payments using a selfie. This week Amazon announced it is attempting to do something similar. WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says Amazon has filed a patent for payment via facial contortion, also known as a selfie.  The company filed for the patent in October. Organizations testing this way to pay say it is a safer form of verification than a password.&nbs...More >>
  • Ransomware hitting mac users

    Ransomware hitting mac users

    Friday, March 11 2016 10:36 AM EST2016-03-11 15:36:22 GMT
    Friday, March 11 2016 4:30 PM EST2016-03-11 21:30:08 GMT
    If you think being a Mac owner will spare you the hassle of getting viruses on your laptop or desktop, think again. More viruses have spread to Macs in recent years and now the infection of the moment, ransomware, is hitting Mac users too. That's when a cyber-criminal finds his or her way into your computer, accesses your files, and then holds them "hostage" until you pay (usually in Bitcoin) to get them back. WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc., says...More >>
    If you think being a Mac owner will spare you the hassle of getting viruses on your laptop or desktop, think again. More viruses have spread to Macs in recent years and now the infection of the moment, ransomware, is hitting Mac users too. That's when a cyber-criminal finds his or her way into your computer, accesses your files, and then holds them "hostage" until you pay (usually in Bitcoin) to get them back. WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc., says...More >>
  • Protecting your privacy in your own home

    Protecting your privacy in your own home

    Thursday, March 3 2016 12:38 PM EST2016-03-03 17:38:52 GMT
    Friday, March 4 2016 4:15 PM EST2016-03-04 21:15:01 GMT
    You've heard the phrase "the internet of things", right? It is when everyday objects like your refrigerator or your kids toys can connect to the internet.  So many things are connected now, it raises a new privacy concern. We asked WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc.,  how easy it would be for a hacker to peep into your home using these devices. "Using any tool, like Shodan for example, people can spy on you via your internet of things....More >>
    You've heard the phrase "the internet of things", right? It is when everyday objects like your refrigerator or your kids toys can connect to the internet.  So many things are connected now, it raises a new privacy concern. We asked WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc.,  how easy it would be for a hacker to peep into your home using these devices. "Using any tool, like Shodan for example, people can spy on you via your internet of things....More >>
  • Hackers point out weakness in GPS system

    Hackers point out weakness in GPS system

    Friday, February 26 2016 8:51 AM EST2016-02-26 13:51:36 GMT
    Friday, February 26 2016 4:00 PM EST2016-02-26 21:00:20 GMT
    When is the last time you broke out a map or an atlas?  We are all so reliant on GPS because it spares us the trouble of planning a route and it seems to rarely fail us. Unfortunately, like all things tech, it can be hacked.  "Good guy" ethical hackers found this recently when they showed how they could simulate a car's journey without the car ever moving.  In the demo, they typed into the GPS where they wanted to go and without actually moving or starting on...More >>
    When is the last time you broke out a map or an atlas?  We are all so reliant on GPS because it spares us the trouble of planning a route and it seems to rarely fail us. Unfortunately, like all things tech, it can be hacked.  "Good guy" ethical hackers found this recently when they showed how they could simulate a car's journey without the car ever moving.  In the demo, they typed into the GPS where they wanted to go and without actually moving or starting on...More >>
  • When phone finding software just doesn't work right

    When phone finding software just doesn't work right

    Thursday, February 18 2016 7:56 AM EST2016-02-18 12:56:43 GMT
    Friday, February 19 2016 4:00 PM EST2016-02-19 21:00:19 GMT
    12 times in the past year, someone has knocked on the door of a couple's home in Atlanta, thinking their lost or stolen smart phones were inside. WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc.,  found these cases of phone finding software glitches and thought it was a good opportunity to remind you that GPS isn't always the be-all, end-all. Payton says the search function in both Apple's "Find my phone" and Android's "Device Manager" were off in thi...More >>
    12 times in the past year, someone has knocked on the door of a couple's home in Atlanta, thinking their lost or stolen smart phones were inside. WBTV Cyber Expert Theresa Payton, CEO of Fortalice, Inc.,  found these cases of phone finding software glitches and thought it was a good opportunity to remind you that GPS isn't always the be-all, end-all. Payton says the search function in both Apple's "Find my phone" and Android's "Device Manager" were off in thi...More >>
  • For security reasons, upgrade to Internet Explorer 11

    For security reasons, upgrade to Internet Explorer 11

    Tuesday, February 9 2016 12:18 PM EST2016-02-09 17:18:43 GMT
    Friday, February 12 2016 4:00 PM EST2016-02-12 21:00:19 GMT
    If you click into Internet Explorer on your PC to hop onto the internet, it's time to upgrade. We told you a while back that Microsoft would be "retiring" the Windows XP system but it is also ending its support of some versions of Internet Explorer.  WBTV Cyber Expert and CEO of Fortalice, Inc. Theresa Payton says Microsoft stopped supporting IE 8 and 9 and in many cases 10.  That means there will be no new security patches and that impacts how safe it is to use f...More >>
    If you click into Internet Explorer on your PC to hop onto the internet, it's time to upgrade. We told you a while back that Microsoft would be "retiring" the Windows XP system but it is also ending its support of some versions of Internet Explorer.  WBTV Cyber Expert and CEO of Fortalice, Inc. Theresa Payton says Microsoft stopped supporting IE 8 and 9 and in many cases 10.  That means there will be no new security patches and that impacts how safe it is to use f...More >>
  • Stopping unexpected in-app purchases

    Stopping unexpected in-app purchases

    Friday, January 15 2016 11:07 AM EST2016-01-15 16:07:00 GMT
    Friday, January 15 2016 3:29 PM EST2016-01-15 20:29:00 GMT
    Perhaps by now you have broken in some of the new devices you received as gifts over the holidays.  Or, perhaps, you've been unable to pry those new smart phones, tablets, and gaming systems from your children's hands. A lesson learned the hard way is proof you need to have control over how those devices are used. A dad in England realized a little too late that his child had racked up a $5,000 bill with the Apple app store by unknowingly making in-game purchases on his dad's iP...More >>
    Perhaps by now you have broken in some of the new devices you received as gifts over the holidays.  Or, perhaps, you've been unable to pry those new smart phones, tablets, and gaming systems from your children's hands. A lesson learned the hard way is proof you need to have control over how those devices are used. A dad in England realized a little too late that his child had racked up a $5,000 bill with the Apple app store by unknowingly making in-game purchases on his dad's iP...More >>
  • Potential data breach of voter information

    Potential data breach of voter information

    Thursday, January 7 2016 7:46 AM EST2016-01-07 12:46:19 GMT
    Friday, January 8 2016 3:30 PM EST2016-01-08 20:30:07 GMT
    Thank goodness for good-guy hackers. An ethical hacker, who looks for data that needs to be protected as a hobby,  is now working with law enforcement to assist them in investigating a data breach he exposed. It involved voter data dating back as far as 2000.  The information included voter names, phone numbers, home addresses, dates of birth, political parties, whether they voted in the primary or general elections going back to 2000, gender and other personal details. WB...More >>
    Thank goodness for good-guy hackers. An ethical hacker, who looks for data that needs to be protected as a hobby,  is now working with law enforcement to assist them in investigating a data breach he exposed. It involved voter data dating back as far as 2000.  The information included voter names, phone numbers, home addresses, dates of birth, political parties, whether they voted in the primary or general elections going back to 2000, gender and other personal details. WB...More >>
  • Study shows teens may be too trusting of online information

    Study shows teens may be too trusting of online information

    Wednesday, December 9 2015 11:04 AM EST2015-12-09 16:04:39 GMT
    Friday, December 11 2015 3:45 PM EST2015-12-11 20:45:12 GMT
    It is easy to be trusting of what we see or read online.  However, as adults, we typically know to look at those things with a critical eye.A new study by Ofcom, the U.K.'s communication regulations commission, shows teens are far too trusting with that information.The study, which you can read by clicking here, found roughly one in five children aged 12 to 15 believe that information found in search engines like Yahoo! Google or Bing must be true. It also indicates many teen...More >>
    It is easy to be trusting of what we see or read online.  However, as adults, we typically know to look at those things with a critical eye.A new study by Ofcom, the U.K.'s communication regulations commission, shows teens are far too trusting with that information.The study, which you can read by clicking here, found roughly one in five children aged 12 to 15 believe that information found in search engines like Yahoo! Google or Bing must be true. It also indicates many teen...More >>
  • Is Siri spilling your secrets?

    Is Siri spilling your secrets?

    Thursday, December 3 2015 8:39 AM EST2015-12-03 13:39:11 GMT
    Friday, December 4 2015 3:45 PM EST2015-12-04 20:45:09 GMT
    We've all become quite good at locking our smart phones, with pass codes or fingerprints, in order to protect prying eyes from peeping our private information.WBTV Cyber Expert, and founder of Fortalice, Theresa Payton says she's found a weak link in the security chain.Her name is Siri.Payton says you can press the home button of a locked phone and still get Siri to tell you things about the owner of that phone.She suggests that you try holding the home button and telling Siri the foll...More >>
    We've all become quite good at locking our smart phones, with pass codes or fingerprints, in order to protect prying eyes from peeping our private information.WBTV Cyber Expert, and founder of Fortalice, Theresa Payton says she's found a weak link in the security chain.Her name is Siri.Payton says you can press the home button of a locked phone and still get Siri to tell you things about the owner of that phone.She suggests that you try holding the home button and telling Siri the foll...More >>
  • Major hotel chain experiences security breach

    Major hotel chain experiences security breach

    Wednesday, November 25 2015 11:00 AM EST2015-11-25 16:00:40 GMT
    Friday, November 27 2015 3:47 PM EST2015-11-27 20:47:08 GMT
    If you have stayed in a hotel that is in the Starwood chain in the last year, you may have fallen victim to a data breach.The chain, which includes Sheraton and Westin among others, was infiltrated by hackers at 54 of it's locations in the US and Canada.  The malware has since been removed, according to company officials.  The targeted point of sale operations in the hotel gift shops, restaurants, and other retail locations but not the reservation systems.You can view the ful...More >>
    If you have stayed in a hotel that is in the Starwood chain in the last year, you may have fallen victim to a data breach.The chain, which includes Sheraton and Westin among others, was infiltrated by hackers at 54 of it's locations in the US and Canada.  The malware has since been removed, according to company officials.  The targeted point of sale operations in the hotel gift shops, restaurants, and other retail locations but not the reservation systems.You can view the ful...More >>
  • How "dark apps" hinder law enforcement

    How "dark apps" hinder law enforcement

    Friday, November 20 2015 11:09 AM EST2015-11-20 16:09:18 GMT
    Friday, November 20 2015 3:45 PM EST2015-11-20 20:45:09 GMT
    There are certain apps, if you know where to find them, that can help keep your cyber conversations private.WBTV Cyber Expert Theresa Payton says so-called "dark apps" are meant to be used by "good guys" but often fall into the hands of cybercriminals.There are indications terror groups, like ISIS, are using these apps to communicate and plan attacks away from the eyes of law enforcement, even if they have search warrants. Payton says the apps offer encryption ...More >>
    There are certain apps, if you know where to find them, that can help keep your cyber conversations private.WBTV Cyber Expert Theresa Payton says so-called "dark apps" are meant to be used by "good guys" but often fall into the hands of cybercriminals.There are indications terror groups, like ISIS, are using these apps to communicate and plan attacks away from the eyes of law enforcement, even if they have search warrants. Payton says the apps offer encryption ...More >>
  • Top 3 digital holiday scams

    Top 3 digital holiday scams

    Friday, November 13 2015 7:13 AM EST2015-11-13 12:13:03 GMT
    Saturday, November 14 2015 11:47 AM EST2015-11-14 16:47:35 GMT
    There is an unfortunate side-effect of the holiday season.  Halloween had barely passed before the holiday online scammers started doing their dirty work.More >>
    There is an unfortunate side-effect of the holiday season.  Halloween had barely passed before the holiday online scammers started doing their dirty work.More >>
  • Ranking companies on how well they protect your privacy

    Ranking companies on how well they protect your privacy

    Wednesday, November 4 2015 8:09 AM EST2015-11-04 13:09:30 GMT
    Friday, November 6 2015 3:30 PM EST2015-11-06 20:30:09 GMT
    It turns out some companies protect your privacy better than others, but no company is a true standout.That is one result of a new study called Ranking Digital Rights which looked at the privacy policies and user agreements of many big tech companies and graded them based on how well they protect you.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton says the world’s top tech companies mostly rate a "D" or worse in protecting your privacy and freedom of e...More >>
    It turns out some companies protect your privacy better than others, but no company is a true standout.That is one result of a new study called Ranking Digital Rights which looked at the privacy policies and user agreements of many big tech companies and graded them based on how well they protect you.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton says the world’s top tech companies mostly rate a "D" or worse in protecting your privacy and freedom of e...More >>
  • Software changes mean it is time to double-check your Facebook privacy settings

    Software changes mean it is time to double-check your Facebook privacy settings

    Thursday, October 29 2015 9:13 AM EDT2015-10-29 13:13:01 GMT
    Friday, October 30 2015 3:30 PM EDT2015-10-30 19:30:08 GMT
    Your past may be coming back to haunt you.Facebook has changed how people can search all of your posts, even the really old ones.  However, you can turn back the clock.WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, says Facebook tweaked the software it uses to power searches.  Now roughly 2 trillion older posts will be added to the Facebook search profile.  Facebook says it is an effort to give you the most recent, relevant public posts along with...More >>
    Your past may be coming back to haunt you.Facebook has changed how people can search all of your posts, even the really old ones.  However, you can turn back the clock.WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, says Facebook tweaked the software it uses to power searches.  Now roughly 2 trillion older posts will be added to the Facebook search profile.  Facebook says it is an effort to give you the most recent, relevant public posts along with...More >>
  • Hidden apps your teen might be using

    Hidden apps your teen might be using

    Thursday, October 22 2015 7:48 AM EDT2015-10-22 11:48:14 GMT
    Friday, October 23 2015 3:30 PM EDT2015-10-23 19:30:08 GMT
    They may look like your average smart phone app, but there's a huge market for "secret" apps or "decoy" apps that can hide someone's activity on their cell phones.This is an issue for parents who do their best to try to keep tabs on their teens smart phone use.WBTV Cyber Expert, and CEO of Fortalice, LLC Theresa Payton, says there are many legitimate reasons why a person may want to hide messages on their cell phones.  They might be protecting sensitive, person...More >>
    They may look like your average smart phone app, but there's a huge market for "secret" apps or "decoy" apps that can hide someone's activity on their cell phones.This is an issue for parents who do their best to try to keep tabs on their teens smart phone use.WBTV Cyber Expert, and CEO of Fortalice, LLC Theresa Payton, says there are many legitimate reasons why a person may want to hide messages on their cell phones.  They might be protecting sensitive, person...More >>
  • Must-have security features in iOS9

    Must-have security features in iOS9

    Wednesday, October 14 2015 1:07 PM EDT2015-10-14 17:07:53 GMT
    Friday, October 16 2015 3:30 PM EDT2015-10-16 19:30:07 GMT
    iPhone and iPad users have had some time now to decide whether to upgrade to the new operating system iOS9. Some bugs have been worked out and WBTV Cyber Expert, and CEO of Fortalice, Theresa Payton says she's very excited about the privacy and security options.Almost all of these features can be found on your device under the "settings" function.  Payton shares her thoughts and advice below:New Security Features1. LOCK IT UP! Set a longer (and stronger) six-di...More >>
    iPhone and iPad users have had some time now to decide whether to upgrade to the new operating system iOS9. Some bugs have been worked out and WBTV Cyber Expert, and CEO of Fortalice, Theresa Payton says she's very excited about the privacy and security options.Almost all of these features can be found on your device under the "settings" function.  Payton shares her thoughts and advice below:New Security Features1. LOCK IT UP! Set a longer (and stronger) six-di...More >>
  • When is the right time for your children to log on to social media?

    When is the right time for your children to log on to social media?

    Wednesday, October 7 2015 11:59 AM EDT2015-10-07 15:59:07 GMT
    Friday, October 9 2015 3:33 PM EDT2015-10-09 19:33:06 GMT
    The father of a young girl has sued a major social media company for failing to enforce its age restriction policy after claiming his daughter was exposed to sexual predators when she signed up for an account at age 11.Granted, she seemingly violated the site's age policy.  However, our Cyber Expert, and CEO of Fortalice Theresa Payton, says parents can use this as a teachable moment.While most of the big social media sites do have age restrictions, anyone with a little tech savvy...More >>
    The father of a young girl has sued a major social media company for failing to enforce its age restriction policy after claiming his daughter was exposed to sexual predators when she signed up for an account at age 11.Granted, she seemingly violated the site's age policy.  However, our Cyber Expert, and CEO of Fortalice Theresa Payton, says parents can use this as a teachable moment.While most of the big social media sites do have age restrictions, anyone with a little tech savvy...More >>
  • Are your smart accessories too smart for you?

    Are your smart accessories too smart for you?

    Thursday, October 1 2015 12:11 PM EDT2015-10-01 16:11:02 GMT
    Friday, October 2 2015 3:31 PM EDT2015-10-02 19:31:00 GMT
    So much of what we own is "smart".Smart phones, smart watches, in some cases even smart clothing all intended to make our lives easier and more convenient.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton has a quick reminder before you put on that smart accessory."Researchers have shown that a smartwatch's motion sensors can be used to detect what keys you're pressing which can help others guess the words you're typing," Payton explained.She says it...More >>
    So much of what we own is "smart".Smart phones, smart watches, in some cases even smart clothing all intended to make our lives easier and more convenient.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton has a quick reminder before you put on that smart accessory."Researchers have shown that a smartwatch's motion sensors can be used to detect what keys you're pressing which can help others guess the words you're typing," Payton explained.She says it...More >>
  • Ready or not, Windows 10 is waiting for you

    Ready or not, Windows 10 is waiting for you

    Friday, September 25 2015 1:23 PM EDT2015-09-25 17:23:12 GMT
    Friday, September 25 2015 3:47 PM EDT2015-09-25 19:47:04 GMT
    You may not be ready to download Windows 10 to your PC but Microsoft has it ready for you when you are.  So ready, in fact, that it's already sitting there in the background of your system waiting.Microsoft says it helps up-gradable devices get ready for Windows 10 by downloading the files those who have chosen to receive updates through Windows Update will need if they decide to upgrade.That certainly is convenient.However, our cyber expert is warning you might want to uninstall ...More >>
    You may not be ready to download Windows 10 to your PC but Microsoft has it ready for you when you are.  So ready, in fact, that it's already sitting there in the background of your system waiting.Microsoft says it helps up-gradable devices get ready for Windows 10 by downloading the files those who have chosen to receive updates through Windows Update will need if they decide to upgrade.That certainly is convenient.However, our cyber expert is warning you might want to uninstall ...More >>
  • Is your teen "sexting"?

    Is your teen "sexting"?

    Friday, September 18 2015 11:12 AM EDT2015-09-18 15:12:57 GMT
    Friday, September 18 2015 3:49 PM EDT2015-09-18 19:49:01 GMT
    A 2012 study in the Journal of Pediatrics indicates sexting is a new norm among young adults.More >>
    A 2012 study in the Journal of Pediatrics indicates sexting is a new norm among young adults.More >>
  • How to keep teens from falling into hacking schemes

    How to keep teens from falling into hacking schemes

    Thursday, September 10 2015 11:45 AM EDT2015-09-10 15:45:56 GMT
    Friday, September 11 2015 3:30 PM EDT2015-09-11 19:30:09 GMT
    "This should be a warning to all teens that you never know what could happen online," Payton said.More >>
    "This should be a warning to all teens that you never know what could happen online," Payton said.More >>
  • Why you shouldn't check for Ashley Madison connections

    Why you shouldn't check for Ashley Madison connections

    Wednesday, September 2 2015 8:47 AM EDT2015-09-02 12:47:52 GMT
    Wednesday, September 2 2015 3:00 PM EDT2015-09-02 19:00:17 GMT
    When hackers released the email addresses of millions of people found to be using the Ashley Madison cheating website, we all became curious.   Could anyone we know be found on the list?More >>
    When hackers released the email addresses of millions of people found to be using the Ashley Madison cheating website, we all became curious.   Could anyone we know be found on the list?More >>
  • Organizations work together to eliminate child porn online

    Organizations work together to eliminate child porn online

    Wednesday, August 19 2015 8:12 AM EDT2015-08-19 12:12:26 GMT
    Wednesday, August 19 2015 4:33 PM EDT2015-08-19 20:33:05 GMT
    There's new help in ridding the internet of inappropriate pictures of children used by sexual predators.Big online household names like Google, Facebook, Twitter, Microsoft and Yahoo have committed to policing and removing these images of child sexual abuse.  They'll work in tandem with an independent group called the Internet Watch Foundation (IWF).WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says the IWF will share any links that portray children in sexual ways ...More >>
    There's new help in ridding the internet of inappropriate pictures of children used by sexual predators.Big online household names like Google, Facebook, Twitter, Microsoft and Yahoo have committed to policing and removing these images of child sexual abuse.  They'll work in tandem with an independent group called the Internet Watch Foundation (IWF).WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says the IWF will share any links that portray children in sexual ways ...More >>
  • Easy fix to a Facebook glitch

    Easy fix to a Facebook glitch

    Wednesday, August 12 2015 9:01 AM EDT2015-08-12 13:01:45 GMT
    Wednesday, August 12 2015 5:00 PM EDT2015-08-12 21:00:22 GMT
    You're on it once a day, maybe twice a day, maybe all day.  A bug has been found by a good guy, a decoder, which allowed him to get past Facebook encryption and see Facebook user id’s, cellphones, pictures, and other personal data.Better that he caught the problem and not a bad-guy cyber creep.Here's the good news.  Facebook says it is always improving it's security, and, WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, says there are easy s...More >>
    You're on it once a day, maybe twice a day, maybe all day.  A bug has been found by a good guy, a decoder, which allowed him to get past Facebook encryption and see Facebook user id’s, cellphones, pictures, and other personal data.Better that he caught the problem and not a bad-guy cyber creep.Here's the good news.  Facebook says it is always improving it's security, and, WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, says there are easy s...More >>
  • Don't download a phony Windows 10 upgrade

    Don't download a phony Windows 10 upgrade

    Wednesday, August 5 2015 8:50 AM EDT2015-08-05 12:50:33 GMT
    Wednesday, August 5 2015 3:15 PM EDT2015-08-05 19:15:09 GMT
    You've learned by now that online scammers go where the action is.Right now the hot download for PC users is the new Windows 10 operating system from Microsoft.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton, says she didn't expect it would take long before the scams around Windows 10 began.  She says CISCO recently sent an alert about a scam email making the rounds.  Theresa breaks down what you need to know and her advice follows:Tips:1.  Bewa...More >>
    You've learned by now that online scammers go where the action is.Right now the hot download for PC users is the new Windows 10 operating system from Microsoft.WBTV Cyber Expert, and CEO of Fortalice Solutions, Theresa Payton, says she didn't expect it would take long before the scams around Windows 10 began.  She says CISCO recently sent an alert about a scam email making the rounds.  Theresa breaks down what you need to know and her advice follows:Tips:1.  Bewa...More >>
  • 4 easy steps to protecting your online privacy

    4 easy steps to protecting your online privacy

    Wednesday, July 29 2015 11:49 AM EDT2015-07-29 15:49:16 GMT
    Wednesday, July 29 2015 3:46 PM EDT2015-07-29 19:46:01 GMT
    We know the risk of a privacy breach in our lives is possible, but how probable is it? You may think protecting your privacy online requires so many steps and is such a hassle that it isn't worth the effort.  WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton says it is worth the effort and the process does not have to be overwhelming.She offers what she calls the "Fabulous 4".  They are her easy steps to securing your online privacy.  Sh...More >>
    We know the risk of a privacy breach in our lives is possible, but how probable is it? You may think protecting your privacy online requires so many steps and is such a hassle that it isn't worth the effort.  WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton says it is worth the effort and the process does not have to be overwhelming.She offers what she calls the "Fabulous 4".  They are her easy steps to securing your online privacy.  Sh...More >>
  • Improvements to spam filters helping to save the emails you need to read

    Improvements to spam filters helping to save the emails you need to read

    Wednesday, July 22 2015 12:03 PM EDT2015-07-22 16:03:44 GMT
    Wednesday, July 22 2015 3:30 PM EDT2015-07-22 19:30:09 GMT
    Whether it is your home or work computer, there's likely a spam blocker installed within your email system.Typically it catches the bad messages and pulls them away from the good.  However, every once in a while an email you need winds up in your spam folder.WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says there is good news.  She says technology is improving and new features may help you block spam better without missing important emails.Payton says all...More >>
    Whether it is your home or work computer, there's likely a spam blocker installed within your email system.Typically it catches the bad messages and pulls them away from the good.  However, every once in a while an email you need winds up in your spam folder.WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, says there is good news.  She says technology is improving and new features may help you block spam better without missing important emails.Payton says all...More >>
  • How to avoid a "Flash" bug

    How to avoid a "Flash" bug

    Wednesday, July 15 2015 12:40 PM EDT2015-07-15 16:40:00 GMT
    Wednesday, July 15 2015 3:31 PM EDT2015-07-15 19:31:03 GMT
    Theres a bug in some popular software that you might use every day.Adobe Flash promises a fix is coming to a bug that WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton says allows malware to be installed onto your computer. Payton adds the bug was found when a digital surveillance company was hacked.When they looked at how the bad guys hacked them, they found the Adobe flaw, Payton said.Payton warns the vulnerabilities affect almost all computers striking some Windows, M...More >>
    Theres a bug in some popular software that you might use every day.Adobe Flash promises a fix is coming to a bug that WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton says allows malware to be installed onto your computer. Payton adds the bug was found when a digital surveillance company was hacked.When they looked at how the bad guys hacked them, they found the Adobe flaw, Payton said.Payton warns the vulnerabilities affect almost all computers striking some Windows, M...More >>
  • Can you spot a fake online review?

    Can you spot a fake online review?

    Wednesday, July 1 2015 10:01 AM EDT2015-07-01 14:01:43 GMT
    Wednesday, July 1 2015 3:30 PM EDT2015-07-01 19:30:09 GMT
    We count on online reviews to help us make decisions about the products we buy, the services we agree to, and the restaurants where we eat. Would it surprise you to know that some of the reviews you count on could actually be fake?WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, found a Harvard/Boston University study which indicates as many as a third of the reviews online could be from people paid to give good or bad feedback about a particular company.Payton says it...More >>
    We count on online reviews to help us make decisions about the products we buy, the services we agree to, and the restaurants where we eat. Would it surprise you to know that some of the reviews you count on could actually be fake?WBTV Cyber Expert, and CEO of Fortalice Solutions Theresa Payton, found a Harvard/Boston University study which indicates as many as a third of the reviews online could be from people paid to give good or bad feedback about a particular company.Payton says it...More >>
  • Safe password storage

    Safe password storage

    Wednesday, June 17 2015 9:16 AM EDT2015-06-17 13:16:52 GMT
    Wednesday, June 17 2015 3:30 PM EDT2015-06-17 19:30:03 GMT
    Where do you store your passwords?In a notebook? Written on sticky notes scattered all over your computer desk? Many of us choose that route because we aren't so sure about those online password vault services.WBTV Cyber Expert, CEO of Fortalice Solutions Theresa Payton, says there are some new advances that might make these online vaults a better option for you now. Her advice follows:Before you use one of these free or inexpensive services:Do your homework.Read the privacy policy.Type into ...More >>
    Where do you store your passwords?In a notebook? Written on sticky notes scattered all over your computer desk? Many of us choose that route because we aren't so sure about those online password vault services.WBTV Cyber Expert, CEO of Fortalice Solutions Theresa Payton, says there are some new advances that might make these online vaults a better option for you now. Her advice follows:Before you use one of these free or inexpensive services:Do your homework.Read the privacy policy.Type into ...More >>
  • Users of popular messaging app taking precautions

    Users of popular messaging app taking precautions

    Wednesday, June 10 2015 3:25 PM EDT2015-06-10 19:25:22 GMT
    Wednesday, June 10 2015 3:25 PM EDT2015-06-10 19:25:22 GMT
    More than 800 million people are actively using a messaging app called "WhatsApp". Recently a potentially hackable feature was discovered.WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, explains what she's learned and shares a couple of steps you can take to protect yourself if you use this app.Her advice follows:Right now, here is what we know1. The WhatsApp account could be hijacked without knowing your device's password2. The hacker does not have to be sophisticated to snoop ...More >>
    More than 800 million people are actively using a messaging app called "WhatsApp". Recently a potentially hackable feature was discovered.WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, explains what she's learned and shares a couple of steps you can take to protect yourself if you use this app.Her advice follows:Right now, here is what we know1. The WhatsApp account could be hijacked without knowing your device's password2. The hacker does not have to be sophisticated to snoop ...More >>
  • The right age to start using social media

    The right age to start using social media

    Wednesday, June 3 2015 11:31 AM EDT2015-06-03 15:31:19 GMT
    Wednesday, June 3 2015 3:31 PM EDT2015-06-03 19:31:07 GMT
    What is the best age to start using social media?It is a question parents struggle to answer. We turned to WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, for advice.She says the age at which a child starts using sites like Facebook, Twitter, Snapchat and others really depends. Her advice follows:Determining Age Requirements:1. Your child should at least meet the minimum guidelines of each site. Read the terms of service for each site they use to determine the minimum age. Each ...More >>
    What is the best age to start using social media?It is a question parents struggle to answer. We turned to WBTV Cyber Expert Theresa Payton, CEO of Fortalice Solutions, for advice.She says the age at which a child starts using sites like Facebook, Twitter, Snapchat and others really depends. Her advice follows:Determining Age Requirements:1. Your child should at least meet the minimum guidelines of each site. Read the terms of service for each site they use to determine the minimum age. Each ...More >>
  • A warning about live streaming apps

    A warning about live streaming apps

    Wednesday, May 27 2015 7:54 AM EDT2015-05-27 11:54:19 GMT
    Wednesday, May 27 2015 3:30 PM EDT2015-05-27 19:30:08 GMT
    Live pictures on the go are easier than ever. Smart phone apps like Periscope and Meerkat allow you to send a live feed from wherever you are to followers all over the world.They're cool, immediate, and it's easy to get addicted.However, WBTV Cyber Expert Theresa Payton says there are some things to think about before you fire up your feed.Her information and advice follows:What is live streaming and how does it work for these two apps?Live streaming allows you to video tape from your smart p...More >>
    Live pictures on the go are easier than ever. Smart phone apps like Periscope and Meerkat allow you to send a live feed from wherever you are to followers all over the world.They're cool, immediate, and it's easy to get addicted.However, WBTV Cyber Expert Theresa Payton says there are some things to think about before you fire up your feed.Her information and advice follows:What is live streaming and how does it work for these two apps?Live streaming allows you to video tape from your smart p...More >>
  • Airplanes are vulnerable to hackers, report indicates

    Airplanes are vulnerable to hackers, report indicates

    Wednesday, May 13 2015 8:20 AM EDT2015-05-13 12:20:18 GMT
    Wednesday, May 20 2015 3:30 PM EDT2015-05-20 19:30:09 GMT
    Could airplanes be vulnerable to hackers?WBTV Cyber Expert Theresa Payton, founder of Fortalice Solutions, says it is possible but not likely.Still, she cautions, a new report by the US Government Accountability Office should be seen as a wake-up call.Payton says the report indicates the planes that could be hacked are some of the most popular in the sky. They include the Boeing 787 Dreamliner, the Airbus A350 and A380 aircraft. Other models and private jets could also be at risk according to...More >>
    Could airplanes be vulnerable to hackers?WBTV Cyber Expert Theresa Payton, founder of Fortalice Solutions, says it is possible but not likely.Still, she cautions, a new report by the US Government Accountability Office should be seen as a wake-up call.Payton says the report indicates the planes that could be hacked are some of the most popular in the sky. They include the Boeing 787 Dreamliner, the Airbus A350 and A380 aircraft. Other models and private jets could also be at risk according to...More >>
  • Are privacy policies forever?

    Are privacy policies forever?

    Wednesday, April 22 2015 11:41 AM EDT2015-04-22 15:41:19 GMT
    Wednesday, April 22 2015 5:51 PM EDT2015-04-22 21:51:55 GMT
    You might, however, assume if a company promises your private information is protected, it always will be. WBTV Cyber Expert, and CEO of cyber security firm Fortalice Solutions, Theresa Payton tells us that isn't always the case.More >>
    You might, however, assume if a company promises your private information is protected, it always will be. WBTV Cyber Expert, and CEO of cyber security firm Fortalice Solutions, Theresa Payton tells us that isn't always the case.
    More >>
  • Hackers target social media accounts of military

    Hackers target social media accounts of military

    Tuesday, April 14 2015 10:43 AM EDT2015-04-14 14:43:08 GMT
    Wednesday, April 15 2015 3:30 PM EDT2015-04-15 19:30:10 GMT
    With such a large military population, people living across North Carolina need to be aware of how self-proclaimed terrorists are targeting members of the US military and their families.WBTV Cyber Expert Theresa Payton has a warning for all of us.She says terrorists abroad are encouraging "lone wolf" attacks against the military members and their families using a hacking technique called doxing. The way Theresa describes it, it is when a person or group of people take all of your personal inf...More >>
    With such a large military population, people living across North Carolina need to be aware of how self-proclaimed terrorists are targeting members of the US military and their families.WBTV Cyber Expert Theresa Payton has a warning for all of us.She says terrorists abroad are encouraging "lone wolf" attacks against the military members and their families using a hacking technique called doxing. The way Theresa describes it, it is when a person or group of people take all of your personal inf...More >>
  • Could your car be spying on you?

    Could your car be spying on you?

    Wednesday, April 8 2015 11:59 AM EDT2015-04-08 15:59:14 GMT
    Wednesday, April 8 2015 3:30 PM EDT2015-04-08 19:30:03 GMT
    There are all types of technology in our cars these days. It helps us get around, allows us to talk on the phone "hands-free" and controls the music we listen to.Could that technology also be watching you? WBTV Cyber Expert Theresa Payton says it is possible for some of your tech to be keeping tabs on you. Which is why she says we need to ask plenty of questions before we buy or rent a car.She uses the example of rental car company Hertz. The company's newest version of it's on-board system w...More >>
    There are all types of technology in our cars these days. It helps us get around, allows us to talk on the phone "hands-free" and controls the music we listen to.Could that technology also be watching you? WBTV Cyber Expert Theresa Payton says it is possible for some of your tech to be keeping tabs on you. Which is why she says we need to ask plenty of questions before we buy or rent a car.She uses the example of rental car company Hertz. The company's newest version of it's on-board system w...More >>
  • Protections and privacy when using a mobile wallet

    Protections and privacy when using a mobile wallet

    Wednesday, March 18 2015 12:11 PM EDT2015-03-18 16:11:08 GMT
    Wednesday, March 25 2015 4:56 PM EDT2015-03-25 20:56:02 GMT
    Theresa reminds us that Apple Pay itself has not been breached. Any fraud so far has been centered around how the banks verify the cards added into Apple Pay.More >>
    Theresa reminds us that Apple Pay itself has not been breached. Any fraud so far has been centered around how the banks verify the cards added into Apple Pay.More >>
  • Avoid tax fraud scams

    Avoid tax fraud scams

    Wednesday, March 11 2015 12:04 PM EDT2015-03-11 16:04:36 GMT
    Wednesday, March 11 2015 3:30 PM EDT2015-03-11 19:30:10 GMT
    This is the time of year you rejoice or dread. It depends whether you owe the IRS or you get a refund.The tax deadline is fast approaching and this year tax experts say they're seeing even more cases of taxpayers becoming the target of fraudsters.We asked WBTV's cyber expert of Fortalice Solutions what's behind the spike and she offered a few suggestions and advice. That information follows:What is fueling the tax fraud?(1) all those breaches that you heard about last year? That treasure trov...More >>
    This is the time of year you rejoice or dread. It depends whether you owe the IRS or you get a refund.The tax deadline is fast approaching and this year tax experts say they're seeing even more cases of taxpayers becoming the target of fraudsters.We asked WBTV's cyber expert of Fortalice Solutions what's behind the spike and she offered a few suggestions and advice. That information follows:What is fueling the tax fraud?(1) all those breaches that you heard about last year? That treasure trov...More >>
  • Google is trying to make your life easier

    Google is trying to make your life easier

    Thursday, March 5 2015 9:24 AM EST2015-03-05 14:24:46 GMT
    Thursday, March 5 2015 9:24 AM EST2015-03-05 14:24:47 GMT
    Have you ever realized the power you have beyond a search engine to get a personal assistant like service? That's where "Google hacks" come in. Their sole purpose is to make life easier.We have so many tools available to us, it can be overwhelming. Still you can get help in some simple ways. WBTV Cyber Expert Theresa Payton, with Fortalice Solutions, shows you how to turn Google search into a life hack to make your life easier.Her suggestions follow:Go to Google and type in...1. Check a fligh...More >>
    Have you ever realized the power you have beyond a search engine to get a personal assistant like service? That's where "Google hacks" come in. Their sole purpose is to make life easier.We have so many tools available to us, it can be overwhelming. Still you can get help in some simple ways. WBTV Cyber Expert Theresa Payton, with Fortalice Solutions, shows you how to turn Google search into a life hack to make your life easier.Her suggestions follow:Go to Google and type in...1. Check a fligh...More >>
  • Protecting your devices if they are stolen

    Protecting your devices if they are stolen

    Wednesday, February 25 2015 12:29 PM EST2015-02-25 17:29:50 GMT
    Wednesday, February 25 2015 5:15 PM EST2015-02-25 22:15:08 GMT
    It has happened to all of us. You are working everywhere you go.The airport. The coffee shop. The beach. Then suddenly, you realize you need to leave your device unattended. Maybe it's to pay for something or visit the bathroom? Maybe it's to check on something in your car. Or perhaps you set it down just for a moment to check in at a hotel or cafe? Regardless, you have that moment where you question - should I leave it here or shouldn't I?Theresa Payton of Fortalice Solutions offers advice t...More >>
    It has happened to all of us. You are working everywhere you go.The airport. The coffee shop. The beach. Then suddenly, you realize you need to leave your device unattended. Maybe it's to pay for something or visit the bathroom? Maybe it's to check on something in your car. Or perhaps you set it down just for a moment to check in at a hotel or cafe? Regardless, you have that moment where you question - should I leave it here or shouldn't I?Theresa Payton of Fortalice Solutions offers advice t...More >>
  • Did your password make the top 25 list?

    Did your password make the top 25 list?

    Wednesday, January 28 2015 8:17 AM EST2015-01-28 13:17:05 GMT
    Wednesday, January 28 2015 5:15 PM EST2015-01-28 22:15:08 GMT
    The most common passwords used are still pretty common. "Password" and "123456" may be easy to remember but they are likely making it very easy for hackers to get into your account if you're using them.SplashData released it's annual "Worst Passwords List". WBTV Cyber Expert Theresa Payton shared the list with us. She says in the top 25 this year there are sports themed passwords like "baseball" and "football" and passwords like "dragon" related to favorite TV shows like Game of Thrones.Payto...More >>
    The most common passwords used are still pretty common. "Password" and "123456" may be easy to remember but they are likely making it very easy for hackers to get into your account if you're using them.SplashData released it's annual "Worst Passwords List". WBTV Cyber Expert Theresa Payton shared the list with us. She says in the top 25 this year there are sports themed passwords like "baseball" and "football" and passwords like "dragon" related to favorite TV shows like Game of Thrones.Payto...More >>
  • Chip and PIN vs chip and signature

    Chip and PIN vs chip and signature

    Wednesday, January 21 2015 10:56 AM EST2015-01-21 15:56:52 GMT
    Wednesday, January 21 2015 5:15 PM EST2015-01-21 22:15:07 GMT
    Last year could have been called the year of the hack.Customer credit cards compromised at Target, Michaels and several other retailers may have left many shoppers wondering if it is safe to pay with plastic.Our cyber expert says some of the major credit card companies, who originally planned to go with a "chip and PIN" system for all card holders starting this year are now rethinking that plan.Theresa Payton says many US companies have worried that adding a PIN requirement at the point of sa...More >>
    Last year could have been called the year of the hack.Customer credit cards compromised at Target, Michaels and several other retailers may have left many shoppers wondering if it is safe to pay with plastic.Our cyber expert says some of the major credit card companies, who originally planned to go with a "chip and PIN" system for all card holders starting this year are now rethinking that plan.Theresa Payton says many US companies have worried that adding a PIN requirement at the point of sa...More >>
  • Internet is a hotbed for human traffickers

    Internet is a hotbed for human traffickers

    Tuesday, January 13 2015 12:04 PM EST2015-01-13 17:04:42 GMT
    Wednesday, January 14 2015 5:15 PM EST2015-01-14 22:15:07 GMT
    We have talked about the dark side of the internet and that dark side has become the very place human traffickers are doing their dirty work.The Carolinas, particularly Charlotte, are a hotbed for the human trafficking trade because of our proximity to so many highways. They give traffickers easy access in and out of town to steal their victims away.However, the internet is playing a larger role than ever in giving traffickers access to potential victims.WBTV's cyber expert, Theresa Payton of...More >>
    We have talked about the dark side of the internet and that dark side has become the very place human traffickers are doing their dirty work.The Carolinas, particularly Charlotte, are a hotbed for the human trafficking trade because of our proximity to so many highways. They give traffickers easy access in and out of town to steal their victims away.However, the internet is playing a larger role than ever in giving traffickers access to potential victims.WBTV's cyber expert, Theresa Payton of...More >>
  • Safety and security important when buying the latest technology

    Safety and security important when buying the latest technology

    Tuesday, January 6 2015 11:31 AM EST2015-01-06 16:31:13 GMT
    Wednesday, January 7 2015 8:32 PM EST2015-01-08 01:32:47 GMT
    From the Consumer Electronics Show this year, we'll see all kinds of the greatest gadgets about to hit the market.However, privacy and safety are important to remember when purchasing these new products.More >>
    From the Consumer Electronics Show this year, we'll see all kinds of the greatest gadgets about to hit the market.However, privacy and safety are important to remember when purchasing these new products.More >>
  • Don't be duped by tech support scams

    Don't be duped by tech support scams

    Wednesday, December 31 2014 12:51 PM EST2014-12-31 17:51:32 GMT
    Wednesday, December 31 2014 5:15 PM EST2014-12-31 22:15:10 GMT
    There is a new support scam making the rounds and our Cyber Expert has received so many calls about it that she wanted to pass along a warning to you.Theresa Payton says cybercriminals are making unsolicited calls to people's homes to say that they are customer service from Microsoft or Apple and that they proactively noticed a problem on your computer. While it may sound like great customer service, Payton says it is likely a scam.Her advice and resources follow:How it works:1. They call or ...More >>
    There is a new support scam making the rounds and our Cyber Expert has received so many calls about it that she wanted to pass along a warning to you.Theresa Payton says cybercriminals are making unsolicited calls to people's homes to say that they are customer service from Microsoft or Apple and that they proactively noticed a problem on your computer. While it may sound like great customer service, Payton says it is likely a scam.Her advice and resources follow:How it works:1. They call or ...More >>
  • Keeping your account out of the hands of cyber criminals

    Keeping your account out of the hands of cyber criminals

    Tuesday, December 23 2014 1:21 PM EST2014-12-23 18:21:46 GMT
    Wednesday, December 24 2014 5:15 PM EST2014-12-24 22:15:10 GMT
    If you don't want to be hacked by cyber creeps you must keep tight security on your e-mail I-D and password.We now know that those two items are exactly what hackers are after because then they can get into all of your personal information.The problem is, so many of us don't pay enough attention, still, to e-mail security.WBTV cyber expert Theresa Payton says there are seven steps to getting your account back or preventing cyber criminals from owning it in the first place.Her advice follows:7...More >>
    If you don't want to be hacked by cyber creeps you must keep tight security on your e-mail I-D and password.We now know that those two items are exactly what hackers are after because then they can get into all of your personal information.The problem is, so many of us don't pay enough attention, still, to e-mail security.WBTV cyber expert Theresa Payton says there are seven steps to getting your account back or preventing cyber criminals from owning it in the first place.Her advice follows:7...More >>
  • Apps invading your privacy

    Apps invading your privacy

    Friday, December 12 2014 6:14 PM EST2014-12-12 23:14:29 GMT
    Wednesday, December 17 2014 5:15 PM EST2014-12-17 22:15:09 GMT
    There's a new resource that can help you compare the apps you put on your devices and see which are best at protecting your privacy.WBTV Cyber Expert Theresa Payton says a new study looked at over 1 million apps. It was an effort between Carnegie Mellon and the Federal Trade commission. They found that some of the fun games like a Fruit Ninja or Angry birds were some of the bigger offenders while Facebook and some Google apps actually did a better job guarding your privacy. Payton says the re...More >>
    There's a new resource that can help you compare the apps you put on your devices and see which are best at protecting your privacy.WBTV Cyber Expert Theresa Payton says a new study looked at over 1 million apps. It was an effort between Carnegie Mellon and the Federal Trade commission. They found that some of the fun games like a Fruit Ninja or Angry birds were some of the bigger offenders while Facebook and some Google apps actually did a better job guarding your privacy. Payton says the re...More >>
  • Phishing scams still work despite warnings

    Phishing scams still work despite warnings

    Wednesday, December 10 2014 1:12 PM EST2014-12-10 18:12:05 GMT
    Wednesday, December 10 2014 10:24 PM EST2014-12-11 03:24:20 GMT
    School and work calendars are jam packed. Holiday shopping is already underway. This is the time of year that social engineering by cybercriminals reaches an all time high. The bad guys know you are on the go and connected to the internet mainly by your smart phone. More >>
    School and work calendars are jam packed. Holiday shopping is already underway. This is the time of year that social engineering by cybercriminals reaches an all time high. The bad guys know you are on the go and connected to the internet mainly by your smart phone. More >>
  • Which smart phone is safest?

    Which smart phone is safest?

    Wednesday, December 3 2014 11:08 AM EST2014-12-03 16:08:12 GMT
    Wednesday, December 3 2014 5:15 PM EST2014-12-03 22:15:11 GMT
    Our Cyber Expert, Theresa Payton, is often asked which smart phone best protects your information.Her answer is simple. She says it depends upon how you use the phone. However, there are four things she says you should look for when shopping for a phone. Her advice follows:Can you lock your phone with a password? Is it something complex like a picture of your face, fingerprint, or a long password?Type in the phone model you are looking at and the words "breached" and "hacked" into your favori...More >>
    Our Cyber Expert, Theresa Payton, is often asked which smart phone best protects your information.Her answer is simple. She says it depends upon how you use the phone. However, there are four things she says you should look for when shopping for a phone. Her advice follows:Can you lock your phone with a password? Is it something complex like a picture of your face, fingerprint, or a long password?Type in the phone model you are looking at and the words "breached" and "hacked" into your favori...More >>
  • Watch out for "DarkHotel"

    Watch out for "DarkHotel"

    Wednesday, November 26 2014 12:40 PM EST2014-11-26 17:40:47 GMT
    Wednesday, November 26 2014 5:56 PM EST2014-11-26 22:56:16 GMT
    This is particularly important for those of you who travel. While this malware called "Dark Hotel" has been found mainly in Asia, not in the United States, Payton says there is a strong likelihood that it will reach our shores sooner than later.More >>
    This is particularly important for those of you who travel. While this malware called "Dark Hotel" has been found mainly in Asia, not in the United States, Payton says there is a strong likelihood that it will reach our shores sooner than later.More >>
  • Holiday gifts to protect your tech

    Holiday gifts to protect your tech

    Wednesday, November 19 2014 10:40 AM EST2014-11-19 15:40:45 GMT
    Wednesday, November 19 2014 5:15 PM EST2014-11-19 22:15:10 GMT
    There are plenty of new devices on the market that might make great holiday gifts for those special people in your life who have multiple electronic devices and need some help protecting them from cyber scammers and spammers.WBTV Cyber Expert Theresa Payton has some tech toys and protection strategies for the holidays. Her advice follows:1. Backup Your Phone/Tablet/Computer: Now you have cool, fun, and on the go ways to back up those devices. What if backing up your information were as easy a...More >>
    There are plenty of new devices on the market that might make great holiday gifts for those special people in your life who have multiple electronic devices and need some help protecting them from cyber scammers and spammers.WBTV Cyber Expert Theresa Payton has some tech toys and protection strategies for the holidays. Her advice follows:1. Backup Your Phone/Tablet/Computer: Now you have cool, fun, and on the go ways to back up those devices. What if backing up your information were as easy a...More >>
  • Is your web browser giving you away?

    Is your web browser giving you away?

    Wednesday, November 12 2014 11:57 AM EST2014-11-12 16:57:45 GMT
    Wednesday, November 12 2014 7:59 PM EST2014-11-13 00:59:47 GMT
    WBTV Cyber Expert Theresa Payton says when you visit a webpage, the browser that you use and the web server behind the webpage transfer information back and forth.More >>
    WBTV Cyber Expert Theresa Payton says when you visit a webpage, the browser that you use and the web server behind the webpage transfer information back and forth.More >>
  • Facebook searches for stolen passwords

    Facebook searches for stolen passwords

    Wednesday, November 5 2014 12:29 PM EST2014-11-05 17:29:55 GMT
    Wednesday, November 5 2014 5:44 PM EST2014-11-05 22:44:55 GMT
    Facebook is looking out for you, at least when it comes to whether your password has been snatched by the bad guys.The social media site keeps a close eye on security breaches More >>
    Facebook is looking out for you, at least when it comes to whether your password has been snatched by the bad guys.The social media site keeps a close eye on security breaches More >>
  • Protecting private photos

    Protecting private photos

    Wednesday, October 29 2014 8:32 AM EDT2014-10-29 12:32:12 GMT
    Wednesday, October 29 2014 5:15 PM EDT2014-10-29 21:15:08 GMT
    It seems those born into the digital age either don't understand or don't seem to mind that digital is forever.A new study from MyLife.com, manager of personal online information, asked "millenials" between the ages of 18 and 24 about how they use their smart phones.The results were enough to indicate cause for concern from WBTV Cyber Expert who says the study found 1 in 4 millenials have "embarrassing photos" on their phones.Theresa Payton offers her advice below on storing and the legalitie...More >>
    It seems those born into the digital age either don't understand or don't seem to mind that digital is forever.A new study from MyLife.com, manager of personal online information, asked "millenials" between the ages of 18 and 24 about how they use their smart phones.The results were enough to indicate cause for concern from WBTV Cyber Expert who says the study found 1 in 4 millenials have "embarrassing photos" on their phones.Theresa Payton offers her advice below on storing and the legalitie...More >>
  • The World Wide Web celebrates a birthday

    The World Wide Web celebrates a birthday

    If you are younger than 30, you probably cannot remember a time when you didn't have internet access. The World Wide Web turned 25 years old this year and according to a recent survey, many people feelMore >>
    Hard to believe but www is 25 years old.More >>
  • October is Cyber Security Awareness Month

    October is Cyber Security Awareness Month

    National Cyber Security Awareness Month, or NCSAM, is observed each October and it is in it's 10th year. This is sponsored by the Department of Homeland Security and the National Cyber Security AllianceMore >>
    Spending just a few minutes double-checking your privacy and security can make a big difference.More >>
  • Apple adds new layer of security for users

    Apple adds new layer of security for users

    Apple has added an entirely new layer of security. Apple committed they will NOT build a profile of you that they turn around and sell based on reading and aggregating your email content or web browsingMore >>
    Some changes are a part of the new operating system available for users.More >>
  • Tracking your location through pics of your pets

    Tracking your location through pics of your pets

    There are so many new cyber lessons to learn. Just when we think we have one down, there's a new twist. Don't post pictures of your vacation while you're on vacation because it lets people know you'reMore >>
    Professor creates a website that uses photos of family pets to prove how trackable we all are.More >>
  • Battling FOMO while away from the office

    Battling FOMO while away from the office

    Have you heard of FOMO? It is the trendy term for the Fear of Missing Out. So many of us feel it when we're distanced from our smart phones or tablets for too long. Even though we might want to unplugMore >>
    FOMO is a phenomenon from which so many of us now suffer.More >>
  • iPhone security settings that could protect you from advertisers

    iPhone security settings that could protect you from advertisers

    Ever wish you could use your iPhone without worrying about your privacy? Many of us don't realize that we may hold the power of privacy in our hands. Apple has heard its customers loud and clear andMore >>
    How two simple clicks can help you side-step hungry marketers.More >>
  • Unlocking your home with your smart phone

    Unlocking your home with your smart phone

    If you're the kind of person who often loses their keys at the bottom of their purse, some new technology might help. Some new apps may let you open the door to your home with a virtual key instead.More >>
    New apps make it easier to get into your home but there are some questions you should ask before you use them.More >>
  • Safer ways to share photos

    Safer ways to share photos

    So many of us use social media sites like Facebook and Instagram as the way we share our favorite photos with our friends and relatives. Cyber expert, Theresa Payton, says once a picture is digitallyMore >>
    It is hard to keep your photos private when sharing with friends on social media, but our Cyber Expert says there are other options.More >>
  • Monitoring your kids online without feeling like you're spying

    Monitoring your kids online without feeling like you're spying

    It isn't easy to stay one step ahead of your teenage kids online. You don't want to spy but you want to stay involved in what they're doing without crossing a line. A recent survey by the Pew ResearchMore >>
    It is important that parents have a sense of their children's online activities without making their teens feel like they can't be trusted.More >>
  • Kid-proofing your digital budget

    Kid-proofing your digital budget

    It happens in most families. You realize somehow your kids were able to download things from the internet but the catch is the download had a price and it was connected to your debit or credit card.More >>
    Steps you can take to make sure your kids don't make accidental online purchases.More >>
  • What happens after your credit card is hacked?

    What happens after your credit card is hacked?

    Have you ever wondered just where your stolen credit card numbers end up and what they're worth to thieves? When the cybercriminals steal your credit card info they have to race against the clock toMore >>
    Our cyber expert gives us a sneak peek into the cybercriminal underground.More >>
  • A digital prenuptial agreement

    A digital prenuptial agreement

    It's another sign we are living in a digital age. Many family attorneys now say they are seeing a trend where couples discuss BEFORE they get married what happens to the digital data they accumulate whileMore >>
    As "pre-nups" become more common, couples are adding something new.More >>
  • New tool helps fight online sexual predators

    New tool helps fight online sexual predators

    iGuardians help fight online predatorsiGuardians help fight online predators
    Last year, the U.S. Immigration and Customs Enforcement's Homeland Security Investigations (HSI) worked over 4,000 online sexual predator investigations. ICE logged almost one million hours workingMore >>
    Immigration and Customs Enforcement offers assistance to families in catching and reporting predators of children.More >>
  • Fighting back against retail hackers

    Fighting back against retail hackers

    Most recently it was restaurant chain PF Chang's and it's customers who fell victim to online hackers targeting debit and credit card numbers. The hack is still under investigation and the US Secret ServiceMore >>
    Steps you can take in the weeks following the most recent debit and credit security breach.More >>
  • Facebook gets proactive about your privacy

    Facebook gets proactive about your privacy

    More of you are managing your online privacy in strict ways. According to a Pew Research Center phone survey of US adults, almost 9 in 10 Internet users said they are taking active steps online to removeMore >>
    Social media giant plans to roll out a new function that will help you manage who is seeing your posts.More >>
  • Hackers learn how to hold iPhones and iPads hostage

    Hackers learn how to hold iPhones and iPads hostage

    It is called Ransomware. Recently, some people living in Australia woke up to find their iPhones and iPads were being held hostage. Now the same attack is traveling the globe. The ransomware is goingMore >>
    Virus first hits in Australia and now our Cyber Expert says it is making its way to other countries, including ours.More >>
  • Watch out for Windows XP scams

    Watch out for Windows XP scams

    In April, Microsoft stopped supporting Windows XP and Office 2003. The products still work but Microsoft won't be creating any new patches to fix security problems. Scammers are now searching for WindowsMore >>
    As Microsoft stops supporting it's Windows XP platform, users need to know where to go to get honest help with security issues.More >>
  • 5 things your smart phone can do

    5 things your smart phone can do

    5 FUN THINGS YOUR PHONE CAN DO! 1. Create a mobile hotspot: You can turn your smartphone into a mobile hotspot that creates a Wi-Fi personal cloud! Go to your device's settings menu and createMore >>
    Most of us use our phones for calling, email, and texting but smart phones have a few hidden talents you might not realize.More >>
  • Protecting yourself from becoming a hacker's next victim

    Protecting yourself from becoming a hacker's next victim

    A report released by the Pew Research Center says the number of Americans who say they've had their accounts hacked and important personal information stolen online is on the rise. 18% of adults saidMore >>
    New research shows the number of people who have had their personal information online hacked is growing.More >>
  • Are you in the new "Most Wanted" database?

    Are you in the new "Most Wanted" database?

    According to a new report released by the Electronic Frontier Foundation, the FBI is building the facial recognition database of the future, the Next Generation Identification (NGI). However, thisMore >>
    Criminal or not, you might be, and you wouldn't even know it.More >>
  • When a privacy policy on email means no privacy

    When a privacy policy on email means no privacy

    Many of our favorite, free email programs are not private. Our cyber expert says it really is happening across all email applications and it is buried in the privacy policies. Look closely at theMore >>
    Another reason you should be reading online user agreements very closely.More >>
  • New information on battling the Heartbleed internet bug

    New information on battling the Heartbleed internet bug

    Did you change your passwords after you heard about Heartbleed? If so, you did the right thing. However, we've learned the worst isn't over and you will likely need to change them again. First, a littleMore >>
    Changing your passwords just once may not actually be enough to battle this internet bug.More >>
  • Big changes coming to internet organization

    Big changes coming to internet organization

    It is something few of us have heard about or pay attention to but if you want a web address on the internet you turn to ICANN. It stands for Internet Corporation for Assigned Names and Numbers and itMore >>
    The organization that decides on the names and addresses on the web is about to come under new management and our cyber expert says the internet community is concerned.More >>
  • Who is "Snoopy" and what does he want with your WiFi?

    Who is "Snoopy" and what does he want with your WiFi?

    Cyber Expert Theresa Payton often warns us that we should turn the WiFi on our devices to the "off" position if we're not using it. She says it is a good way to protect your privacy and security. NowMore >>
    "Good-Guy" hackers create drone that can pull personal information from your phone simply by fooling your WiFi connection.More >>
  • Yahoo to recycle unused email addresses

    Yahoo to recycle unused email addresses

    Have you set up a Yahoo id as a back up email address but haven't used it for a while? Where tonight there's a warning you need to know! Yahoo plans to recycle Yahoo user IDs that have been inactiveMore >>
    If you haven't used yours in a while it may be in jeopardy of falling in someone else's hands.More >>
  • Why you should care about two-factor authentication

    Why you should care about two-factor authentication

    Two factor authentication takes a second item, not just your ID & password to authenticate that it's really you logging into a certain website. More >>
    More sites and companies are using this extra layer of security to keep your private information safe.More >>
  • Are your private digital messages really private?

    Are your private digital messages really private?

    When you are in love with someone, you trust that person and they trust you. In this digital age, sometimes we profess our love digitally when we're apart, however, you need to be very careful, even withMore >>
    Our cyber expert says a loved one can betray your confidence or a hacker could easily access your private thoughts.More >>
  • The Internet is changing our moods, and our brains

    The Internet is changing our moods, and our brains

    Study shows increased screen time is altering our moods and we need to unplug.More >>
    Study shows increased screen time is altering our moods and we need to unplug.More >>
  • When "delete" doesn't really mean it's gone

    When "delete" doesn't really mean it's gone

    Our cyber expert tells us how to do a better job at cleaning up our social media profiles and warns us about the deep searches some websites can do.More >>
    Our cyber expert tells us how to do a better job at cleaning up our social media profiles and warns us about the deep searches some websites can do.More >>
  • Apps that help you catch a cell phone thief

    Apps that help you catch a cell phone thief

    If someone tries to unlock your smart phone some new apps will take their photo and even give you their location.More >>
    If someone tries to unlock your smart phone some new apps will take their photo and even give you their location.More >>
  • Poisoned links in your searches

    Poisoned links in your searches

    CHARLOTTE, NC (WBTV) - Most of us will hit up our favorite online search engines several times a day, if not more, looking for all types of information. Scammers know that and they've figured out howMore >>
    As hard as search engine companies try to stop them, hackers and scammers still find ways to infiltrate search results.More >>
  • Facebook search feature should be a "wakeup call"

    Facebook search feature should be a "wakeup call"

    Our cyber expert says it is important to check every privacy setting on every post before search feature goes live.More >>
    Our cyber expert says it is important to check every privacy setting on every post before search feature goes live.More >>
  • Taking control of your own personal brand

    Taking control of your own personal brand

    It is important to investigate your own online life the way a private investigator might.More >>
    It is important to investigate your own online life the way a private investigator might.More >>
  • Cyber security on a tight budget

    Cyber security on a tight budget

    Tools for your home or your small business that can protect you in a way you thought you couldn't afford.More >>
    Tools for your home or your small business that can protect you in a way you thought you couldn't afford.More >>
  • Who is using your Bluetooth when you are not?

    Who is using your Bluetooth when you are not?

    CHARLOTTE, NC (WBTV) - The roadway sensors used to help guide traffic reports reads data emitted by cars. But the Department of Homeland Security has issued a warning about this practice. It's spookyMore >>
    There's a new warning that the technology that is supposed to help you know how to avoid a traffic jam could put your driving patterns at risk.More >>
  • Warning about Facebook photo synch option

    Warning about Facebook photo synch option

    We have shared with you warnings about reading and thinking before you click on "ok" when you are asked to enable a feature.
    More >>
    A helpful way to back up your photos carries a risk to your privacy.More >>
  • Transferring your old files to your new device

    Transferring your old files to your new device

    CHARLOTTE, NC (WBTV) - A popular gift for the holidays will be a new tablet, laptop, desktop or smart phone. It may be faster, lighter, and have more features, but maybe there is a year's worth of informationMore >>
    Our cyber expert offers advice in navigating the challenge of transferring files from an outdated smart phone, laptop or tablet to a new one.More >>
  • Project Cyber Monday shuts down illegal websites

    Project Cyber Monday shuts down illegal websites

    CHARLOTTE, NC (WBTV) - Cyber Monday is one of the most popular shopping days of the year for consumers, retailers and cybercriminals. This year ICE and Global law enforcement conducted Project CyberMore >>
    Highlights how deep the problem is and how scammers are trying to get your personal information or sell you phony goods.More >>
  • How to avoid buying counterfeit electronics

    How to avoid buying counterfeit electronics

    You may not know this, but fake technology products in use at your home, at work, and by US military and government offices are at an all time high. According to a newly releasedMore >>
    Counterfeit electronics are more common than you think.  It's important to be able to spot the red flags.More >>
  • Vulnerabilities in the 4G network

    Vulnerabilities in the 4G network

    CHARLOTTE, NC (WBTV) - Those of you working on the 4G network swear by it and get frustrated when it cannot be accessed. It might upset you to learn that 4G networks are vulnerable and just a few on-purposeMore >>
    Good-guy hackers take down the network to show how easy it would be to accomplish.More >>
  • Password overload

    Password overload

    Are you overwhelmed by all of your passwords? Do you secretly just default it to something you can remember and just hope that cybercreeps don't find you?
    More >>
    Are you overwhelmed by all of your passwords? Do you secretly just default it to something you can remember and just hope that cybercreeps don't find you?
    More >>
  • App searches Facebook photos for scantily clad friends

    App searches Facebook photos for scantily clad friends

    There are more than 2.5 billion photos uploaded to Facebook each month. So many photos, so little time. Now one company has found a way to sift through all of those photos and filterMore >>
    When users can get it to work, app searches your friend list for the photos in which people are exposing the most skin.More >>
  • How private are your personal emails?

    How private are your personal emails?

    CHARLOTTE, NC (WBTV) - It was a big story during the last election cycle. A young man hacked into Governor Sarah Palin's account and posted her emails. He was convicted of a misdemeanor charge. NowMore >>
    South Carolina court case puts inbox privacy in question.More >>
  • Keep a look-out for a new email scam

    A scam email you need to watch out for

    CHARLOTTE, NC (WBTV) - We're entering one of the busiest times of year for sending and receiving packages. We've told you before that criminals go where the action is and we're on your side watching forMore >>
    Cyber creeps are cashing in on this being the busiest time of the year for shipping packages.More >>
  • Watch our special report: Smart phones - Deleting your digital footprint

    Watch our special report: Smart phones - Deleting your digital footprint

    Watch our special report "Smart phones - Deleting your digital footprint", Thursday on News Leader 9 at 11.  More >>
    Watch our special report "Smart phones - Deleting your digital footprint", Thursday on News Leader 9 at 11.More >>
  • Seven tips for families dealing with cyber bullying

    Seven tips for families dealing with cyber bullying

    CHARLOTTE, NC (WBTV) - Chances are your child will be bullied in some way in the digital world. It could be an inappropriate photo, a mean text, or a secret exposed that embarrasses them. ResearchMore >>
    Studies show many teens will be bullied, or be the bully.More >>
  • Your smart phone or tablet can double as a security guard

    Your smart phone or tablet can double as a security guard

    CHARLOTTE, NC (WBTV) - In the event of a real emergency, nothing should replace calling 911 first. However sometimes events don't require 911 or you need a different level of assistance. Now, if yourMore >>
    Smart phone and tablet apps help get you in contact with the right people in an emergency.More >>
  • How kids are hiding their text messages from you

    How kids are hiding their text messages from you

    CHARLOTTE, NC (WBTV) - We have talked to you before about setting ground rules for the teens in your life that have cell phones. Rules such as "Digital is Forever", "Don't talk to strangers", and "WouldMore >>
    Our Cyber Expert says they're called decoy apps and kids know how to use them.More >>
  • Don't suffer a digital death

    Don't suffer a digital death

    CHARLOTTE, NC (WBTV) - It's everyone's worst night nightmare - eveyrthing digital in your life gets wiped out. Your phone, your computer, your tablet, every email address, social network profile.More >>
    We're on your side with the signs you need to look for before your high tech life becomes DOA.More >>
  • People finding porn on Pinterest

    People finding porn on Pinterest

    CHARLOTTE, NC (WBTV) - Pinterest gets 4 million unique visits each day. Unfortunately, with that traffic and popularity comes undesirable effects like the porn pushers. One viewer was so concerned atMore >>
    The problem isn't necessarily the pictures, but the viruses hiding behind them.More >>
  • Phone scam targets older parents

    Phone scam targets older parents

    CHARLOTTE, NC W(BTV) - It's a scenario no parent wants to consider. Your child calls and they are out of the country and going to jail. They are upset. You are upset. It's hard to get all the detailsMore >>
    Local woman's father loses $3,000 after a phone call indicates his daughter is in jail.More >>
  • "Good guys" at Google battle online "bad guys"

    "Good guys" at Google battle online "bad guys"

    CHARLOTTE, NC (WBTV) - We have warned you before the criminals love the web and they try to trick you into telling data about yourself so they can take advantage of you. Now the tables are turning onMore >>
    Google considering how to work with law enforcement to nab criminals using the internet.More >>
  • Facebook considering job search feature

    Facebook considering job search feature

    CHARLOTTE, NC (WBTV) - Many people like to keep their personal and professional lives as separate as they can. It gets harder every day online to make that distinction. Early reports indicate thatMore >>
    Cyber expert suggests you don't wait to clean up your profile in case it can be linked to jobs in which you're interested.More >>
  • Teens skirting the rules online

    Teens skirting the rules online

    CHARLOTTE, NC (WBTV)- In a new study released from virus company McAfee, 70% of teens hide their online behavior very well from their parents. With that, 73.5% of parents say they trust that theirMore >>
    New study shows teens are able to find a way around all of the protections parents put into place to keep them from viewing things they shouldn't online.More >>
  • Facebook facial recognition capabilities improving

    Facebook facial recognition capabilities improving

    CHARLOTTE, NC (WBTV) - Facebook recently announced that they are buying Face.com. Facebook already uses their technology but now they can take facial recognition to a whole new level. Facebook has oneMore >>
    Social media giant makes purchase that will make it easier for people to be identified in photos.More >>
  • ALERT: Virus could knock you off internet on Monday

    ALERT: Virus could knock you off internet on Monday

    CHARLOTTE, NC (WBTV) - March 8, 2012 was going to be a potentially crazy day on the Internet where unsuspecting computers connected to world wide malware would stop talking to the Internet. That dateMore >>
    You can take a few easy steps to ensure you'll still have internet access after July.More >>
  • High tech online maps coming but at what cost to privacy?

    High tech online maps coming but at what cost to privacy?

    CHARLOTTE, NC (WBTV) - We have talked to you before about the stunning accuracy and digital quality of Google Street View. Some countries are so concerned about this data in the wrong hands, they haveMore >>
    Big names in online mapping programs are set to use cameras mounted on planes to take high-definition images.More >>
  • Cybercreeps hiding inside travel confirmations

    Cybercreeps hiding inside travel confirmations

    CHARLOTTE, NC (WBTV) - Another reason to think before you click a link is surfacing. Cyber criminals realize that more and more of you are booking all your travel online which means you are receivingMore >>
    It's a busy time of year for travel and we know that the criminals go where the action is.More >>
  • How to safely be a digital detective

    How to safely be a digital detective

    CHARLOTTE, NC (WBTV) - It's hard to believe that some thieves aren't bright enough to know not to log into Facebook inside the homes they rob. However, some aren't. It is an example of how crime doesn'tMore >>
    New technology is helping police solve crimes and you can think like an investigator if you do it safely.More >>
  • Facebook changes privacy rules, again

    Facebook changes privacy rules, again

    CHARLOTTE, NC (WBTV) - Facebook has once again updated it's privacy policy. The Irish Privacy board did a review. WBTV's cyber expert, Theresa Payton, says she's looked at the changes and she thinksMore >>
    Our cyber expert says the take-away here is that your information really isn't yours.More >>
  • Making sense of data in "the cloud"

    Making sense of data in "the cloud"

    CHARLOTTE, NC (WBTV) - It seems as if we have a scrapbook of our lives trapped on our phones, tablets and computers. Messages from loved ones, important projects, pictures, and videos. Those momentsMore >>
    Cyber expert breaks down safe places to store your data and what you need to think about before you sign up for a service.More >>
  • Security flaw in Skype

    Security flaw in Skype

    CHARLOTTE, NC (WBTV) - We just learned that Skype has known about a security bug that shows your IP address, which can let someone track you and your account down to the city level. One group claimsMore >>
    Researchers find security flaw in online chat/phone/video service.More >>
  • Fighting spam on Facebook

    Fighting spam on Facebook

    CHARLOTTE, NC (WBTV) - The fight against spam might get a little easier. Facebook recently announced it is ramping up its efforts to stop spammers by creating the "Antivirus Marketplace". The serviceMore >>
    Social media giant partners with internet security companies to protect it's users.More >>
  • Online dating goes mobile

    Online dating goes mobile

    CHARLOTTE, NC (WBTV) - Website match.com claims that 1 in 5 relationships start online. We all have busy lives so for those of you that are single, it's harder and harder to meet people to date. WeMore >>
    New apps utilize the location services on your cell phone to help you meet your mate.More >>
  • Free app allows you to name your enemies

    Free app allows you to name your enemies

    Creators of the app say it allows people to bond together based on things they dislike.More >>
  • What really happens when your phone is lost?

    What really happens when your phone is lost?

    Study shows what good Samaritans really do before they turn in your phone.More >>
  • The truth behind electronics on flights

    The truth behind electronics on flights

    Study shows there's good reason to turn them off on takeoff and landing but the rules could change one day.More >>
  • Cell phone jamming technology

    Cell phone jamming technology

    It sounds like it would be a good way to stop those loud cell phone talkers in public places but our Cyber Expert gives us two big reasons it's a bad move.More >>
  • Investigators question what Google knew, and when

    Investigators question what Google knew, and when

    Judge asks search engine to prove when it knew some ads on it's website shouldn't have been there.More >>
  • Who is snooping into your address book?

    Who is snooping into your address book?

    11% of the top apps have access to your contacts and you might not know they're looking.More >>
  • Facebook diet scam

    Facebook diet scam

    A Facebook message from a friend indicates she's found a diet that works.  Our Cyber Expert explains why you might want to wait before you click to learn more about it.More >>
  • What you need to know about new Google privacy rules

    What you need to know about new Google privacy rules

    8 ways to be sure your private information is protected.More >>
  • Do two things before the Facebook Timeline switch

    Do two things before the Facebook Timeline switch

    We have no choice, Facebook is switching us to Timeline.  Our cyber expert says there are two things to remember when your profile makes the change.More >>
  • What not to do if you're hacked

    What not to do if you're hacked

    Ashton Kutcher's Foursquare and Twitter accounts hacked.  Learn what not to do if this happens to you.More >>
  • What are SOPA and PIPA, anyway?

    What are SOPA and PIPA, anyway?

    Two bills aimed at controlling internet content have critics saying the proposals go too far.More >>
  • Beware the "typosquatters"

    Beware the "typosquatters"

    There are ways to outsmart people counting on your mistakes to steal your personal information.More >>
  • A clean-sweep of social media permissions

    A clean-sweep of social media permissions

    Linking social media accounts might be convenient for you but it also makes snooping into your private life more convenient for others.More >>
  • Safer cell phone use is possible behind the wheel

    Safer cell phone use is possible behind the wheel

    With a proposal floated by the NTSB to ban all cell phone use in cars across the country, our cyber expert weighs in.More >>
  • Warning about the "Ugly Meter" app

    Warning about the "Ugly Meter" app

    Smart phone application allows you to upload a photo and determine how unattractive the software program thinks the person's face is.More >>
  • Protecting Your Cyberturf: Everlasting Tweets

    Protecting Your Cyberturf: Everlasting Tweets

    National Archives and Library of Congress strike a deal with the social networking site to keep a log of your "tweets" forever.More >>
  • Facebook glitch reveals private photos

    Facebook glitch reveals private photos

    The photos of everyone on Facebook, including the founder, are exposed briefly due to a glitch in the system. More >>
  • Don't let the Grinch into your holiday shopping

    Don't let the Grinch into your holiday shopping

    We've told you that cyber scammers go where the action is.  At this time of year the action is centered in the holidays.More >>
  • What is Carrier IQ and is it spying on you?

    What is Carrier IQ and is it spying on you?

    Consumer watchdog group is asking the US Attorney General and the FCC to look into the software company and carriers.More >>
  • Phone apps which help you fool your friends

    Phone apps which help you fool your friends

    WBTV's cyber expert warns there could be a more sinister side to these fun phone applications.More >>
  • Not so secure security systems

    Not so secure security systems

    WBTV's Cyber Expert warns of a vulnerability in the program that keeps prisoners locked up.More >>
  • Protecting Your Cyberturf: iPhone and iPad app warning

    Protecting Your Cyberturf: iPhone and iPad app warning

    Researcher finds a way around the Apple app approval process.More >>
  • Protecting Your Cyberturf: Facebook game worries parents

    Protecting Your Cyberturf: Facebook game worries parents

    It may not be the focus of the game, but parents worry their kids could trip upon a seedy side of a popular online past-time.More >>
  • Ten tips in ten days to keep you cyber-safe

    Ten tips in ten days to keep you cyber-safe

    Cyber creeps, criminals and predators are getting smarter every day.  These tips will help you lock down your online life and make it harder for them to get to you.More >>
  • The true cost of mistaken identity online

    The true cost of mistaken identity online

    One woman believed it was her sister she was talking to on Facebook.  It wasn't, though, and it left her out thousands of dollars.More >>
  • New facial recognition software could be spotting you

    New facial recognition software could be spotting you

    Fascinating technology that might help you identify people in pictures on Facebook is also being used by some law enforcement to identify criminals.  We look into what happens if the technology falls into the wrong hands.More >>
  • When Facebook changes its look, your privacy changes

    When Facebook changes its look, your privacy changes

    Time to double-check your privacy settings as Facebook rolls out a completely new look and feel to the way it operates.More >>
  • Is Google Wallet for you?

    Is Google Wallet for you?

    New application allows certain smart phone users to pay using only their phones.  Are you the right person to be using it?More >>
  • QR codes are fun to scan but be warned

    QR codes are fun to scan but be warned

    Quick response codes can give you additional information about a product or service but the hackers are targeting them.More >>
  • What would you do for $5?

    What would you do for $5?

    New website offers an inexpensive way to get products or services but there's a hidden service being offered that could impact how you spend your free time.More >>
  • Getting your news from social media

    Getting your news from social media

    Twitter and Facebook allow us to get information quickly but there's one thing to remember if that's your go-to source.More >>
  • New Facebook privacy settings

    New Facebook privacy settings

    The social networking site has listened to users and is keeping up with the competition by offering new built-in privacy features.More >>
  • Will Facebook go offline on November 5th?

    Will Facebook go offline on November 5th?

    Activist hackers claim they'll take the social networking site down to send a message about privacy.More >>
  • Overdue bill...or is it?

    Overdue bill...or is it?

    You get busy on vacation or with your life and you forget to pay that credit card bill on time.   We have lots of handy reminders from the credit card companies to keep us from becoming too delinquent.  But what if the late notice is not the real deal?  How would you know? More >>
  • Using texting and social media in an emergency

    Using texting and social media in an emergency

    After your children call 911, if it's safe, teach them to keep you updated via Twitter and Facebook.More >>
  • What's the buzz about Google + ?

    What's the buzz about Google + ?

    Could this new invitation-only social networking site be a real rival to Facebook?More >>
  • Can your smart phone be hacked?

    Can your smart phone be hacked?

    With the recent News of The World tabloid scandal in Britain many people in this country are wondering how easy it might be for someone to hack into their cell phones.More >>
  • Five steps for Facebook email

    Five steps for Facebook email

    New email feature can help you stay in touch more easily but there are five easy steps to take to protect yourself from spammers.More >>
  • Putting a stop to internet rumors

    Putting a stop to internet rumors

    WBTV's Cyber Expert offers three easy ways for you to stay out of the online rumor chain.More >>
  • Is Google's new social site safer than Facebook?

    Is Google's new social site safer than Facebook?

    Facebook users upset over privacy concerns now have a new option... Google+ (Plus).More >>
  • A new office visit tool for doctors

    A new office visit tool for doctors

    More physicians are carrying tablet computers with them into office visits so they can access your records instantly.  Our Cyber Expert tells you how to protect your privacy.More >>
  • How many people did you invite?

    How many people did you invite?

    When using Facebook or an online invitation service it's surprisingly easy to accidentally invite more guests than you intend.More >>
  • Why NOT to share everything with your social network

    Why NOT to share everything with your social network

    Son of an international security expert is kidnapped and authorities think it's something most of us do every day that made him easy to track.More >>
  • Not so secret security questions

    Not so secret security questions

    Security questions can help companies to know it's really you they're dealing with online but there's something you need to know about how you answer those questions.More >>
  • A warning about making payments online

    A warning about making payments online

    Easy ways to make sure the purchases you make online don't result in your personal information going up for grabs to criminals.More >>
  • Protecting your photos online

    Protecting your photos online

    Did you know there's a way to copyright or watermark the pictures you post to protect them against prying eyes?More >>
  • Who is holding your personal information hostage?

    Who is holding your personal information hostage?

    It's a new trick hackers are using to make money off of your personal information.More >>
  • Watch out for strangers on your wireless network

    Watch out for strangers on your wireless network

    Criminals are hopping onto random available wireless networks to hide their tracks while doing dirty business.More >>
  • Wiping the cell phone slate clean

    Wiping the cell phone slate clean

    When we give up our old smart phone for a newer model we have to be sure all of our personal information is removed.  It's not as easy as simply deleting your information.More >>
  • XXX coming to an internet screen near you

    XXX coming to an internet screen near you

    New domain name would segregate pornography online but some say that might not be a good idea.More >>
  • Hackers creeping into digital music files

    Hackers creeping into digital music files

    If you burn music downloaded from a music sharing site you don't recognize, there's a chance hackers have inserted a virus in that file that could infect your computer or your car.More >>
  • Booking your family vacation online

    Booking your family vacation online

    If you're getting ready to search the web for a deal, our cyber expert helps you avoid scammers pitfalls that could turn your vacation into a nightmare.More >>
  • Woman discovers someone is using her face on Facebook

    Woman discovers someone is using her face on Facebook

    A young woman learns that someone else has set up nearly a dozen profiles on various social networking sites using her picture and an assumed name.More >>
  • Beware the email from the photocopier

    Beware the email from the photocopier

    New technology in photocopiers allows you to print to email instead of paper but it's also a target for hackers.More >>
  • Buying vitamins and supplements online

    Buying vitamins and supplements online

    You might be able to get a whale of a deal but at what price?More >>
  • My search turned up what?

    My search turned up what?

    Your simple search turns up exactly what you didn't want, but there is something you can do about it.More >>
  • What if the internet goes down?

    What if the internet goes down?

    When the internet was taken down recently in Egypt you may have wondered if that could happen here.  Our cyber expert explains why you need a backup plan.More >>
  • Protecting your privacy online

    Protecting your privacy online

    Now advertisers may be following you into social networking sites to learn about you and your friends.More >>
  • Two new websites for parents to watch

    Two new websites for parents to watch

    Video and text chat sites look kid-friendly but if your child wanders into the wrong chat room, you might not like what they could see.More >>
  • Watch what you say and text

    Watch what you say and text

    Good-guy hackers found a way to break into cell phone conversations and texts with only $56 worth of equipment.More >>
  • The new hiding spot for spam

    The new hiding spot for spam

    Cyber creeps are using our need to communicate in short bursts to hide spam that could ruin our computers.More >>
Theresa Payton was the first woman to hold the position of CIO at the White House. Each week, she gives tips on how to protect your personal and work computers from intrusion.
Check out her bio

Theresa Payton is also on Twitter and Facebook!
Here are her accounts: Twitter.com/FortaliceLLC
Facbook Account

Powered by Frankly