Robert Siciliano » Blog

Thursday, October 31, 2013

10 Security Tips When Selling Your House

The housing market is coming back, and lots of people are selling their homes—and you may be considering it too.

http://besthomesecuritycompanys.com/2013/10-security-tips-when-selling-your-house

Fighting the Bad Guy…and Winning

If someone were to jump on you and start whacking away, what would you do? Would you fight back? Run? Curl up into a ball and beg for mercy?

http://besthomesecuritycompanys.com/2013/fighting-the-bad-guyand-winning

Identity Thieves Go After the Deceased

There are a reported 2.5 million cases of identity theft among the deceased every year. Theft of deceased people’s identity happens partly because of the availability of public records coupled with the time it takes for credit bureaus, the Social Security Administration, financial institutions and others to process a deceased person’s Social Security number (SSN) in their systems and close all current and future lines of credit.

http://bestidtheftcompanys.com/2013/10/identity-thieves-go-after-the-deceased/

Wednesday, October 30, 2013

Backup in the cloud -- peace of mind and protection against hacking

McAfee online security expert, Robert Siciliano, recommends using a cloud backup service and two or more external hard drives stored in separate locations for maximum protection.

http://betanews.com/2013/10/09/backup-in-the-cloud-peace-of-mind-and-protection-against-hacking/

How to Keep Your Car's Doors Closed...to Hackers

When you buy a car, the last thing you expect is for its on-board computer system to be hacked before you've even had a chance to break in your custom driving gloves.

http://www.huffingtonpost.com/robert-siciliano/how-to-keep-your-cars-doo_b_4038304.html

ATM Skimmers Found At Banks In Boston And Peabody

“ATM skimming is about a billion dollar a year business for the bad guys,” says identity theft expert Robert Siciliano of BestIDTheftCompanys.com.

http://boston.cbslocal.com/2013/10/11/atm-skimmers-found-at-banks-in-boston-and-peabody/

Tuesday, October 29, 2013

Why You Shouldn't Share Your Good Credit Score on Facebook

"If I'm a bad guy and I see a credit score from a major credit bureau that was just tweeted or shared, the next thing for me to do would be to go your Facebook page, find your email address and send you an email that looks like it's coming from an entity that you might have previously done business with," says Robert Siciliano, an online security expert.

http://news.yahoo.com/why-shouldnt-share-good-credit-score-facebook-154650263.html;_ylt=A2KLOzHjyGhSSVAAAWXQtDMD

What is Business or Commercial Identity Theft?

Business or commercial identity theft happens when thieves use an existing business’ name to get credit, or they may bill a business’ clients for products and services. Sometimes the Social Security number of a company’s officer or another representative is required to commit business identity theft.

http://bestidtheftcompanys.com/2013/09/what-is-business-or-commercial-identity-theft/

Stupid, Snoozing, Snack-stealing Suspect Nabbed Napping

Rule #1 for burglars: No sleeping on the job. In California, a resident came home to find the formerly clean kitchen a little messy, food gone and a “burglar” (Ham-Burglar, anyone?) sleeping in the shed in the back yard.

http://besthomesecuritycompanys.com/2013/stupid-snoozing-snack-stealing-suspect-nabbed-napping

Monday, October 28, 2013

What is ‘Passpoint’ WiFi & Why Should You Care

According to the WiFi Alliance, there are more than a million WiFi hotspots worldwide. In addition, a report by market research company Informa Telecoms and Media (Informa.com) reports that Wifi hotspot numbers are set to grow to 5.8 million globally in the next four years.

http://blog.hotspotshield.com/2013/10/24/benefits-of-wifi-passpoint/

What is Synthetic Identity Theft?

Identity theft is first and foremost a problem because we rely on numerical identifiers that attach humans to credit and a variety of services. Once a criminal gets hold of those identifiers, he can simply be you. But when that thief takes on those numerical identifiers and attaches another name or date of birth, he confuses the already broken system further and creates what is called synthetic identity theft.

http://bestidtheftcompanys.com/2013/09/what-is-synthetic-identity-theft/

Stupid, Snoozing, Snack-stealing Suspect Nabbed Napping

Rule #1 for burglars: No sleeping on the job. In California, a resident came home to find the formerly clean kitchen a little messy, food gone and a “burglar” (Ham-Burglar, anyone?) sleeping in the shed in the back yard.

http://besthomesecuritycompanys.com/2013/stupid-snoozing-snack-stealing-suspect-nabbed-napping

Sunday, October 27, 2013

How to Protect Your Information Online

Every week I receive emails from people asking how they can protect their privacy online. It seems like there have been more and more data security breaches, and therefore awareness about the potential to have our information exposed is growing.

http://blogs.mcafee.com/consumer/how-to-protect-your-information-online

Medical Identity Theft: Ins and Outs

Medical identity theft is the deadliest form of identity theft—and I say this without hyperbole or exaggeration. When financial gain is the general motivation for stealing medical information, insurance cards, records, etc., the crime is a form of account takeover fraud. Medical identity theft—the real kind—occurs when the thief’s motivation is obtaining medical procedures or healthcare.

http://bestidtheftcompanys.com/2013/09/medical-identity-theft-ins-and-outs/

11 Easy and Simple Home Security Tips

Occasionally it’s good to be reminded of the fundamentals of home security. Print this out and stick it on your bulletin board at work or on your refrigerator as a reminder to everyone in your family.

http://besthomesecuritycompanys.com/2013/11-easy-and-simple-home-security-tips

Saturday, October 26, 2013

5 Home Security Tactics of the Uber Rich

The uber rich have many reasons to invest in uber security. I met a woman who won a $300 million lottery, and she had some unfortunate stories about how low people go to get at and to moneyed individuals. So to protect life and limb, the uber class invest in:

http://besthomesecuritycompanys.com/2013/5-home-security-tactics-of-the-uber-rich

Data Brokers Hacked and Used for Identity Theft

Did you know you can buy Social Security numbers (SSNs) online? It’s legal to do so in most cases, and pretty much anyone who has an internet connection can make a purchase. Information brokers or data brokers, as they are known, sell this information in the form of background checks.

http://bestidtheftcompanys.com/2013/10/data-brokers-hacked-and-used-for-identity-theft/

Summer Time is Burglary Time

Summer Time is Burglary Time

http://www.youtube.com/watch?v=_Qg-ORNmIdM

Thursday, October 24, 2013

Know the 10 Warning Signs of Identity Theft

As I have witnessed throughout the many years I have worked with victims, each type of identity theft can have a devastating impact.

http://bestidtheftcompanys.com/2013/09/know-the-10-warning-signs-of-identity-theft/

What is Scareware?

When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves.

http://blogs.mcafee.com/consumer/what-is-scareware

Beware of Cyber Criminals Camping Out on Hotel WiFi Using Evil Twins

For some of us who travel frequently, either for business or for pleasure, having access to a reliable WiFi connection is high on our priority.

http://blog.hotspotshield.com/2013/10/03/cyber-criminals-use-evil-twins-at-hotel-wifi/

Wednesday, October 23, 2013

Open Enrollment Is Phishing Season

But that tactic typically only works with company-issued devices, says Robert Siciliano, an online security expert at security vendor McAfee

http://www.healthcareinfosecurity.com/open-enrollment-phishing-season-a-6135

Gepanzerte Autos als Hollywood-Trend?

Unlike the Robert Siciliano, security consultant sees in New York: Even a 25 cent bullet could hit a conventional expensive car "pretty efficient". For stars who earned several million a year, it is not unusual to spend a lot of money for their safety.

http://www.autohaus.de/am-rande-gepanzerte-autos-als-hollywood-trend-1297021.html

Why pickpockets target American tourists

I explained the scenario recently to Robert Siciliano, a personal-security expert, and he agreed that, yes, I was more than likely a target for a theft, albeit good-naturedly.

http://www.dallasnews.com/lifestyles/travel/international/20131011-why-pickpockets-target-american-tourists.ece

Tuesday, October 22, 2013

How the Average Consumer Can Keep Their Smartphone Secure

"A mobile phone is lost every 3.5 seconds. More than half of those devices are smartphones. 40% are not password protected." - Identity Theft Expert, Robert Siciliano

http://www.huffingtonpost.com/robert-siciliano/how-the-average-consumer_b_3954615.html

Monday, October 21, 2013

Open Enrollment Is Phishing Season

But that tactic typically only works with company-issued devices, says Robert Siciliano, an online security expert at security vendor McAfee. If individuals are using their personal devices to read e-mail in their corporate account, for instance, corporate Internet filtering generally won't stop them from accessing an unauthorized or fake website via a link, he points out.

http://www.bankinfosecurity.com/open-enrollment-phishing-season-a-6135

What's the Point of $1 Million in Insurance for Identity Theft?

Honesty is the best policy, right? I've spent my life being honest, and do you know what is the most important lesson I've learned is? The truth hurts. And when you (meaning me too) says it like it is, someone somewhere isn't going to like it.

http://www.huffingtonpost.com/robert-siciliano/whats-the-point-of-1-mill_b_4077707.html

BestIDTheftCompanys.com's Director of Reviews

BestIDTheftCompanys.com’s (BIDTC) identity theft expert Robert Siciliano has attracted a vast audience with his intriguing and valuable expertise and advice on identity theft. Consumers can find Siciliano’s contributions to major news outlets as often as once a week.

http://www.sbwire.com/press-releases/bestidtheftcompanyscoms-director-of-reviews-and-id-theft-expert-robert-siciliano-writes-articles-for-high-profile-sources-353811.htm

Scary Spice's armour-plated Escalade

With a name like ‘Scary Spice’, you’d imagine singer Mel B would drive something a little more challenging than a run-of-the-mill family car. But you might not expect to find her behind the wheel of an armoured fortress bristling with hi-tech anti-personnel gadgets.

http://www.iol.co.za/motoring/cars/cadillac/scary-spice-s-armour-plated-escalade-1.1586211#.Ulqz0lAm07w

Friday, October 18, 2013

3 Serious Security Flaws Your Bank Doesn’t Want You to Know About

Recent online security compromises, such as leaks regarding the NSA infiltrating private financial accounts and cyber-criminal attacks like Project Blitzkrieg, have made banking customers concerned about the effectiveness of security measures protecting sensitive account information

http://www.gobankingrates.com/banking/online-banking-security-flaws/http://www.gobankingrates.com/banking/online-banking-security-flaws/

Lily Collins tops most harmful celebrity web searches

Information security and the Hollywood elite hardly cross over, but computer security software company McAfee recently announced that Lily Collins has topped the 2013 list of most dangerous celebrities to search for on the internet.

http://www.scmagazine.com/lily-collins-tops-most-harmful-celebrity-web-searches/article/312267/

Thursday, October 17, 2013

Fingerprints Coming to Mobile Banking?

When Apple talks, who doesn’t listen? In mid-September the Cupertino, Calif., tech behemoth announced it would make fingerprint authentication available on its new iPhone 5S and immediately, across financial services, the question was raised: Will this impact mobile banking logins?

http://www.cutimes.com/2013/09/23/mobility-matters-fingerprints-coming-to-mobile-ban

Four Latinas Are Among 20 'Most Dangerous Celebrities

The list, compiled by Internet security firm McAfee, asserts that searching for photos and downloads relating to the Dominican bombshell yields more than a 10 percent chance of landing on a website found to carry spyware, adware, spam, phishing, viruses and other malware.

http://latino.foxnews.com/latino/money/2013/09/17/four-latinas-are-among-20-most-dangerous-celebrities-to-search-on-web/

Security Specialists Evaluate Vulnerabilities of iPhone 5

In an article for The Huffington Post, security specialist Robert Siciliano wrote that students should take particular care when using social media websites like Facebook and Twitter, as sharing too much information on these platforms can expose them to a number of security threats.

http://www.usnewsuniversitydirectory.com/articles/security-specialists-evaluate-vulnerabilities-of-i_13402.aspx#.UlqOElAm07w

Ein neuer Trend in Hollywood?

Unlike the Robert Siciliano, security consultant sees in New York: Even a 25 cent bullet could hit a conventional expensive car "pretty efficient". For stars who earned several million a year, it is not unusual to spend a lot of money for their safety.

http://www.haz.de/Nachrichten/Panorama/Uebersicht/Gepanzerte-Autos-in-Hollywood-so-beliebt-wie-niemals-zuvor

Hollywood: se buscan autos de superlujo y completamente blindados

Si se siguen los pasos de las celebridades de Hollywood, conviene vender el Hummer por lo que se pueda y devolver el Rolls Royce al concesionario cuanto antes. Ahora lo que parece que está de moda son los vehículos blindados.

http://www.panoramadiario.com/internacional/articulo/articulo/239/hollywood-se-buscan-autos-de-superlujo-y-completamente-blindados/

Wednesday, October 16, 2013

Sweet & Innocent Lily Collins Is The 'Most Dangerous Read more at http://www.entertainmentwise.com/news/126974/Sweet-Innocent-Lily-Collins-Is-The-Most-Dangerous-Celebrity-Perhaps-Its-Those-Sheer-Dresses#oT8dskDIIlk5dLqT.99

She might look sweet and innocent but Lily Collins has topped the poll of most dangerous celebrities to search on the internet. Apparently searching for the actress puts your computer at a “14.5% chance of landing on a page that tested positive for spam, adware, spyware, viruses or other malware," according to a study.

http://www.entertainmentwise.com/news/126974/Sweet-Innocent-Lily-Collins-Is-The-Most-Dangerous-Celebrity-Perhaps-Its-Those-Sheer-Dresses

¡No googlees Lily Collins!

A veces, buscar en internet nos puede dar más de lo que queremos: un virus, por ejemplo. La empresa informática estadounidense McAffee ha publicado la lista de los nombres más tóxicos al introducirlos en los buscadores.

http://www.rnw.nl/espanol/article/%C2%A1no-googlees-lily-collins

Camioneta anti-paparazzi con shock eléctrico inclina la nueva tendencia de las celebridades

However, the other side of the continent York security consultant Robert Siciliano warns that a bullet cost 25 cents can penetrate an unarmoured vehicle "quite easily".

http://www.noticias24.com/gente/noticia/106318/camioneta-anti-paparazzi-con-shock-electrico-inclina-la-nueva-tendencia-de-las-celebridades/

Простой совет для вашей мамы как защитить ее Wi-Fi-роутер от взлома, - Роберт Сицилиано

Недавно я узнал, что многие, если не большинство домашних Wi-Fi роутеров очень легко могут быть взломаны злоумышленниками.

http://itexpert.org.ua/rubrikator/item/30304-prostoj-sovet-dlya-vashej-mamy-kak-zashchitit-ee-wi-fi-router-ot-vzloma-robert-sitsiliano.html

Tuesday, October 15, 2013

Juliana Paes é um perigo para os usuários da net

A estratégia deles é pegar o usuário que procura (no Google) informações, fotos e boatos sobre as estrelas”, escreveu Robert Siciliano, o pesquisador da empresa de segurança.

http://epoca.globo.com/colunas-e-blogs/bruno-astuto/noticia/2013/09/bjuliana-paesb-e-um-perigo-para-os-usuarios-da-net.html

McAfee revela 10 nombres de personas famosas que son un peligro en Internet

La compilación de esta lista de McAfee es ya tradicional e integra las advertencias de la empresa en relación con las prácticas de seguridad en línea. Robert Siciliano, evangelista de seguridad de la empresa, dice que la investigación por los nombres famosos es común, pero las personas no son conscientes de los riesgos que corren al hacer estas búsquedas en computadoras, teléfonos inteligentes o tabletas.

http://www.pysnnoticias.com/2013/09/18/mcafee-revela-10-nombres-de-personas-famosas-que-son-un-peligro-en-internet/

Workplace Violence: 12 Signs Of A Dangerous Person

Workplace violence is something everyone needs to be educated about. Know the warning signs to protect yourself and your employees.

https://www.openforum.com/articles/workplace-violence-12-signs-of-a-dangerous-person/

Saturday, October 12, 2013

ATM Skimmers Found At Banks In Boston

"ATM skimming is about a billion dollar a year business for the bad guys," says identity theft expert Robert Siciliano of BestIDTheftCompanys.com.

http://www.youtube.com/watch?v=jBOLdYKn_nk&feature=share&list=UUxPUhCstuAW8GJR826pamYA

5 Tips to Backdoor Home Security

The old adage that a chain is only as strong as its weakest link rings true with home security too. A home is only as secure as its weakest door, window or lock. So in this post, I'll address means of egress: doors.

http://www.huffingtonpost.com/robert-siciliano/5-tips-to-backdoor-home-s_b_4043594.html

Medical Identity Theft: Ins and Outs

Medical identity theft is the deadliest form of identity theft--and I say this without hyperbole or exaggeration. When financial gain is the general motivation for stealing medical information, insurance cards, records, etc., the crime is a form of account takeover fraud. Medical identity theft--the real kind--occurs when the thief's motivation is obtaining medical procedures or healthcare.

http://www.huffingtonpost.com/robert-siciliano/medical-identity-theft-in_b_3997184.html

Friday, October 11, 2013

New Smartphone Owner? Pay attention

Recent reports show smartphones are outselling dumbphones for the first time ever. Dumbphones are actually called feature phones, which is odd because they don't offer many features.

http://www.huffingtonpost.com/robert-siciliano/new-smartphone-owner-pay_b_4016375.html

What is Synthetic Identity Theft?

Identity theft is first and foremost a problem because we rely on numerical identifiers that attach humans to credit and a variety of services. Once a criminal gets hold of those identifiers, he can simply be you. But when that thief takes on those numerical identifiers and attaches another name or date of birth, he confuses the already broken system further and creates what is called synthetic identity theft.

http://bestidtheftcompanys.com/2013/09/what-is-synthetic-identity-theft/

How to Keep Your Car's Doors Closed...to Hackers

When you buy a car, the last thing you expect is for its on-board computer system to be hacked before you've even had a chance to break in your custom driving gloves.

http://www.huffingtonpost.com/robert-siciliano/how-to-keep-your-cars-doo_b_4038304.html

Wednesday, October 09, 2013

Child patients especially susceptible to identity theft

Practices that have experienced a breach, whether it was the fault of someone inside the practice or the result of a more sinister act such as cyber crime, have an obligation to mitigate the damages that can be caused from data falling into the wrong hands

http://www.amednews.com/article/20130902/business/130909996/5/?utm_source=rss&utm_medium=&utm_campaign=20130930

Can't rely on government to provide workplace security

yesterday's rampage at the navy yard in washington raising new questions about workplace violence and security. joining us now to discuss it is robert. he's a security expert.

http://video.cnbc.com/gallery/?video=3000199913&play=1

What is Business or Commercial Identity Theft?

Business or commercial identity theft happens when thieves use an existing business’ name to get credit, or they may bill a business’ clients for products and services. Sometimes the Social Security number of a company’s officer or another representative is required to commit business identity theft

http://bestidtheftcompanys.com/2013/09/what-is-business-or-commercial-identity-theft/

Monday, October 07, 2013

Lily Collins may destroy your computer

Medical Identity Theft: Ins and Outs

Medical identity theft is the deadliest form of identity theft—and I say this without hyperbole or exaggeration. When financial gain is the general motivation for stealing medical information, insurance cards, records, etc., the crime is a form of account takeover fraud. Medical identity theft—the real kind—occurs when the thief’s motivation is obtaining medical procedures or healthcare.

http://bestidtheftcompanys.com/2013/09/medical-identity-theft-ins-and-outs/

Celebrate Cybersecurity with Intel and McAfee Lifehacks

During National Cyber Security Awareness Month (NCSAM), Intel and McAfee are reaching out to digital citizens to come up with and share their favorite lifehacks

http://blogs.mcafee.com/consumer/life-hacks

Sunday, October 06, 2013

BHSC Warns Home Security Customers of Contract Lengths

BestHomeSecurityCompanys.com (BHSC) is a home security review site that works toward providing the consumer with the facts concerning home security services and products.

http://www.sbwire.com/press-releases/bhsc-warns-home-security-customers-of-contract-lengths-328289.htm

Lily Collins may destroy your computer

Harry Potter star Emma Watson is a has-been!

http://www.cnbc.com/id/101042017

Are squiggly finger signatures legally binding?

With the proliferation of hand-held credit or debit card payment devices popping up in retail establishments, signing with your finger has become the new norm. But few can master a genuine signature with a fingertip on such a tiny screen. Are these squiggly, and often illegible, digital signatures really legally binding? Read more: http://www.creditcards.com/credit-card-news/squiggly-finger-signatures-safe-legal-1282.php#ixzz2gzd77eI5 Compare credit cards here - CreditCards.com

http://www.creditcards.com/credit-card-news/squiggly-finger-signatures-safe-legal-1282.php

Know the 10 Warning Signs of Identity Theft

As I have witnessed throughout the many years I have worked with victims, each type of identity theft can have a devastating impact. Victims with whom I have worked are taxpaying citizens who do the right thing and work hard to earn honest livings.

http://bestidtheftcompanys.com/2013/09/know-the-10-warning-signs-of-identity-theft/

10 Years: National Cyber Security Awareness Month 2013

Today marks the beginning of National Cyber Security Awareness Month (NCSAM). This year we celebrate the 10th anniversary of NCSAM. Since its inception a decade ago under leadership from the U.S. Department of Homeland Security and the National Cyber Security Alliance

http://blogs.mcafee.com/consumer/ncsa-month

IF YOU WANT TO KEEP YOUR COMPUTER VIRUS-FREE, IT’S PROBABLY A GOOD IDEA NOT TO GOOGLE THIS ACTRESS

Emma Watson has been relieved of the title most dangerous celebrity to search on the Web, being surpassed by actress Lilly Collins.

http://www.theblaze.com/stories/2013/09/17/if-you-want-to-keep-your-computer-virus-free-its-probably-a-good-idea-not-to-google-this-actress/

How To Stop Criminal Hackers In Their Tracks

On a recent trip from Boston to New York on an Acela Express train, I was writing blogs and doing some research using Amtrak’s free wireless Internet. “Free” usually translates to "unsecured," which means a criminal hacker with the right hardware and software could have sniffed out my wireless communications and grabbed my data.

https://www.openforum.com/articles/how-to-stop-criminal-hackers-in-their-tracks/

Saturday, October 05, 2013

Does Identity Theft Protection Really Work?

Do identity protection service really work? How effective are their scanning/monitoring methods? Can they truly protect consumers? The answers may vary. Identity theft protection is designed to protect you from new lines of credit being opened in your name—and along with the recovery/restoration component, it’s designed to clean up the mess

http://bestidtheftcompanys.com/2013/09/does-identity-theft-protection-really-work/

#RiskyCeleb Twitter Contest: Win a Samsung Galaxy Note 10.1 Tablet from @McAfeeConsumer

The 2013 Most Dangerous Celebrities list, released on September 17, found that for the 7th year in a row, female celebrities are far more dangerous than their male counterparts

http://blogs.mcafee.com/consumer/rt2win-riskyceleb

Security Specialists Evaluate Vulnerabilities of iPhone 5

Apple raised eyebrows with the announcement of its newest iPhone last week, but security specialists and hackers are already turning their attention to potential vulnerabilities in the device.

http://www.usnewsuniversitydirectory.com/articles/security-specialists-evaluate-vulnerabilities-of-i_13402.aspx#.Uj30mMYm15w

Friday, October 04, 2013

Top 10 Identity Theft Scams

There are no shortage of ways identity thieves have to scam you out of your credit, cash and identity. Here are 10 more ways criminals pounce on their victims:

http://bestidtheftcompanys.com/2013/09/top-10-identity-theft-scams/

Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?

We all do it. We probably all just don’t admit it. Well I admit it—I’ve searched for that elusive picture of Kimye’s baby North (who I thought would be called Kadence, but I’m not in the know, which is why I’m on the search engines constantly).

http://blogs.mcafee.com/consumer/riskyceleb

Meet the Crooks Behind Identity Theft

Identity theft is growing 15-20% a year and every one of us is a potential victim, regardless of our age, nationality, or status.

http://blog.hotspotshield.com/2013/09/30/how-to-avoid-identity-theft/

It’s Even Easier Now For Regular Folks To Conduct Cybercrime

Here’s a late night infomercial for you: How’s that burger flipping going? That cubicle working out? Anyway, I’m sure your boss is such a nice guy. Guess what! If you’re interested in a career in criminal hacking, you don’t even need a computer! This (scary) special, one-time offer comes to you right now from the Internet! Get your credit card ready!

http://blogs.mcafee.com/consumer/cybercrime-exposed

Healthcare Workers Indicted for Identity Theft

A wise man once said, “Beware of false prophets, which come to you in sheep’s clothing, but inwardly they are ravening wolves.” The wolf in sheep’s clothing refers to someone in a role contrary to his or her character and with whom contact is dangerous. In other words, sometimes it’s the people we trust the most that commit the worst crimes. And it’s often the people who are the most vulnerable that are victimized.

http://bestidtheftcompanys.com/2013/08/healthcare-workers-indicted-for-identity-theft/

McAfee’s Most Dangerous Celebrities Pin It To Win It Contest: Win A Dell Ultrabook

Searching for celebrities online isn’t all glitz and glam, according to our 7th annual Most Dangerous Celebrities™ study, released earlier this week. McAfee researched which Tinseltown residents spell digital disaster when searched online. This year’s results may surprise you!

http://blogs.mcafee.com/consumer/mdc-pinterest

Thursday, October 03, 2013

Lily Collins tops most harmful celebrity web searches

Information security and the Hollywood elite hardly cross over, but McAfee recently announced that Lily Collins has topped the 2013 list of most dangerous celebrities to search for on the internet.

http://www.scmagazineuk.com/lily-collins-tops-most-harmful-celebrity-web-searches/article/312313/

15 Tips to Prevent Identity Theft

There at least 99 things to know about how to prevent identity theft. Below is a good starting point.

http://bestidtheftcompanys.com/2013/08/15-tips-to-prevent-identity-theft/

Your Government Can’t Protect You From Identity Theft

I’ve always marveled at the law enforcement motto, “To Serve and Protect.” While honorable, it’s essentially a slogan that presents our government representatives’ best intentions because in reality they can’t proactively 100 percent protect us the way we believe or expect them to do so. “Where’s a cop when you need one?” people say.

http://bestidtheftcompanys.com/2013/08/your-government-cant-protect-you-from-identity-theft/

Wednesday, October 02, 2013

Workplace Violence Security

Violence in the workplace has become an epidemic, causing nightmares for corporations. Anyone who believes “It can’t happen here” surely is mistaken.

http://www.sheqmedia.com/index.php/ct-menu-item-23/544-workplace-violence-security

Your employee's online life could open your business to some serious dangers.

Many small businesses recognize the benefits of having a social media presence for customer service and long-term marketing purposes. However, many are slow to recognize social media's security issues and how employees’ own social presence can add to the company's security issues.

https://www.openforum.com/articles/social-media-security-small-business/

Sweet & Innocent Lily Collins Is The 'Most Dangerous Celebrity

he might look sweet and innocent but Lily Collins has topped the poll of most dangerous celebrities to search on the internet. Apparently searching for the actress puts your computer at a “14.5% chance of landing on a page that tested positive for spam, adware, spyware, viruses or other malware," according to a study.

http://www.entertainmentwise.com/news/126974/Sweet-Innocent-Lily-Collins-Is-The-Most-Dangerous-Celebrity-Perhaps-Its-Those-Sheer-Dresses

Security Measures You Must Take to Keep Your New Smart Phone Safe

Recent reports show smartphones are outselling dumbphones for the first time ever. Dumbphones are actually called feature phones, which is odd because they don’t offer many features.

http://blog.hotspotshield.com/2013/09/26/security-measures-for-your-smart-phone

Warning: The Government Mail You Received Might Be a Scam

“33% of all businesses that receive bills in the mail for products or services they never asked for actually pay the bills,” said Robert Siciliano, an identity theft expert and author of The Safety Minute.

https://www.openforum.com/articles/warning-the-government-mail-you-received-might-be-a-scam-1/

A List of 'Dangerous Celebrities'

If you get malware from a web site it's probably your fault. Internet security firm McAfee has compiled a list of the celebrities it considers most likely to infect your machine if you search Google using their names.

http://www.ktrh.com/articles/houston-news-121300/a-list-of-dangerous-celebrities-11669942/

Tuesday, October 01, 2013

Top 10 'Most Dangerous' Celebrities

It's the celebrity list that no celebrity wants to appear on -- it's McAfee's annual list of "most dangerous" celebrities, ranked by how dangerous it is search for them on the Internet (and how likely you are to click on sites with malware that allows cyber criminals to steal passwords and personal information).

http://www.indiewire.com/article/top-10-most-dangerous-celebrities-according-to-mcafee-dont-search-for-lily-collins