Binary Protectors Blog

Peace Of Mind Isn’t Priceless.

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Recent blog posts

Posted by on in Binary Protectors News
What is Secure WIFI?  Really?

So, you hear on the news not to make any transactions or purchase -anything- from a "public" network.  Time and time again you hear it and read it in every paper and see it on every news channel.  Now, we all know what public means.  Don't buy stuff at Starbucks or Pannera, or the mall WIFI.  Right?  

Well, of course!  But what happens when you go home?   -READ-

All the Internet Providers expanded their networks by offering "FREE" WIFI to their customers.  What this means is OTHER PEOPLE are connected to the "BOX" or WIFI device you are using or the box they give you.  So you get smart and buy your own.  One the "smart" guy at Best Buy tells you.  One, with many antennas and looks like its from space.

Guess what?  YOU ARE STILL NOT ON A "PRIVATE WIFI".  Just because its got your own Station ID, or SSID the name of the network your device connects to.  How do you know if there is anyone watching?  How would you know if there is a guy a mile down the street watching every transaction you make because he hacked your WIFI?  How do you know if someone in Russia or China is doing the same because unannounced to you, you have created open ports to your cameras, or your RING Doorbell?  How about your Refrigerator, or pool heater?  Every open port opens your network up so anyone can get inside.  Its truly easy these days.

There is ONLY ONE WAY to protect your WIFI.  There is ONLY one way to protect your network.  A FIREWALL.  One that works with the WIFI or AP (Access Point) or device where your WIFI connects to.  You will hear story after story about people loosing their Identities, Credit Card numbers and much more.  How did they get my Credit Card number?  Well, if you have read this you would know now.

I will repeat this over and over again.......

Peace Of Mind Isn’t Priceless.

Call Binary Protectors.  We have a VERY economical way for you to protect your business and your home.  Have peace of mind.  Sleep at night.  Why worry about this when in these times there are so many more things to worry about.

Thank you,
Alex Athineos

Hits: 3027
Cyber Crime Specifics.  Very Important STATS.

Everyone should take notice of these new FBI findings of Cyber Crime Stats.  As you can see Business Email Compromise is top, however Identity Theft is still way too high.  Binary Protectors has a PRE-EMPTIVE approach to Identity Protection.  We prevent it from happening in the first place so long as you are connected with one of our installed AP's (Access Points) and Firewalls.


Peace Of Mind Isn’t Priceless.

Thank you,
Alex Athineos

Hits: 3020
Millions of Routers STOP WORKING HACK!

Mirai Botnet is getting stronger!  It knocks out WIFI home and main infrastructure routers!  

When there are open ports this botnet knocks out the routers ability to communicate.  This has happened all over Germany where over 900,000 routers stopped working! 

This is happening more and more.  Until people start protecting their main communications to the Internet they will get HACKED.  There is only one way to protect yourself.  Secured WIFI and Firewall.  Period.

You need to protect yourself.  Protect your critical information and be able to sleep at night knowing that nobody is sneaking into your home or office!

Peace Of Mind Isn’t Priceless.

Thank you,
Alex Athineos

Hits: 2819
San Francisco Subway System HACKED!

According To Fox News, San Francisco Subway System gets HACKED!

All the payments systems went down.  Railway techs are trying to get them back up.

For more [CLICK HERE].

Thank you,

Alex Athineos

Hits: 3149
Steal a Tesla Car with a Malware HACK!

Two months ago a Chinese Cyber Security researcher from Keen Lab was able to hack into a Tesla Model S, which allowed them to control the Model S in Driving Mode and Parking from 12 miles away!  YES!  Its possible!

Protect your network!

Peace Of Mind Isn’t Priceless.


Thank you,
Alex Athineos

Hits: 2662
Malware Shuts Down Operations at Hospitals HACK!

Hospitals and medical business are being targeted because the information gained from the HACK is worth a lot of money on the "Black Market".

Cyber Attacks on hospitals are growing at a significant margin in 2016.  This will continue to grow because these medical centers just dont understand the importance of a professional installation of the best Firewall on the market and the best WIFI inter-office communications on the market.

The incident forced the trust to shut down all the major systems within its shared IT network in order to "isolate and destroy" the virus and cancel surgeries.

Some patients, including major trauma patients and high-risk women in labor, were diverted to close hospitals.

This incident took place after the U.S. and Canada issued a joint cyber alert, warning hospitals and other medical organizations on a surge that infects computers with Ransomware.



Peace Of Mind Isn’t Priceless.


Thank you,
Alex Athineos

Hits: 2634
Natural Motion Gaming HACK or Technical Problem.

Today, while playing the game CSR2 an Android Drag Racing Game users experienced problems with the images and icons of the users.  They were all in a red question mark.  After a few hours the game asked you to restore your last save on the game.  Then the game didnt load.

Most likely to be a HACK.

Peace Of Mind Isn’t Priceless.

Thank you,

Tagged in: CSR2 HACK
Hits: 3190
130,000 Naval Officers GET HACKED!

You hear this more and more.  Every day another big hacking event.  This will continue to grow!  


Protect your family!  Protect your business!  Protect your Identity!  


To Read More [CLICK HERE].


CALL US.  We are experts in Internet/Cyber Security Protection.


Peace Of Mind Isn’t Priceless.


Thank you,
Alex Athineos



Hits: 2610

Posted by on in Binary Protectors News
Oracle buys DYN For $600 Million!

Remember the DDOS Attack about a month ago?  DYN was the company the "Hackers" went after.  DYNDNS.ORG to be specific is the web site that users can go and get a "Dynamic DNS" address for their networks.

This company was purchased by Oracle for $600 Million.

Thank you,
Alex Athineos

Hits: 2406
Cloud Computing and Networking Vulnerabilities.  Important Read on

We wanted to put this together for everyone to understand that "Cloud Computing & Networking" has serious Vulnerabilities.  There is only one magic bullet.  Have your own protection.

The following is credited from Infoworld.Com credited to ThinkStock.

Enterprises are no longer sitting on their hands, wondering if they should risk migrating applications and data to the cloud. They're doing it -- but security remains a serious concern.

The first step in minimizing risk in the cloud is to identify the top security threats.

As the RSA Conference last week, the CSA (Cloud Security Alliance) listed the “Treacherous 12,” the top 12 cloud computing threats organizations face in 2016. The CSA released the report to help both cloud customers and providers focus their defensive efforts.

The shared, on-demand nature of cloud computing introduces the possibility of new security breaches that can erase any gains made by the switch to cloud technology, the CSA warned. As noted in previous CSA reports, cloud services by nature enable users to bypass organization-wide security policies and set up their own accounts in the service of shadow IT projects. New controls must be put in place.

“The 2016 Top Threats release mirrors the shifting ramification of poor cloud computing decisions up through the managerial ranks,” said J.R. Santos, executive vice president of research for the CSA.


Threat No. 1: Data breaches

Cloud environments face many of the same threats as traditional corporate networks, but due to the vast amount of data stored on cloud servers, providers become an attractive target. The severity of potential damage tends to depend on the sensitivity of the data exposed. Exposed personal financial information tends to get the headlines, but breaches involving health information, trade secrets, and intellectual property can be more devastating.

When a data breach occurs, companies may incur fines, or they may face lawsuits or criminal charges. Breach investigations and customer notifications can rack up significant costs. Indirect effects, such as brand damage and loss of business, can impact organizations for years.

Cloud providers typically deploy security controls to protect their environments, but ultimately, organizations are responsible for protecting their own data in the cloud. The CSA has recommended organizations use multifactor authentication and encryption to protect against data breaches.


Threat No. 2: Compromised credentials and broken authentication

Data breaches and other attacks frequently result from lax authentication, weak passwords, and poor key or certificate management. Organizations often struggle with identity management as they try to allocate permissions appropriate to the user’s job role. More important, they sometimes forget to remove user access when a job function changes or a user leaves the organization.

Multifactor authentication systems such as one-time passwords, phone-based authentication, and smartcards protect cloud services because they make it harder for attackers to log in with stolen passwords. The Anthem breach, which exposed more than 80 million customer records, was the result of stolen user credentials. Anthem had failed to deploy multifactor authentication, so once the attackers obtained the credentials, it was game over.

Many developers make the mistake of embedding credentials and cryptographic keys in source code and leaving them in public-facing repositories such as GitHub. Keys need to be appropriately protected, and a well-secured public key infrastructure is necessary, the CSA said. They also need to be rotated periodically to make it harder for attackers to use keys they’ve obtained without authorization.

Organizations planning to federate identity with a cloud provider need to understand the security measures the provider uses to protect the identity platform. Centralizing identity into a single repository has its risks. Organizations need to weigh the trade-off of the convenience of centralizing identity against the risk of having that repository become an extremely high-value target for attackers.


Threat No. 3: Hacked interfaces and APIs

Practically every cloud service and application now offers APIs. IT teams use interfaces and APIs to manage and interact with cloud services, including those that offer cloud provisioning, management, orchestration, and monitoring.

The security and availability of cloud services -- from authentication and access control to encryption and activity monitoring -- depend on the security of the API. Risk increases with third parties that rely on APIs and build on these interfaces, as organizations may need to expose more services and credentials, the CSA warned. Weak interfaces and APIs expose organizations to security issues related to confidentiality, integrity, availability, and accountability.

APIs and interfaces tend to be the most exposed part of a system because they're usually accessible from the open Internet. The CSA recommends adequate controls as the “first line of defense and detection.” Threat modeling applications and systems, including data flows and architecture/design, become important parts of the development lifecycle. The CSA also recommends security-focused code reviews and rigorous penetration testing.


Threat No. 4: Exploited system vulnerabilities

System vulnerabilities, or exploitable bugs in programs, are not new, but they've become a bigger problem with the advent of multitenancy in cloud computing. Organizations share memory, databases, and other resources in close proximity to one another, creating new attack surfaces.

Fortunately, attacks on system vulnerabilities can be mitigated with “basic IT processes,” says the CSA. Best practices include regular vulnerability scanning, prompt patch management, and quick follow-up on reported system threats.

According to the CSA, the costs of mitigating system vulnerabilities “are relatively small compared to other IT expenditures.” The expense of putting IT processes in place to discover and repair vulnerabilities is small compared to the potential damage. Regulated industries need to patch as quickly as possible, preferably as part of an automated and recurring process, recommends the CSA. Change control processes that address emergency patching ensure that remediation activities are properly documented and reviewed by technical teams.


Threat No. 5: Account hijacking

Phishing, fraud, and software exploits are still successful, and cloud services add a new dimension to the threat because attackers can eavesdrop on activities, manipulate transactions, and modify data. Attackers may also be able to use the cloud application to launch other attacks.

Common defense-in-depth protection strategies can contain the damage incurred by a breach. Organizations should prohibit the sharing of account credentials between users and services, as well as enable multifactor authentication schemes where available. Accounts, even service accounts, should be monitored so that every transaction can be traced to a human owner. The key is to protect account credentials from being stolen, the CSA says.


Threat No. 6: Malicious insiders

The insider threat has many faces: a current or former employee, a system administrator, a contractor, or a business partner. The malicious agenda ranges from data theft to revenge. In a cloud scenario, a hellbent insider can destroy whole infrastructures or manipulate data. Systems that depend solely on the cloud service provider for security, such as encryption, are at greatest risk.

The CSA recommends that organizations control the encryption process and keys, segregating duties and minimizing access given to users. Effective logging, monitoring, and auditing administrator activities are also critical.

As the CSA notes, it's easy to misconstrue a bungling attempt to perform a routine job as "malicious" insider activity. An example would be an administrator who accidentally copies a sensitive customer database to a publicly accessible server. Proper training and management to prevent such mistakes becomes more critical in the cloud, due to greater potential exposure.


Threat No. 7: The APT parasite

The CSA aptly calls advanced persistent threats (APTs) “parasitical” forms of attack. APTs infiltrate systems to establish a foothold, then stealthily exfiltrate data and intellectual property over an extended period of time.

APTs typically move laterally through the network and blend in with normal traffic, so they're difficult to detect. The major cloud providers apply advanced techniques to prevent APTs from infiltrating their infrastructure, but customers need to be as diligent in detecting APT compromises in cloud accounts as they would in on-premises systems.

Common points of entry include spear phishing, direct attacks, USB drives preloaded with malware, and compromised third-party networks. In particular, the CSA recommends training users to recognize phishing techniques.

Regularly reinforced awareness programs keep users alert and less likely to be tricked into letting an APT into the network -- and IT departments need to stay informed of the latest advanced attacks. Advanced security controls, process management, incident response plans, and IT staff training all lead to increased security budgets. Organizations should weigh these costs against the potential economic damage inflicted by successful APT attacks.


Threat No. 8: Permanent data loss

As the cloud has matured, reports of permanent data loss due to provider error have become extremely rare. But malicious hackers have been known to permanently delete cloud data to harm businesses, and cloud data centers are as vulnerable to natural disasters as any facility.

Cloud providers recommend distributing data and applications across multiple zones for added protection. Adequate data backup measures are essential, as well as adhering to best practices in business continuity and disaster recovery. Daily data backup and off-site storage remain important with cloud environments.

The burden of preventing data loss is not all on the cloud service provider. If a customer encrypts data before uploading it to the cloud, then that customer must be careful to protect the encryption key. Once the key is lost, so is the data.

Compliance policies often stipulate how long organizations must retain audit records and other documents. Losing such data may have serious regulatory consequences. The new EU data protection rules also treat data destruction and corruption of personal data as data breaches requiring appropriate notification. Know the rules to avoid getting in trouble.


Threat No. 9: Inadequate diligence

Organizations that embrace the cloud without fully understanding the environment and its associated risks may encounter a “myriad of commercial, financial, technical, legal, and compliance risks,” the CSA warned. Due diligence applies whether the organization is trying to migrate to the cloud or merging (or working) with another company in the cloud. For example, organizations that fail to scrutinize a contract may not be aware of the provider’s liability in case of data loss or breach.

Operational and architectural issues arise if a company's development team lacks familiarity with cloud technologies as apps are deployed to a particular cloud. The CSA reminds organizations they must perform extensive due diligence to understand the risks they assume when they subscribe to each cloud service.


Threat No. 10: Cloud service abuses

Cloud services can be commandeered to support nefarious activities, such as using cloud computing resources to break an encryption key in order to launch an attack. Other examples including launching DDoS attacks, sending spam and phishing emails, and hosting malicious content.

Providers need to recognize types of abuse -- such as scrutinizing traffic to recognize DDoS attacks -- and offer tools for customers to monitor the health of their cloud environments. Customers should make sure providers offer a mechanism for reporting abuse. Although customers may not be direct prey for malicious actions, cloud service abuse can still result in service availability issues and data loss.


Threat No. 11: DoS attacks

DoS attacks have been around for years, but they've gained prominence again thanks to cloud computing because they often affect availability. Systems may slow to a crawl or simply time out. “Experiencing a denial-of-service attack is like being caught in rush-hour traffic gridlock; there is one way to get to your destination and there is nothing you can do about it except sit and wait,” the report said.

DoS attacks consume large amounts of processing power, a bill the customer may ultimately have to pay. While high-volume DDoS attacks are very common, organizations should be aware of asymmetric, application-level DoS attacks, which target Web server and database vulnerabilities.

Cloud providers tend to be better poised to handle DoS attacks than their customers, the CSA said. The key is to have a plan to mitigate the attack before it occurs, so administrators have access to those resources when they need them.


Threat No. 12: Shared technology, shared dangers

Vulnerabilities in shared technology pose a significant threat to cloud computing. Cloud service providers share infrastructure, platforms, and applications, and if a vulnerability arises in any of these layers, it affects everyone. “A single vulnerability or misconfiguration can lead to a compromise across an entire provider’s cloud,” the report said.

If an integral component gets compromised -- say, a hyper-visor, a shared platform component, or an application -- it exposes the entire environment to potential compromise and breach. The CSA recommended a defense-in-depth strategy, including multi factor authentication on all hosts, host-based and network-based intrusion detection systems, applying the concept of least privilege, network segmentation, and patching shared resources.

 Peace Of Mind Isn’t Priceless.


Thank you,

Hits: 2874
Hackers steal millions from European ATM Machines using Malware!

Using a type of Malware European ATM machines are getting ripped off from Hackers.  Now, the FBI has warned U.S. banks of the potential for similar ATM jackpotting attacks, saying that the agency is "monitoring emerging reports indicating that well-resourced and organized malicious cyber actors have intentions to target the U.S. financial sector."


This problem is growing.  We all need to protect our networks, home and business otherwise you will, in short time have a hacking event.



Peace Of Mind Isn’t Priceless.



Thank you,
Alex Athineos


Tagged in: ATM Machine Hack
Hits: 4134
Dangerous RootKit found in Three Million Android Phones!

About 3 Million Android phones are vulnerable to the MTM or Man In The Middle Attack which gives root privileges to attackers.  According to  BitSight, the issue is due to a vulnerability in the insecure implementation of the OTA (Over-the-Air) update mechanism used by certain low-cost Android devices, including BLU Studio G from US-based Best Buy.

Peace Of Mind Isn’t Priceless.

Unless your phone, computer or any device connected to the Internet without the presence of a Firewall you are NOT protected.

Binary Protectors can protect your devices and give you peace of mind.

Thank you,
Alex Athineos

Hits: 2412
iPhone Data Breach, YES it can happen!

225,000 Apple Users get MALWARE HACKED.  KeyRaider is what its called and it has been the most significant attack ever.

The most important issue here is that APPLE IS VOULNERABLE!

Everyone who thinks its not is crazy.  So many people tell me, "See thats why I have a MAC".  Its BS.  Any "Machine Can be HACKED".

The point is what do you do about it.  You Protect yourself!  You protect your business.  You protect your children because it has not really begun yet.  Hacking is on the rise people.


 Peace Of Mind Isn’t Priceless.

Thank you,
Alex Athineos

Tagged in: apple hacked
Hits: 2550
Pi Zero Can Crack Windows Password in 1 Minute!

Doing a lot of research on this device which you can purchase from Amazon from [this link] you can crack a Windows password in under a minute using its USB interface.  From our research it works.

PoisonTap is the free software you install on the Rasberry Pi device.  Once installed, simply plug the USB port into a Windows machine and WHALA.... You are in....

SCARY STUFF!  This device was $5 bucks, but now on Amazon its going for about $25 as it is VERY popular!




Thank you,

Hits: 3251
Over 700 Million Android Phones Sending Text Messages To CHINA!

First Reported in the New York Times, according to The Hacker News Web Site,

There is a pre-installed back door to Android Smart Phones!

Infected Android Smartphone WorldWide

Moreover, it is worth noting that AdUps provides its software to much larger handset manufacturers, such as ZTE and Huawei, which sell their Android phones worldwide, across over 150 countries and regions.

Besides sniffing SMS message content, contact lists, call logs, location data and other personal user information and automatically sending them to AdUps every 72 hours, AdUps' software also has the capability to remotely install and update applications on a smartphone.

The secret backdoor is said to be there intentionally and not accidently or due to a security flaw, although, according to the US authorities, at the moment it is unclear whether the data is being collected for advertising purposes or government surveillance.

Kryptowire says the company discovered the secret backdoor on the BLU R1 HD device sold by Florida-based smartphone manufacturer BLU Products, which sells its devices in the U.S., and some other countries from South America, online through Amazon and Best Buy.

Massive Amount of Users' Data Sent to Chinese Servers

Based on the received commands, the security firm found the software executing multiple operations, detailed below:

  • Collect and Send SMS texts to AdUps' server every 72 hours.
  • Collect and Send call logs to AdUps' server every 72 hours.
  • Collect and Send user personally identifiable information (PII) to AdUps' server every 24 hours.
  • Collect and Send the smartphone's IMSI and IMEI identifiers.
  • Collect and Send geolocation information.
  • Collect and Send a list of apps installed on the user's device.
  • Download and Install apps without the user's consent or knowledge.
  • Update or Remove apps.
  • Update the phone's firmware and Re-program the device.
  • Execute remote commands with elevated privileges on the user's device.

No, Users Can't Disable or Remove the Backdoor

The backdoor has been discovered in two system applications – com.adups.fota.sysoper and com.adups.fota – neither of which can be disabled or removed by the user.

On contacting, BLU Products confirmed that approximately 120,000 of its smartphones have the AdUps' software installed, which is being removed from its devices.

"BLU Products has identified and has quickly removed a recent security issue caused by a third-party application which had been collecting unauthorized personal data in the form of text messages, call logs, and contacts from customers using a limited number of BLU mobile devices," the company said in a statement. 
"Our customer's privacy and security are of the upmost (sic) importance and priority. The affected application has since been self-updated, and the functionality verified to be no longer collecting or sending this information."

Besides BLU Products, Kryptowire immediately notified Google, AdUps, as well as Amazon, which is the exclusive retailer of the BLU R1 HD, of its findings.

Google also issued a statement saying that the company is working with all affected parties to patch the issue, though the tech giant said that it doesn't know how widely AdUps distributed its software.

However, According to AdUps, its software featured on the smartphone tested by the security firm was not intended to be included on smartphones in the United States market and was just designed to help Chinese phone manufacturers to monitor user behavior.


Please, make sure you are behind a FIREWALL when you transact over the Internet!  We can help!
Call us now (888) 994-WIFI [9434].

Remember, peace Of Mind Isn’t Priceless.


Tagged in: android hack
Hits: 2476
Adult Friend Finder HACKED, 300 Million Users EXPOSED!

According to the Web Site "The Hacker News",

300 Million plus Adult Freind Finder records HACKED and exposed!


People, this problem is getting bigger and bigger.

PROTECT your network!  Protect your WIFI!  Call us!  (888) 994-WIFI [9434]


Hits: 3279
WIFI Signals can leak passwords!

According to "The Hacker News Web Site",

Hackers can steal your sensitive information, such as your Passwords, PINs and Keystrokes, from your phone by observing changes in the wireless signal as you enter them into your smartphones.

A group of researchers from the Shanghai Jaio Tong University, the University of South Florida and the University of Massachusetts at Boston have demonstrated a new technique that can reveal private information by analyzing the radio signal Interference, using just one rogue WiFi hotspot.

Dubbed WindTalker, the attack sniffs a user's fingers movement on the phone's touchscreen or a computer's keyboard by reading the radio signal patterns called Channel State Information (CSI).

->Swati Khandelwal

[Click Here For More Information]


Binary Protectors can stop this by adding our system.  Being protected against these threats and all other threats are paramount in todays world of WIFI and Internet Security.  Call us today (888) 994-WIFI [9434].

Hits: 2642
CAREFUL!  Cyber Monday is coming!

A warning to everyone not behind a firewall weather it be in their homes or in a busienss.  Cyber Monday will be a difficult time to everyone on the Internet.  It is our opinion there will be a significant Cyber Attack.

If you want to be protected call us.

If you want to protect your Data, Children going to Adult Web Sites or your Identity, Call US.  (888) 994-WIFI [9434]

Thank you,

Hits: 2745
Major DDos Attack!  Explained......

A "DDos" attack is is explained by WIKI:

In computing, a denial-of-service (DoSattack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.[1] It is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations.


Now, DYN really got affected.  Its down currently.  DYNDNS.ORG provides Dynamic DNS to Millions of customers.


This is quite probably the most serious DDos attack affecting companies like Amazon.Com, Twitter and many more.


Connecting to the Internet is becoming more and more dangerous!  Binary Protectors can help.  Protect your network with one of our firewalls and you will be free of any anxiety of what’s going on around the world.  There are only 1 billion IP addresses.  They are ALL being port scanned every day.  It is inevitable that bad perpetrators will get into your network unless your protected.



Alex Athineos


October 26, 2016

I will add something to my post.


This Fridays attack was more of a PROBE to see what is out there in the form of "goodies" for hackers to infiltrate. What happens Cyber Monday?

People WAKE UP!

Only a GOOD IT Company like ours can safeguard your information. How would you know you have been hacked?

We have a customer that looks at all his logs all the time and is amazed at how many IP addresses that come into, or TRY to come into his network. WE STOPPED these bad IP addresses coming into his network.

Simple, Hire the BEST. Hire Binary Protectors!

Alex Athineos

Hits: 2805
The Identity Protection HOAX!

All these commercials about "Identity Protection" IS A HOAX!  YES I SAID IT!

Look, the truth of the matter is that yes, they do provide a service.  What that service is not being sold as total protection.  Or any protection at ALL.  You do understand that they cannot PREVENT it.  They can only give you INSURANCE if it does happen.  This is the TRUTH of the matter.  Millions of people signing up left and right.  They don’t know what the full story is until the read the fine print of the contract they just signed.  Its always in the details, isn’t it?

You see, what they do is give you a 1 million dollar policy to handle the case of putting your identity back the way it was WITH THEIR ATTORNEYS.  No yours.  And, if they don’t succeed they walk away.  Your $19.95 a month for 10 years is, gone.  This seems to me as a re-insurance business.


Binary Protectors PROTECTS your Identity by sifting through every packet to see if you’re the lines of digital code match your social security number BEFORE it goes out into the Internet land.  It sifts through your banking information, your credit cards, etc.  With our system in place you should feel safe purchasing online.  Banking online.  Making sure your employees dont download a virus or malware which would give others access to your customer database and their protected information.  


Businesses done realize they all need to be PCI compliant.  Like HIPPA for doctors’ offices.  This is consumer protection.  These protections are in place to keep data safe.  

In reality most business don’t do it.  I know personally that most doctors offices are NOT HIPPA compliant and our business is in South Florida.  The CAPITAL of Doctors Offices!

Yes.  This is the truth.  As blind as you may run around on the Internet in your home buying things anyone can be snooping around on your network without you knowing anything about it.

Yes. Any other business that wants your customers can get to them if you do not have procedures in place to insure they are protected.

Not only can we do help you, but we do it with a reasonable cost.


This is why you don’t hear the Department of Defense being hacked all the time.

Like Hillary Clinton with her email server in her CLOSIT of all places.  Did you know, she literally did NOT WANT any protection on that server?  Go online and see. 

Any open system, especially "Smart Homes" or homes with cameras they open ports where anyone with the least bit of "hacking" ability can go in through those open ports and do many illicit things.

Do you have children?  Do you want them going to adult web sites?  I do, and I protect them by blocking them.  Can you do this?  Do you have a live picture of what they are doing online?  Wouldn’t you want this?  As a parent I would think everyone would.

Binary Protectors is exactly what the name suggests.  We protect businesses and homes against all of these bad actors.  We put a stop to these people trying to infiltrate your "safe zone".

Note: A "Safe Zone" is a place where you can feel safe online.  What this means is this is the place where we put the equipment necessary so you and your business can become a "safe zone".


Thank you,

Alex Athienos, President/CEO
Binary Protectors.Com, LLC

Hits: 2954