Robert Siciliano » Blog

Monday, December 30, 2013

Child patients especially susceptible to identity theft

The answer to the question of how someone can get a credit card in, say, a 2-year-old’s name, is easy, says Robert Siciliano, an identity theft expert with BestIDTheftCompanys.com.

http://www.amednews.com/article/20130902/business/130909996/5/?utm_source=rss&utm_medium=&utm_campaign=20131111

What to do if your credit card information is stolen

Holiday Headaches for Target

Holiday Headaches for Target

New credit card features may prevent security breaches

eWave: Hackers ride the Internet for illicit gains

Sunday, December 29, 2013

Debit Cards: Signature or PIN, what’s What?

What kind of debit card do you have? The two types are direct debit cards and deferred debit cards.

http://robertsiciliano.com/blog/2013/12/28/debit-cards-signature-or-pin-whats-what/

Tax Refund Thieves can be thwarted

If your tax refund doesn’t come, don’t be quick to blame the government. Tax refund fraud is very common. The IRS pays billions in fake refunds.

http://robertsiciliano.com/blog/2013/12/28/tax-refund-thieves-can-be-thwarted/

Target Breach Won’t Hurt in Long Run

How to handle Target's data breach

What to do if you believe you're affected by Target data breach

What to do if you believe you're affected by Target data breach

http://www.inforum.com/event/article/id/421552/

Target Confirms Massive Data Breach Affecting Millions of Accounts

YOUR MONEY-How to handle Target's data breach

Saturday, December 28, 2013

YOUR MONEY-How to handle Target's data breach

Burglar Real Estate Agent caught on Surveillance Camera

A homeowner’s video surveillance caught a 60-year-old man—a real estate agent—stealing women’s clothes from the house for sale while the owner and his wife were out of town.

http://robertsiciliano.com/blog/2013/12/27/burglar-real-estate-agent-caught-on-surveillance-camera/

Burglars ‘jiggle’ doorknobs, then leave their mark

Burglars aren’t dumb: They’re apparently enlisting the help of accomplices to seek out homes that are easy targets, then marking them with stickers.The stickers are small and inconspicuous, placed on front doors, being missed by the actual residents.

http://robertsiciliano.com/blog/2013/12/27/burglars-jiggle-doorknobs-then-leave-their-mark/

Friday, December 27, 2013

Beware 'physical' high-tech cyberthreats at malls, PC World warns

Beware 'physical' high-tech cyberthreats at malls, PC World warns

http://ph.news.yahoo.com/beware-39-physical-39-high-tech-cyberthreats-malls-094034755.html

Beware 'physical' high-tech cyberthreats at malls, PC World warns

If you think spam and malware on your computer and mobile devices are the only threats to look out for during the holidays, think again: there are also physical high-tech threats like skimmers and strategically placed cameras, a tech site reported.

http://www.gmanetwork.com/news/story/341045/scitech/technology/beware-physical-high-tech-cyberthreats-at-malls-pc-world-warns

Delaware woman among Target data-breach victims

12-19-13 9a: Dave Lee - Sid - Identity Theft and Target

Tech threats abound beyond spam, malware during holidays

Major Credit Card Data Breach

Major Credit Card Data Breach

http://www.youtube.com/watch?v=kMPpu9tLUwg

Thursday, December 26, 2013

12 Ways to avoid Locksmith scams

Don’t wait until you’re locked out at night in the cold to contact a locksmith. Know ahead of time who you’d call, should you ever have a need for this kind of service. And keep that number in your phone, wallet, purse and car.

http://robertsiciliano.com/blog/2013/12/23/12-ways-to-avoid-locksmith-scams/

11 Ways to Prevent Your Email From Getting Hacked

Whenever possible, configure your Internet connection to always use HTTPS. This is the "https" that appears before the "www" in a Web address, and the https is preceded by a padlock icon.

http://www.huffingtonpost.com/robert-siciliano/11-ways-to-prevent-your-e_b_4480573.html

Crack your WiFi password to protect yourself

Today, anyone can learn code and understand the ins and outs of the technology we are simultaneously blessed and cursed with. But once you know how all this technology works to the point of calling yourself a hacker (which, by the way, isn't necessarily a bad word), then everyone in your life will be calling you to fix their devices.

http://www.atmmarketplace.com/blog/11919/Crack-your-WiFi-password-to-protect-yourself

New credit card features may prevent breaches

A huge breach of credit and debit card data from Target stores dampened the holiday spirit for as many as 40 million people nationwide this week.

http://www.stamfordadvocate.com/local/article/New-credit-card-features-may-prevent-breaches-5083388.php

Hacking happens, but it’s possible to stay safe online

It may be impossible to achieve 100-percent protection against the hacking of your personal computer, phone and other digital devices. Even large companies with cybersecurity departments and deep pockets cannot guarantee invulnerability. Witness the latest corporate hacking, reported last week, in which information about credit-card transactions of some 40 million customers of giant retailer Target apparently were stolen.

http://www.providencejournal.com/topics/special-reports/ewave/content/20131221-hacking-happens-but-its-possible-to-stay-safe-online.ece

From spies to terrorists to activists, ‘hackers’ covers a spectrum

Beyond the digital criminals who seek monetary profit lies another world of hackers. It’s a world populated by people who turn to the Internet to spread fear, disrupt society, steal corporate and government secrets, or advance a cause.

http://www.providencejournal.com/topics/special-reports/ewave/content/20131221-from-spies-to-terrorists-to-activists-hackers-covers-a-spectrum.ece

New credit card features may prevent breaches

A huge breach of credit and debit card data from Target stores dampened the holiday spirit for as many as 40 million people nationwide this week.

http://www.ctpost.com/local/article/New-credit-card-features-may-prevent-breaches-5083388.php

Review Site Offers Products and Resources to Help Victims of Data Breaches

BestIDTheftCompanys.com (BIDTC) now provides resources and products that help protect people who have had their credit cards, debit cards or other personal information compromised in a data breach.

http://finance.yahoo.com/news/review-offers-products-resources-help-205101842.html;_ylt=AwrSyCUHY7VSzQkAf__QtDMD

Wednesday, December 25, 2013

Isis Mobile Wallet goes live

Isis Mobile Wallet allows you to make purchases with your phone—a technology that just went live. Just wave your Isis-compatible smartphone at select cash registers to buy soda or taxi service, via Isis’s near-field communication technology. (iPhone compatibility with NFC will come later on.)

http://robertsiciliano.com/blog/2013/12/22/isis-mobile-wallet-goes-live/

Seniors targeted for Online Dating Scams

The 80-year-old spent $500,000 on his new girlfriend—whom he’d never met. The online romance began with an e-mail (from supposedly a dating service) from a young nurse in Ghana who said she would take care of him. Then requests for money followed. The man’s son believed that the “nurse” was likely a male con artist.

http://robertsiciliano.com/blog/2013/12/22/seniors-targeted-for-online-dating-scams/

Managing your Digital Afterlife

Ever thought of who’d get your assets should you meet an untimely death, or even if you’re 99 and sensing that the time to check out is very soon?

http://robertsiciliano.com/blog/2013/12/21/managing-your-digital-afterlife/

New credit card features may prevent breaches

A huge breach of credit and debit card data from Target stores dampened the holiday spirit for as many as 40 million people nationwide this week, including Target shoppers in Stamford.

http://www.greenwichtime.com/local/article/New-credit-card-features-may-prevent-breaches-5083693.php

Review Site Offers Products and Resources to Help Victims of Data Breaches

BestIDTheftCompanys.com (BIDTC) now provides resources and products that help protect people who have had their credit cards, debit cards or other personal information compromised in a data breach.

http://www.sbwire.com/press-releases/review-site-offers-products-and-resources-to-help-victims-of-data-breaches-415547.htm

What to do if you believe you're affected by Target data breach

If you think yours was one of the 40 million credit or debit cards involved in a data breach at Target, security experts recommend a policy of watching and waiting: Watch the account you used at the retailer on a daily basis, and wait, because there's no telling when it will be tapped by thieves.

http://www.parkrapidsenterprise.com/content/what-do-if-you-believe-youre-affected-target-data-breach

Target Confirms Massive Data Breach Affecting Millions of Accounts

Approximately 40 million accounts may have been affected between Nov. 27 and Dec. 15. In a statement Thursday, the retailer said it has identified and resolved the issue, and is working closely with law enforcement and financial institutions to investigate the problem.

http://www.wlsam.com/common/more.php?m=58&ts=1387419563&article=8CC99448685E11E3B51EFEFDADE6840A&mode=2

Target Confirms Massive Data Breach Affecting Millions of Accounts

Approximately 40 million accounts may have been affected between Nov. 27 and Dec. 15. In a statement Thursday, the retailer said it has identified and resolved the issue, and is working closely with law enforcement and financial institutions to investigate the problem.

http://www.wtma.com/common/more.php?m=58&ts=1387458025&article=8CC99448685E11E3B51EFEFDADE6840A&mode=2

How to handle Target’s data breach

If you think yours was one of the 40 million credit or debit cards involved in a data breach at Target, security experts recommend a policy of watching and waiting: Watch the account you used at the retailer on a daily basis, and wait, because there’s no telling when it will be tapped by thieves.

http://thegazette.com/2013/12/19/how-to-handle-targets-data-breach/

Tuesday, December 24, 2013

Merchants: Do you know where you Card Data is?

Card fraud affects merchants, not just shoppers. The Data Security Standard 3.0, released by the Payment Card Industry (PCI), urges companies to create a data flow diagram. This diagram would reveal all the systems, applications and employees who have access to cardholder data.

http://robertsiciliano.com/blog/2013/12/21/merchants-do-you-know-where-you-card-data-is/

5 Home holiday security myths

It happens every 15 seconds in America: a burglary, says the FBI’s 2010 Crime Clock Statistics. Don’t fall for the following myths.

http://robertsiciliano.com/blog/2013/12/20/5-home-holiday-security-myths/

10 Holiday home security checklist tips

You can have peace of mind while away from home during the holidays by implementing the following home security tips.

http://robertsiciliano.com/blog/2013/12/20/10-holiday-home-security-checklist-tips/

How to handle Target’s data breach

Target Becomes a Target for Fraud

Target stores nationwide have become the target of a sweeping case of credit and debit card fraud. And as many as 40 million accounts have been compromised.

http://www.ktvn.com/story/24267034/target-becomes-a-target-for-fraud

How to handle Target's data breach

If you think yours was one of the 40 million credit or debit cards involved in a data breach at Target, security experts recommend a policy of watching and waiting: Watch the account you used at the retailer on a daily basis, and wait, because there's no telling when it will be tapped by thieves.

http://www.chicagotribune.com/business/yourmoney/sns-how-to-handle-targets-data-breach-20131220,0,3035149.story

Card thieves 'skimming' pay-at-the-pump customers

As if the high cost of gas wasn't enough, credit and debit card users who pay at the pump have to face a new way to be gouged at the pump: skimmers.

http://www.creditcards.com/credit-card-news/gas-station-card-skimmers-1282.php

Delaware woman among Target data-breach victims

As soon as Amie Vetter read about the Target security breach yesterday, she decided to go online and check her credit-card account. That’s when the Delaware woman discovered that she was among the 40 million Target customers who had been affected by the massive data breach.

http://www.dispatch.com/content/stories/business/2013/12/20/target-breach-hit-40-million.html

Target's Credit Card Breach Is Bad, But Won't Hurt Business Much

For Target and its customers, this is shaping up to be anything but the most wonderful time of the year. The retailer confirmed Thursday that millions of customers who shopped in stores between Nov. 27 and Dec. 15, the peak shopping period of the year, may have had their credit or debit card information stolen. The news has all the elements of a retail holiday horror story, both for customers and for Target.

http://mashable.com/2013/12/19/target-credit-breach-impact/

Monday, December 23, 2013

Why Women Take Rides from Strangers: Poor Impulse Control

It keeps happening: Woman accepting rides from strangers even though the weather is beautiful, her destination isn't too far off, and she's not in pain or injured.

http://voices.yahoo.com/why-women-take-rides-strangers-poor-impulse-control-12377358.html?cat=7

Internet users older than 50 years are vulnerable, according to study

Despite the reputation social networks have for attracting younger users, McAfee's Fifty Plus Booms Online study has revealed that people aged 50 to 75 years are also connected via social media – and they are more vulnerable than they believe.

http://www.scmagazine.com/internet-users-older-than-50-years-are-vulnerable-according-to-study/article/317618/

Keeping teens using technology safe

Being a teenager can be tough. "We all understand teen peer pressure, it's been going on since the beginning of time," notes McAfee's Robert Siciliano.

http://www.firstcoastnews.com/news/article/264798/483/Keeping-teens-using-technology-safe

Oversharing on Social Media Common Amongst 50+

Thanks to social media, societal norms have undergone a seismic shift in the past five years. What was once considered private or even taboo is not only fair game, it’s expected. But this can have serious consequences from the ending of friendships to exposure to physical harm.

http://robertsiciliano.com/blog/2013/12/19/oversharing-on-social-media-common-amongst-50/

11 Ways to prevent your Email from getting hacked

Whenever possible, configure your Internet connection to always use HTTPS. This is the “https” that appears before the “www” in a Web address, and the https is preceded by a padlock icon.

http://robertsiciliano.com/blog/2013/12/19/11-ways-to-prevent-your-email-from-getting-hacked/

10 Christmas tree safety tips

My friends at Schlage want you to have a safe holiday season. Did you know that Christmas trees can kill? Not by falling on you, but by burning down your house. Between 2006 and 2010, about 230 home fires per year were responded to by U.S. fire departments, killing an average of four people each year and injuring many more.

http://robertsiciliano.com/blog/2013/12/18/10-christmas-tree-safety-tips/

10 Christmas Tree Safety Tips

My friends at Schlage want you to have a safe holiday season. Did you know that Christmas trees can kill? Not by falling on you, but by burning down your house. Between 2006 and 2010, about 230 home fires per year were responded to by U.S. fire departments, killing an average of four people each year and injuring many more.

http://www.huffingtonpost.com/robert-siciliano/10-christmas-tree-safety-tips_b_4466908.html

15 Tips on How to Protect Holiday Packages From Theft

During the holidays, thieves will actually follow delivery trucks, snatching the packages that the driver leaves at peoples’ front doors. Thieves will also cruise around neighborhoods in search of boxes left at front doors—and steal them.

http://www.chamberofcommerce.com/business-advice/technology/15-tips-on-how-to-protect-holiday-packages-from-theft-5797/

11 Ways to Prevent Your Email From Getting Hacked

Whenever possible, configure your Internet connection to always use HTTPS. This is the "https" that appears before the "www" in a Web address, and the https is preceded by a padlock icon.

http://www.huffingtonpost.com/robert-siciliano/11-ways-to-prevent-your-e_b_4480573.html

Sunday, December 22, 2013

8 Tips to prevent post Holiday Credit Card Fraud

With your cards being used online, over the phone and in person it’s easy to lose track of purchases. The key is keep good records and be diligent about your security. Here are eight great tips that will go a super long way in preventing post holiday account takeover in the form of credit card fraud.

http://robertsiciliano.com/blog/2013/12/18/8-tips-to-prevent-post-holiday-credit-card-fraud/

Technology that verifies MOOC test takers on the spot

Ever hear of MOOCs? The acronym stands for massive open online courses: the free online courses taught by professors at leading universities.

http://robertsiciliano.com/blog/2013/12/17/technology-that-verifies-mooc-test-takers-on-the-spot/

Identifying Devices can stop Mortgage Fraud

What is mortgage fraud? The act of intentionally facilitating the use of, or using, any misrepresentation, misstatement or omission in a deliberate manner, being aware of the same to contain such, during a mortgage lending process, with the aim that the mortgage lender, borrower or any other participant to the mortgage lending process relies upon it.

http://robertsiciliano.com/blog/2013/12/17/identifying-devices-can-stop-mortgage-fraud/

Saturday, December 21, 2013

Child Identities need more Legal Protection

Identity theft can involve children. In fact, it’s a growing problem. The thief takes a child’s Social Security number and either uses their name or assigns it to a different name and always changes the date of birth. So 2 year old Sally is now 22 and has a Benz. The thief then uses this new identity for job applications, loans or government benefits.

http://robertsiciliano.com/blog/2013/12/16/child-identities-need-more-legal-protection/

10 common sense holiday home security tips

It’s that time of year where burglars are casing out homes to rob, so at a minimum make sure you have strong quality door locks such as Schlage’s Touchscreen Deadbolt. Sounds crazy but burglars have families too, and they’d rather steal than pay for gifts to give to them. Here’s how to protect your home.

http://robertsiciliano.com/blog/2013/12/16/10-common-sense-holiday-home-security-tips/

Holidays increase Risk of Online Scams

The holidays mean a surge in online purchases done with laptops, cell phones, tablets and desktops.

http://robertsiciliano.com/blog/2013/12/15/holidays-increase-risk-of-online-scams/

What Is a Data Breach and How Do I Protect Myself?

When protected, sensitive or confidential data is accessed or used by someone without authority, this is a data breach. This can involve any kind of data such as personal health, financial, or business related.

http://www.huffingtonpost.com/robert-siciliano/what-is-a-data-breach-and_b_4449700.html

How to Prevent and Recognize Identify Theft

Identify theft is one of the fastest growing crimes in the world and expert Robert Siciliano is known for his extreme commitment to educating Americans on protecting themselves against it. Join us as we dive into how these thieves get and use the information, the growing problem of child identity theft, and how to make your personal information bullet proof. Robert will take us through simple steps everyone can take to protect their identity in stores and online. Be sure to join in!

http://www.voiceamerica.com/episode/74109/how-to-prevent-and-recognize-identify-theft

How to Dispute Fraudulent Credit Card Charges With Banks and Creditors

Even if you take every precaution against credit card fraud — safeguarding your wallet, saving your receipts, shredding your statements — you can never be 100 percent insulated against consumer identity theft.

http://www.gobankingrates.com/credit-card-rates/how-to-dispute-fraudulent-credit-card-charges/

4 Business Rip-offs and How to Dodge Them

Each year, small businesses in America lose billions of dollars unnecessarily--and unless they're aware of the risks, companies around the country continue to be vulnerable to various scams and pitfalls designed to suck hard-earned cash from their bottom line.

http://www.huffingtonpost.com/robert-siciliano/4-business-rip-offs-and-h_b_4459488.html

Holiday shopping alert: How to avoid gift card scams

Friday, December 20, 2013

MOOCs May Facilitate Fraudulent Degrees

Ever hear of MOOCs? The acronym stands for massive open online courses: the free online courses taught by professors at leading universities.

http://www.huffingtonpost.com/robert-siciliano/moocs-may-facillitate-fra_b_4302001.html

Lack of "Identity Proofing" leads to Fraud

Currently citizens have yet to be identified. And not even various U.S. states are willing to cooperate.

http://www.huffingtonpost.com/robert-siciliano/lack-of-identity-proofing_b_4412466.html

7 Shopping Scams Online during the Holidays

Santa Claus is coming to town—and so are online thieves. How might they nab you, and what can you do to prevent it?

http://robertsiciliano.com/blog/2013/12/13/7-shopping-scams-online-during-the-holidays/

Hectic Holidays Heavenly for Hackers

Ahhh, it’s that time of the year again: the hustle and bustle of the holiday season—parties, gift giving, travels and get togethers with friends and family. But it also brings up the question of how and when are you going to have time to shop and get everything done in time?—let alone fight those crowds at the mall for that elusive parking space.

http://robertsiciliano.com/blog/2013/12/12/hectic-holidays-heavenly-for-hackers/

Thursday, December 19, 2013

12 Ways to hide Online

If you feel paranoid about online surveillance, there are ways you can significantly shrink your cyber presence so that it’s more difficult and expensive for anyone and even big intelligent agencies to monitor your online activities.

http://robertsiciliano.com/blog/2013/12/12/12-ways-to-hide-online/

Catphishing is a loveless Nightmare

What is catphishing? This recently coined term refers to false online identities created by Internet scammers to deceive people into a long-term romantic or emotional relationship.

http://robertsiciliano.com/blog/2013/12/11/catphishing-is-a-loveless-nightmare/

How to design a secret Safe Room

Your house can easily have a “secret room,” for its novelty, for children and for a safe hideout from intruders. Entrances to these rooms are concealed by normal looking household features such as bookcases.

http://robertsiciliano.com/blog/2013/12/10/how-to-design-a-secret-safe-room/

Wednesday, December 18, 2013

What is a Data Breach and how do I protect Myself?

When protected, sensitive or confidential data is accessed or used by someone without authority, this is a data breach. This can involve any kind of data such as personal health, financial, or business related.

http://robertsiciliano.com/blog/2013/12/09/what-is-a-data-breach-and-how-do-i-protect-myself/

7 Tips to avoid ‘deadly’ social media

The vacant 5,000 square foot house next door to this kicking victim was on sale, and he had agreed with the realtor to keep an eye on it. Some kids got wind of this vacancy and put out a Facebook invitation to a Halloween rave party there.

http://robertsiciliano.com/blog/2013/12/08/7-tips-to-avoid-deadly-social-media/

15 Tips to protect holiday packages from theft

During the holidays, thieves will actually follow delivery trucks, snatching the packages that the driver leaves at peoples’ front doors. Thieves will also cruise around neighborhoods in search of boxes left at front doors—and steal them.

http://robertsiciliano.com/blog/2013/12/07/15-tips-to-protect-holiday-packages-from-theft/

10 Christmas tree safety tips

My friends at Schlage want you to have a safe holiday season. Did you know that Christmas trees can kill? Not by falling on you, but by burning down your house. Between 2006 and 2010, about 230 home fires per year were responded to by U.S. fire departments, killing an average of four people each year and injuring many more. Though not common, Christmas tree fires usually cause serious and costly damage. Eighteen percent of these fires were caused by a heat source too close to the tree. Improper disposal of the tree is also implicated as a cause. Here are tips to prevent this very preventable type of residential fire. Choose fresh over cheap and dry. The fresher the tree, the less likely it will pose a fire hazard. Look for flexible needles that don’t break, and a trunk with sap. Keep the water coming. The tree stand should contain a continuous source of water and be sturdy enough to resist toppling by kids or pets. Don’t choke the cord. Attach only three maximum strings of lights

http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/5CF5lcY9O2w/

8 Tips to prevent post Holiday Credit Card Fraud

With your cards being used online, over the phone and in person it’s easy to lose track of purchases. The key is keep good records and be diligent about your security. Here are eight great tips that will go a super long way in preventing post holiday account takeover in the form of credit card fraud. #1. To ensure your best chances of escaping fraudulent activity involving your credit card (which can occur even if the card isn’t stolen), follow these tips: Go over every transaction online and account for it. Inquire about unfamiliar purchases with family members who are permitted to use your card. Immediately phone the card issuer if you spot a suspicious transaction. #2. Document order confirmations. Screenshot the final confirmation page of your purchase, and save the confirmation e-mail. #3. Personal information protection. Before you buy online, review the website’s privacy policy regarding personal information requests and how this will be used. Consider it a red flag if yo

http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/umbdradfJn0/

Tuesday, December 17, 2013

BestHomeSecurityCompanys.com Launches a New Free Crime Radar Tool

Crime is a problem in this country. According to the U.S. Bureau of Justice Statistics, violent crime rates have increased for the second straight year, and that’s not even the worst part. In 2012, fewer Americans were aware of the rise in crime rates than ever before. Fortunately, there is now a way for Americans to keep tabs on crime in their area and be better protected from the damaging effects.

http://www.sbwire.com/press-releases/besthomesecuritycompanyscom-launches-a-new-free-crime-radar-tool-392525.htm

BHSC Announced its 2014 Besty Award Winners Today

BestHomeSecurityCompanys.com (BHSC), the largest and most credible home security review site, announced its 2014 Besty award winners on the web today.

http://www.prweb.com/releases/2013/11/prweb11360576.htm

Tech threats abound beyond spam, malware during holidays

The ubiquitous warnings about online shopping risks are well founded. As numerous experts are reminding consumers and businesses, the high season for shopping is also the high season for cybercrime.

http://www.pcworld.com/article/2080184/tech-threats-abound-beyond-spam-malware-during-holidays.html

5 ways to have a happy holiday free from credit card crime

The holiday season is filled with decking halls, spending time with family and eating delicious homemade treats. But each holiday season, many consumers become a victim of credit card fraud or theft. And spending your days on the phone with the credit card company and worrying about the crime is a sure way to take the merry spirit from your day. The increased shopping activity, both online and in the malls, makes December the prime season for credit card theft.

http://www.cardratings.com/5-ways-to-have-a-happy-holiday-free-from-credit-card-crime.html

Newlywed thrill killers lured man on Craigslist with promise of companionship

A couple married just three weeks lured a Pennsylvania man to his death with a Craigslist ad because they wanted to kill someone together, police said.

http://www.thespec.com/news-story/4260476-newlywed-thrill-killers-lured-man-on-craigslist-with-promise-of-companionship/

Data Breaches: How To Protect Your Business From Internal Threats

The biggest threat to your data may not come from external hackers. Find out how to guard against intentional or accidental internal cyber breaches.

https://www.openforum.com/articles/data-breaches-how-to-protect-your-business-from-internal-threats/?extlink=of-social-twt-o

Home Automation Systems Provide Easy, Affordable Solutions

For folks like Barry Campbell, home automation systems are a dream come true. "I've daydreamed about hooking everything in my house up to a personal computer and controlling it from there for 20 years now," says the Raleigh, NC, resident.

http://www.staples.com/sbd/cre/marketing/staples-connect/home-automation-systems.html

Take precautions to ensure holiday deliveries aren’t stolen

Away to the window she flew like a flash, tore open the shutters and threw up the sash … Well, more or less.

http://www.dispatch.com/content/stories/business/2013/12/15/take-precautions-to-ensure-holiday-deliveries-arent-stolen.html

100 Person Identity Theft Ring busted

This year, one of the biggest identity theft rings originating from Minnesota was prosecuted—spanning 14 states and involving hundreds of victims. Total theft exceeded $2.5 million, and major retailers and banks were victimized.

http://robertsiciliano.com/blog/2013/12/06/100-person-identity-theft-ring-busted/

McAfee 12 Scams Season of Sharing Sweepstakes: Win a Dell Ultrabook!

It’s that time of year again. Yes, I know it seems like we just got past the spooks from Halloween, but the holidays are just around the corner. While we are busy buying gifts and making travel arrangements, cybercriminals are making their lists, and checking them twice, as they prepare to unleash a host of scams designed to take advantage of the seasonal surge in online shopping and sharing.

http://robertsiciliano.com/blog/2013/12/05/mcafee-12-scams-season-of-sharing-sweepstakes-win-a-dell-ultrabook/

5 Ways To Protect Your Mobile From Prying Eyes

Do you know how to keep your phone from the prying eyes of exes, strangers, cops, other officials and even your own spouse? Here are tips to keep your mobile safe and secure.

http://robertsiciliano.com/blog/2013/12/05/5-ways-to-protect-your-mobile-from-prying-eyes/

Monday, December 16, 2013

Holiday security risks are in the real world too, not just online

The ubiquitous warnings about online shopping risks are well founded. As numerous experts are reminding consumers and businesses, the high season for shopping is also the high season for cybercrime.

http://www.cso.com.au/article/533840/holiday_security_risks_real_world_too_just_online/

Crack Your WiFi Password To Protect Yourself

Ever wanted to be a hacker? Today, anyone can learn code and understand the ins and outs of all the technology we are simultaneously blessed and cursed with. But once you know how all this technology works to the point of calling yourself a hacker (which, by the way, isn’t necessarily a bad word), then everyone in your life will be calling you to fix their devices. Hackers are often technologists that are inventive, curious and take technology to the edge of its limits. They often break it so they can fix it.

http://robertsiciliano.com/blog/2013/11/30/crack-your-wifi-password-to-protect-yourself/

What is a Firewall?

Most of us may have heard the term, and know it’s related to security in some way, but do you really know what a firewall is? Traditionally, firewalls were built to keep danger at bay—they were doors (or walls) to block fire from coming into another area—hence the name firewall. When you’re thinking in terms of your online security, modern-day hardware and software firewalls are similar. They act as barriers to prevent unauthorized access to your personal information.

http://robertsiciliano.com/blog/2013/12/03/what-is-a-firewall/

Scrooge’s 12 Scams of the Holidays

They’re baaaack! Actually, they never left—Scrooge’s little trolls work hard all year, scheming and scamming to steal holiday presents—or at least valuable information—from good girls and boys. From the North Pole to the South Pole, they target every one of us through phishing, SMiShing (text phishing), shipping and gift card scams. If you aren’t paying attention, they will hack your devices, spy on your surfing and empty your bank account.

http://robertsiciliano.com/blog/2013/12/03/scrooges-12-scams-of-the-holidays/

Sunday, December 15, 2013

Holidays increase Risk of Online Scams

The holidays mean a surge in online purchases done with laptops, cell phones, tablets and desktops. One way to be scammed is via pop-ups (on legitimate sites, but that are not connected to the site) that ask for a survey. After you complete it, you’re offered what seems like a free product. You then unknowingly set yourself up to be enrolled in a program to purchase more products—after giving your credit card information. It’s easy to get sidetracked by pop-ups, says iovation’s Jon Karl, VP of Corporate Development in Portland. But he asks: “Who is that business on the other end of the line; do you know them? Because there s lots of opportunities to spend your money with somebody you don t know.” iovation is one of the biggest online fraud protection companies in the world. “You have to be really careful when you re clicking on offers that are coming to you,” he adds. Shoppers should be skeptical and limit how much personal information they give out. “You really shou

http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/xLnIS6lADt4/

6 Shredding Tips To Prevent Identity Theft

Shredding is fun! Repeat that 10 times and you just might start believing it. Certainly shredding is a tad bit of work, but that’s what kids and interns are for!

http://robertsiciliano.com/blog/2013/11/29/6-shredding-tips-to-prevent-identity-theft/

Beware of iOS app vulnerabilities when on WiFi

We know WiFi is insecure. When logging onto any open (often public and free) unencrypted WiFi, your data is there for all the snoopy snoopers to see and download for their own personal gain.

http://robertsiciliano.com/blog/2013/11/28/beware-of-ios-app-vulnerabilities-when-on-wifi/

7 tips to a secure mobile device

Have you ever received an email like this…I did: “Robert, last night I was at a concert and I must have dropped my phone because I lost it. But then something awful happened. My friends knew I was with my other friend, and she got a call wondering if I was OK. Apparently whoever found or stole my mobile posted all my naked pictures to Facebook. I’ve finally got access to Facebook and I’ve deleted most of them, but it’s been a harrowing experience.”

http://robertsiciliano.com/blog/2013/11/28/7-tips-to-a-secure-mobile-device/

Saturday, December 14, 2013

What’s on Your Phone?

Today, most of us depend on our mobile phones and see it as a necessity in our everyday lives. Smartphones (and tablets) have provided us with a convenient way to communicate, socialize, work, take pictures, have our address book on hand, shop and even bank online. But we often forget that our smartphones are more akin to a mini handheld computer than a phone. Yes, it can make and receive phone calls, but with a web browser and apps, it can do so much more!

https://blogs.mcafee.com/consumer/whats-on-your-phone

How to Protect Yourself from Social Spam

Social networking sites like Facebook and Twitter allow us to communicate with friends and family, network with colleagues, and become connected to people who share a hobby or interest. But they also allow online scammers and spammers to get closer to us by utilizing the web of friendships and connections they create.

https://blogs.mcafee.com/consumer/how-to-protect-yourself-from-social-spam

Beware of Cyber Monday Scams

Beware of Cyber Monday Scams

https://www.youtube.com/watch?v=1dO-V8Ae1fw

Beware of charity scams and dating scams in social media

Beware of charity scams and dating scams in social media

https://www.youtube.com/watch?v=esCLpvAluaI

Numerous websites hacked because of poor user security and poor passwords

Consumers using simple passwords and not keeping their devices secure are prime targets for criminals. Robert Siciliano Identity theft speaker.

https://www.youtube.com/watch?v=zlNpQZHKDDc

Websites hacked because users non-existent security

Websites hacked because users non-existent security

http://www.myfoxboston.com/video?clipId=9606457&autostart=true

7 Tips to Avoid 'Deadly' Social Media

The vacant 5,000 square foot house next door to this kicking victim was on sale, and he had agreed with the realtor to keep an eye on it. Some kids got wind of this vacancy and put out a Facebook invitation to a Halloween rave party there.

http://www.huffingtonpost.com/robert-siciliano/7-tips-to-avoid-deadly-so_b_4419601.html

Q&A: Cyber Monday shoppers: Avoid getting hooked by holiday cybercrooks

As holiday shoppers rev up for today’s Cyber Monday – the official start of the online shopping season, it’s also a time for cybercriminals to pounce. During the holidays, “Criminals know that people are online in a big way. And they know we’re distracted,” said Robert Siciliano, online security expert for McAfee, the Santa Clara-based Internet security firm.

http://www.mercedsunstar.com/2013/12/02/3367988/cyber-monday-shoppers-avoid-getting.html

6 Ways to erase your Digital Life

You can make yourself “disappear” from the World Wide Web. But be forewarned: Most of the following tactics are irreversible. This includes losing any marketing presence you’ve built up over the years that can bring you business, and it can also result in being unable to restart an eliminated account with the same name or e-mail address.

http://robertsiciliano.com/blog/2013/11/28/6-ways-to-erase-your-digital-life/

Devising a Data Security Strategy

Whether you are an individual who games, a work-at-home employee, a family of four that shops online, a road warrior or even a small business, chances are you have data to protect—and so this all pertains to you.

http://robertsiciliano.com/blog/2013/11/24/devising-a-data-security-strategy/

Cyber Monday Launches Black Hat Shopping Season

Yup, the holidays are here. And I don’t know about y’all, but the last thing I plan on doing is walking into any store to buy anything. Other than to get food, most of my shopping is generally done online.

http://robertsiciliano.com/blog/2013/11/27/cyber-monday-launches-black-hat-shopping-season/

Friday, December 13, 2013

Is Methamphetamine a Problem in Your Community?

You may already know that meth addicts and local crime go hand in hand. Meth is one of those drugs that allows its users to maintain relatively high-functioning abilities that often lead to criminal acts to get more meth.

http://robertsiciliano.com/blog/2013/11/21/is-methamphetamine-a-problem-in-your-community/

You’re Not a Cop or Firefighter…but You Still May Be in a High-risk Profession

One of my audiences is real estate agents. I present programs on personal security and how they can avoid and remove themselves from dangerous situations. You see, as crazy as it seems, real estate agents are targeted by criminals every day. Rape, robbery and murder are some of the issues they face.

http://robertsiciliano.com/blog/2013/11/22/youre-not-a-cop-or-firefighterbut-you-still-may-be-in-a-high-risk-profession/

Employees putting data at risk on WiFi

Employees expect to uses their mobile devices at work, and employers often don’t mind because of the cost savings. However, being able to use personal smartphones and other mobile devices at the office creates problems for IT managers. A small business with 100 employees might have an additional 300 “bring your own device” users to contend with, all using phones, tablets and laptops. There are a lot of potential leaks there.

http://robertsiciliano.com/blog/2013/11/23/employees-putting-data-at-risk-on-wifi/

Thursday, December 12, 2013

Social networking site Ask.fm linked to 9 teen suicides

Robert Siciliano, a McAfee cyber security expert says Ask.fm is the new favorite sparring site for cyberbullies who want to tear people down without showing their face.

http://www.myfoxdc.com/story/23900730/social-networking-site-askfm-linked-to-9-teen-suicides#axzz2kemcjfON

Digital wallets will save us!

When you leave your home or apartment in the morning, you might pack up a small bag of whatever you need for the day, which might change daily. But what doesn’t change is the three things you always have, and that’s your keys, mobile device and wallet. They are three essentials we can’t function without.

http://robertsiciliano.com/blog/2013/11/23/digital-wallets-will-save-us/

5 Considerations Before Buying a Home Security System

There are numerous considerations to be made when investing in a home security system today. While the options for the type and scope of system have been narrowed down, it’s the nuances of price, service, contracts and if it’s a do-it-yourself (DIY) project, among other things, that can all make or break the long-term satisfaction rating you’ll have.

http://robertsiciliano.com/blog/2013/11/19/5-considerations-before-buying-a-home-security-system/

NFC app on androids facilitates automation

Near field communications (NFC) is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. In the case of a mobile wallet application, those devices would be a mobile phone and a point-of-sale device at a checkout counter.

http://robertsiciliano.com/blog/2013/11/23/nfc-app-on-androids-facilitates-automation/

Wednesday, December 11, 2013

New app stores house or car keys online. Is it safe?

Ever lock yourself out of your car or home? I’ve done each at least once this year; that’s about my average. After the last time I got stuck on the cold side of my front door, I decided to go with keyless locks for my home, specifically the Schlage Touchscreen deadbolt, and it has solved my problem. But then there’s still my vehicle to consider; while autos are now available with keyless door locks too, I haven’t graduated to that just yet.

http://robertsiciliano.com/blog/2013/11/17/new-app-stores-house-or-car-keys-online-is-it-safe/

Streamlined ‘Passpoint’ WiFi coming

WiFi connects us everywhere, such as in parks, subways, airplanes, coffee shops and public WiFi hotspots. The WiFi Alliance says there are more than a million hotspots worldwide, and a report by market research company Informa Telecoms and Media (Informa.com) reports that Wifi hotspot numbers are set to grow to 5.8 million globally in the next four years.

http://robertsiciliano.com/blog/2013/10/18/streamlined-passpoint-wifi-coming/

What is scareware?

When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One of these tricks is to scare us into thinking that our computers or smartphones have become infected with malware to get us to purchase a fake application. The programs and unethical advertising practices hackers use to frighten users into purchasing rogue applications are called scareware.

http://robertsiciliano.com/blog/2013/10/22/what-is-scareware/

Tuesday, December 10, 2013

How to design a secret Safe Room

Your house can easily have a “secret room,” for its novelty, for children and for a safe hideout from intruders. Entrances to these rooms are concealed by normal looking household features such as bookcases. Purpose Designing begins with determining the secret room’s function: a hideout? fantasy playroom? a space for meditation or writing your novel? Location Next, figure out where to have it. It’s easier to figure this out if your house is under construction. Otherwise, it can be located centrally, or inside a room or even in the basement. A smart option may be unused space such as beneath a staircase, in a huge closet or inside a storage room. Furnishings To save money, do as much remodeling, restructuring and furnishing as you can (including drywalling, painting, etc.). Hire professionals for electrical and plumbing unless this is your line of work. The room also needs proper heating, cooling and ventilation. Secret Entrance It’s best to have an expert design a spectacula

http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/Jo-4u71jwO8/

Should You Post Pictures of Children Online?

Most people give no thought whatsoever to posting pictures of their children online. They are proud of their kids, they love them…so why not show the world how wonderful they are so others can enjoy each milestone too? Plus, Grandma and Auntie live so far away, and they want to keep up with new pictures and videos. And as long as you set up all the privacy settings so only your close relatives and friends can see them, then what’s the big deal?

http://robertsiciliano.com/blog/2013/11/22/should-you-post-pictures-of-children-online/

North carolinians scammed for millions dating online

Linda was ripped off for $8,000 all because she believed Greg was whom he said he was. Linda, from North Carolina, was nabbed by an online crook who promised her love. This year, 17 (possibly more) such victims have reported a dating scam that has cost them a combined $700,000, says the North Carolina Attorney General’s office. The typical victim is a woman in her early 60s. One victim sent her online Casanova nearly $1.3 million.

http://robertsiciliano.com/blog/2013/11/16/north-carolinians-scammed-for-millions-dating-online/

Would You Use Facebook To Catch a Bad Guy?

In Oklahoma, the OK state, an elderly couple was home invaded and held at knifepoint, and the woman was knocked to the ground. During the ensuing abuse, their home was robbed and the predator got away. Not OK.

http://robertsiciliano.com/blog/2013/11/22/would-you-use-facebook-to-catch-a-bad-guy/

6 Shredding Tips To Prevent Identity Theft

Shredding is fun! Repeat that 10 times and you just might start believing it. Certainly shredding is a tad bit of work, but that's what kids and interns are for!

http://www.huffingtonpost.com/robert-siciliano/6-shredding-tips-to-preve_b_4378770.html

A Short Course on Avoiding Holiday Fraudsters

Robert Siciliano is a McAfee security expert who is particularly interested in preventing identity theft. For more than 20 years, he's been researching security issues in an effort to stay ahead of the crooks. Thieves particularly like the holidays because we're all in a hurry and we're looking for a bargain. On Black Friday, I spent about half an hour talking with Robert and this week's program largely consists of that interview. - See more at: http://www.techbyter.com/2013/1208.php#sthash.WpK9CdS3.QLhFBS4S.dpuf

http://www.techbyter.com/2013/1208.php#sthash.WpK9CdS3.QLhFBS4S.dpbs

Would You Use Facebook To Catch a Bad Guy?

In Oklahoma, the OK state, an elderly couple was home invaded and held at knifepoint, and the woman was knocked to the ground. During the ensuing abuse, their home was robbed and the predator got away. Not OK.

http://www.huffingtonpost.com/robert-siciliano/would-you-use-facebook-to_b_4391482.html

The risks of online retail

Just-released figures from security vendor McAfee suggest 46 per cent of Canadians have encountered malicious activity while shopping online.

http://ca.finance.yahoo.com/blogs/insight/risks-online-retail-210208197.html

Do identity protection services really work?

Read more posts by Robert Siciliano here, Online Security Expert to McAfee and blogger for JenningsWire.

http://anniejenningspr.com/jenningswire/specialty/technology/does-identity-theft-protection-really-work/

Un quart des 50-75 ans adeptes de sextos

Selon une étude menée par McAfee sur des Américains âgés entre 50 et 75 ans, 25% des utilisateurs de smartphones ont déjà envoyé «des photos, SMS ou e-mails intimes»

http://www.20minutes.fr/web/1241763-20131025-quart-50-75-ans-adeptes-sextos

Monday, December 09, 2013

Hollywood setzt auf Panzer-Autos

Anders sieht das Robert Siciliano, Sicherheitsberater in New York: Schon eine 25 Cent teure Kugel könne einen herkömmlichen Wagen „ziemlich effizient“ treffen. Für Stars, die mehrere Millionen im Jahr verdienten, sei es nicht ungewöhnlich, viel Geld für ihre Sicherheit auszugeben.

http://www.fr-online.de/auto/-gepanzerte-fahrzeuge-fuer-die-hollywood-stars,1472790,24665934.html

Fighting the bad guy…and winning

If someone were to jump on you and start whacking away, what would you do? Would you fight back? Run? Curl up into a ball and beg for mercy? Do you have a plan? Have you even thought about what your reaction would be? When I ask my audiences these questions, most of them shake their heads and admit they are pretty much clueless as to what their response would be.

http://robertsiciliano.com/blog/2013/10/22/fighting-the-bad-guyand-winning/

Kids and Smartphones: How Old?

How old is old enough for a kid to have a smartphone? Right out of the gate, I’m saying 16, and I know there’ll be some backlash from that. Some will say it all depends on the kid; others will argue there’s no right answer. Here’s why children under the age of 16 should not have a mobile phone:

http://robertsiciliano.com/blog/2013/11/21/kids-and-smartphones-how-old/

Prepare now for device and data theft

Digital device theft is a big problem. I’ve seen numerous stories about iPhones being stolen right from a person’s hand while the user was talking on it. Others have reported sitting in a coffee shop while having a conversation and having someone walk in, see the person’s iPad, swipe it, and before anyone can get out of their chair, be halfway down the block.

http://robertsiciliano.com/blog/2013/11/21/prepare-now-for-device-and-data-theft/

Sunday, December 08, 2013

Selling Your Smartphone? Beware of Stowaway Data

Upgrading your mobile device? It has become standard practice to upgrade to a newer device every one to three years. And when doing so, people often sell, donate or discard the old one. The goal is often to sell the old one to make up the difference in cost for the new one.

http://robertsiciliano.com/blog/2013/10/24/selling-your-smartphone-beware-of-stowaway-data/

Home invader stuffs victim into gun closet…and…

And he comes out shooting! Three invaders in Houston kicked in a homeowner’s door then proceeded to beat him up and stuff him into a closet that just happened to contain all the homeowner’s firearms. How ironic.

http://robertsiciliano.com/blog/2013/11/20/home-invader-stuffs-victim-into-gun-closet-and/

5 rules for using coffee shop WiFi

In order to compete with the likes of the chain coffee shops and now fast food joints, just about every coffee shop or small restaurant is supplying its clients with free WiFi. Unfortunately, there are people who don’t understand the rules of life as far as “give and take” in that you’ve got to give a little to get a little; they, unfortunately just take. They’re WiFi-sucking vampires who have no class and sit there for five hours and buy nothing.

http://robertsiciliano.com/blog/2013/10/22/5-rules-for-using-coffee-shop-wifi/

Friday, December 06, 2013

5 rules for using coffee shop WiFi

In order to compete with the likes of the chain coffee shops and now fast food joints, just about every coffee shop or small restaurant is supplying its clients with free WiFi. Unfortunately, there are people who don’t understand the rules of life as far as “give and take” in that you’ve got to give a little to get a little; they, unfortunately just take. They’re WiFi-sucking vampires who have no class and sit there for five hours and buy nothing.

http://robertsiciliano.com/blog/2013/10/22/5-rules-for-using-coffee-shop-wifi/

Home invader stuffs victim into gun closet…and…

And he comes out shooting! Three invaders in Houston kicked in a homeowner’s door then proceeded to beat him up and stuff him into a closet that just happened to contain all the homeowner’s firearms. How ironic.

http://robertsiciliano.com/blog/2013/11/20/home-invader-stuffs-victim-into-gun-closet-and/

Selling Your Smartphone? Beware of Stowaway Data

Upgrading your mobile device? It has become standard practice to upgrade to a newer device every one to three years. And when doing so, people often sell, donate or discard the old one. The goal is often to sell the old one to make up the difference in cost for the new one.

http://robertsiciliano.com/blog/2013/10/24/selling-your-smartphone-beware-of-stowaway-data/

Thursday, December 05, 2013

McAfee 12 Scams Season of Sharing Sweepstakes: Win a Dell Ultrabook!

It’s that time of year again. Yes, I know it seems like we just got past the spooks from Halloween, but the holidays are just around the corner. While we are busy buying gifts and making travel arrangements, cybercriminals are making their lists, and checking them twice, as they prepare to unleash a host of scams designed to take advantage of the seasonal surge in online shopping and sharing. Since it only takes one scam to spoil your holiday season, it’s a good idea to get familiar with our list of the 12 Scams of the Holidays, and learn how to avoid them. To help you stay protected as you search high and low both on and offline for the perfect presents for your loved ones, McAfee has released its annual 12 Scams of Holidays list full of digital dangers to be on alert for as you surf the web for holiday deals and steals and how to be safe in the coming months and beyond. And to make sure that we all have a safe and merry holiday, McAfee is hosting the Season of Sharing Sweepstak

http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/EYHnX6trs08/

5 Ways To Protect Your Mobile From Prying Eyes

Do you know how to keep your phone from the prying eyes of exes, strangers, cops, other officials and even your own spouse? Here are tips to keep your mobile safe and secure. #1 Common Sense When it comes to the police, cooperate; this will lessen the chance of mobile confiscation. Though you aren’t required to talk to the police without an attorney present, and don’t need to fork over your passcode or give up your phone just because they ask for it, don’t be a pest, either. In general, police need a warrant to search your phone. #2 Lock down your Phone Encrypting important data is crucial for those who want to keep prying eyes—be they the police, a vindictive ex or a nosy coworker—from gaining access to their mobile device. The method of encrypting varies from one mobile device to the next, but here are some guidelines: Android and iOS phones come with native data protection for encrypting. Take advantage of this. Remember, other models also offer encryption features, and t

http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/JbEfN0urnnI/

Passwords: Fingerprint, heartbeat or brainwaves?

There is no such thing as a truly secure password; there are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your accounts. But passwords are a mess. We have too many; sometimes they are all the same, which makes it easier for a hacker; many passwords are “123456” and easy to crack; and there are numerous ways that a criminal can spy on us to log our keystrokes.

http://robertsiciliano.com/blog/2013/11/20/passwords-fingerprint-heartbeat-or-brainwaves/

6 Tips on Securing Your Home From Those You ‘Trust’

There are going to be times in your life when you will need to simply trust people who you let into your home for various reasons.

http://robertsiciliano.com/blog/2013/10/24/6-tips-on-securing-your-home-from-those-you-trust/

How to Protect Your Information Online

Every week I receive emails from people asking how they can protect their privacy online. It seems like there have been more and more data security breaches, and therefore awareness about the potential to have our information exposed is growing.

http://robertsiciliano.com/blog/2013/10/26/how-to-protect-your-information-online/

Wednesday, December 04, 2013

Child patients especially susceptible to identity theft

Data breach response plans at medical practices need to have specific arrangements for children and those without a credit history.

http://www.amednews.com/article/20130902/business/130909996/5/?utm_source=rss&utm_medium=&utm_campaign=20131125

Cyber Monday Launches Black Hat Shopping Season

Yup, the holidays are here. And I don't know about y'all, but the last thing I plan on doing is walking into any store to buy anything. Other than to get food, most of my shopping is generally done online.

http://www.huffingtonpost.com/robert-siciliano/cyber-monday-launches-bla_b_4355441.html

10 Holiday Security Tips

Christmas trees, mistletoe, candy canes, turkey and stuffing bring out scammers, phishers, burglars and identity thieves. I’m not purposefully trying to be a Grinch here, but I’m just reminding you that good times, unfortunately, bring out the worst in bad people. This time of the year is prime season for criminals to seek out victims and separate them from their money and stuff.

http://robertsiciliano.com/blog/2013/11/20/10-holiday-security-tips/