Top Stories That Matter to You
Visit Prilock

OPM - Another Data Breach, Why Is This One a Big Deal?

“Government workers, government contractors, even vendors to companies - that supply companies - that supply the government - are targets. And credit and identity monitoring won’t do a thing to stop it.” More

Five Signs an Employee Plans to Leave With Your Company’s Data

“In May 2015, the US Bureau of Labor Statistics reported 4.7 million total employee separations, 2.7 million of which were “quits,” or voluntary separations initiated by the employee. But lately, it’s become easier for those employees to leave the company with more than just their 401K plan and a box of pens." More

Is Windows 10 Really a Privacy Nightmare?

“In the nearly three weeks following Windows 10’s release, there have been numerous reports about how much personal information Microsoft collects, and the hurdles to stopping it.” More

9 Baby Monitors Wide Open to Hacks

“The security of Internet-connected baby monitors got a failing grade from researchers who found critical vulnerabilities in all nine of the models they reviewed.” More

Apple vs. Android: Mobile Security Pros and Cons

“Whether using Apple or Android, experts said much of the security of any device revolves around user behavior. Unfortunately, studies show few users make use of available protections for the devices.” More

Prilock’s Tip of the Month

Are you afraid someone has stolen your identity? Place a fraud alert with the 3 major credit bureaus immediately. A fraud alert is free and it will make it harder for someone to open new accounts in your name. For more tips on Identity Theft Recovery, click here.

Free Software

Avast! Antivirus Software

Avast! is a complete virus scanner for home, mobile or business. It guards data access as well as analyzing your mail traffic for potential dangers. Find out more.

Things to Think About

  • Be sure to use VPN (Virtual Private Network) software that encrypts your WiFi communications to keep your information safe when on public WiFi.
  • Travelling with your computer? Store your computers and tablets in the trunk of your car for maximum safety. Place them there before you arrive at your destination so thieves don't see you put them there.

 Breaking News

  • The Internal Revenue Service (IRS) disclosed that identity thieves abused a feature on the agency’s website to pull sensitive data on more than 330,000 potential victims as part of a scheme to file fraudulent tax refund requests. Visit their official announcement for more information.
  • The U.S. Office of Personnel Management (OPM) and the U.S. Department of Defense (DoD) announced the contract to ID Experts for identity theft protection services for 21.5 million individuals whose personal information was stolen. Visit their official announcement for more information.

Cool Stuff

Impossible Instant Lab Universal

Transform digital images on your smartphone or tablet into classic instant photos. For use with the latest version of the free Impossible Project App, available now for iOS and Android.

Must-Have App


The free Plex Media Server simplifies your life by providing a functional way of watching all the movies and TV you have stored on your hard drives across different devices. Available in the Apple store for download.

This Month’s Top Phishing Attack Emails to Look Out for


The content of the messages is standard: the lottery was held by the official organization, the recipient’s address was randomly selected out of millions of email addresses, to receive the win it is necessary to respond to the email and provide the specified personal information. Emails with attached files are especially dangerous because a user is likely to open the attachment to learn about the content, which can result in malware infection.


These emails are designed to trick recipients into installing malware. The attachment contains a malicious .exe file hidden inside a .zip file. The subject line, the name of the clerk, the city where the hearing will supposedly be held, and other details may vary in different incarnations of the scam emails. If you receive one of these emails, do not open any attachments or click any links that it may contain.

Read more

Prilock Security Newsletter September 2015
Copyright © 2015 Prilock All rights reserved.
unsubscribe from this list    update subscription preferences