Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Criminal Hackers

Hire an Ethical Hacker NOW!

You might think it’s crazy to actually hire a hacker, but if you don’t have an ethical hacker on your security team, you could be playing a dangerous game. Ethical hackers are called “white hat hackers” and are legal hackers, that help businesses find security problems in their networks. Developer and security teams, who build out codes, should have a white hat hacker on their side. This way, they will know from the start if the code is…

Researchers Say Office of Personnel Management Hack Leads to Ransomware

…formation, which is what was taken can be used for new account fraud. But in government breaches, they usually look for military plans, blueprints, and documents that deal with policy. The question, of course, is why did the hackers focus on this information? Well, some of the data that was taken was used to launch other attackers against contractors, and this resulted in the access to several terabytes of data. Now, those who have become…

Top 3 Social Engineering Scams

…This means that hackers don’t have to be technical, but they DO have to be clever and crafty because they are essentially taking advantage of people and “tricking” them into giving information. There are four main ways that hackers use social engineering: Phishing – where hackers use email tricks to get account information Vishing – similar to phishing, but through voice over the phone Impersonation – the act of getting…

How to protect your Mobile Phone from Hackers and Thieves

…f the phone will get lost or stolen. Public Wi-Fi Never use public Wi-Fi, such as at airports and coffee houses, to make financial transactions. Though public Wi-Fi is cheaper than a cellular connection, it comes with risks; hackers can barge in and “see” what you’re doing and snatch sensitive information about you. If you absolutely must conduct sensitive transactions on public Wi-Fi, use a virtual private network or a cellular data network….

Hacking Humans is Painfully Easy

Hackers can take over someone’s life in a matter of hours. Just ask Patsy Walsh. Though she is not a tech savvy person, the grandmother of six did have a Facebook account, and that was all the hackers needed to take over her life. By using methods such as click baiting, the act of convincing someone to click on a fake link, and then gathering information, the hackers were able to use this info to get into other accounts, and eventually…

Hackers hacking Banks big time

…cnbc.com. The hacking group wants everyone to know that their operation will be “one of the most massive attacks” ever committed in Anonymous’s history. The article adds that another media outlet, Gulf News, reports that the hackers who infiltrated Qatar National Bank attacked yet another bank and intend on making the stolen data public for this second attack—very soon. It’s possible that this leaked data will be used for ransom. For you, every…

10 Ways to Protect your WordPress Site or Blog from Hackers

As much as you try, the unfortunate truth is that hackers are going to try to attack and access your WordPress website or blog, whether you like it or not. So, it is up to you to make sure you make the hacker’s job as difficult as possible. Here are some tips: 1. Use Plugins One way to make your WordPress account less appealing is to use security plugins. These vary in quality, and you might have to purchase some of them, too. Just make sure to…

Ransomware Hackers provide Customer Service Dept. to Victims

…nough to offer alternatives to the tedious bitcoin process. They may even free one file at no cost just to show you they’re true to their word. As the ransomware business flourished, particularly Cryptolocker and CryptoWall, hackers began adding support pages on their sites to victims. An article at businessinsider.com mentions that one victim was able to negotiate a cheaper ransom payment. Why would thieves support victims? It raises the…

Hacker for hire a rising Trend

…ctim and post comments and images that will make the victim look frightfully bad. Dell SecureWorks Inc., also found: For $129 a hacker will steal e-mails from personal Yahoo or Gmail accounts. For business accounts, however, hackers want $500 per e-mail. Wannabe hackers can buy phishing tutorials as well as other tutorials for $20 to $40. Gee, for just $5 to $10, you can buy a Trojan virus that you can infiltrate someone’s computer with and…

Hackers don’t play well with Kids’ Toys

No company is immune from hackers—even a toy company. Hong Kong based VTech got hit by a hacker recently. This company makes techy educational toys for kids, and its database got breached. Customers go to the Learning Lodge store and download content to their children’s VTech devices. The devices for downloading to are a tablet, watch and action camera. But recently, this gateway store was attacked. Some customers’ private information—now in…

What are Bug Bounties?

…exploit for eventual hacking attempts. There is a bustling black market for these non-identified bugs. Compounding the issue is that it is becoming easier for Joe Hacker to acquire the skills to infiltrate—skills that common hackers never would have had just a few years ago, and especially a decade ago. So you can see how important it is for businesses to hire the best at finding these bugs and rewarding them handsomely. So yes, hackers are…

What is a Hacker?

…stealing information and money, while other hackers are benevolent. They may work for big companies or the government in the name of protecting them from bad hackers. It helps to be familiar with these general categories of hackers: Black hat hackers This is a hacker who gains unauthorized access into a computer system or network with malicious intent. They may use computers to attack systems for profit, for fun, for political motivations, or…

State sponsored Attacks big Problem

…ntity database, was attacked by hackers rather recently, and they hit the jackpot: More than 21 million federal workers are at risk of identity theft for perhaps the rest of their lives, reports an article on forbes.com. The hackers from overseas now have security clearance documents for these employees that contain some very sensitive personal information. And nobody can take these documents away from the hackers. That’s the problem with these…

Auto Hacking is a real Thing

…smartphone via its Internet-connected navigation and entertainment system; the hackers remotely took control of its steering and brakes while it was on a road. But don’t panic yet; it was an experiment conducted by good-guy hackers to demonstrate the vulnerability of a connected vehicle. The flaw was corrected after Chrysler recalled 1.4 million vehicles. But what about getting into keyless-entry vehicles? A device is sold online for $31 that…

Big Bad Hackers taken down

Darkode anyone? Not anymore. This underground bad hackers’ forum was recently demolished by the FBI, says a report on www.justice.gov. The dozen hackers associated with Darkode are facing criminal charges. Though there are about 800 of such forums, Darkode was among the worst (or shall I say “best”?), presenting a serious threat to worldwide computers. Gone is Darkode’s ventures of buying, selling and trading malware, and exchanging hacking…

These are the Bigtime Hackers

…loits. They are known as Wild Neutron and Morpho, says the article, and have been active possibly since 2011, burrowing their way into various businesses: healthcare, pharmaceutical, technology. It’s been speculated that the hackers want the inside information of these companies for financial gain. They’ve been at it for three or four years; we can assume they’ve been successful. Researchers believe that these hackers have begun using a valid…

Meet the FBI’s most wanted Hackers

Want to earn up to $4.2 million? Then find the hackers on the FBI’s most wanted list. Or at least give the FBI information leading to their arrest and/or conviction. These snakes have stolen hundreds of millions of dollars. Here is the list from the hackernews.com: Evgeniy Mikhailovich Bogachev (reward: $3 million) Ironically, one of his aliases is one of the most common (and thus easily cracked) passwords: lucky12345. He’s the brains behind…

Even Hackers get hacked

…includes a sophisticated ring of hackers: Hacking Team, hailing from Italy, specializing in selling hacking software to major governments. An article on wired.com describes how a “400 gigabyte trove” went online by anonymous hackers who gutted the Hacking Team, including source code. Even their Twitter feed was hacked, and the secret hackers tweeted HT’s cracked files. One of the exposed files apparently was a list of HT’s customer information,…

Hacker isn’t a bad Word

…differentiate between criminal activities, playful pursuits, and political causes.” The reality is, is that a security breaker is no more a hacker than a home burglar is an architect. In the 1990s were movies that portrayed hackers as cyber villains, and all along, the real hackers were trying to get the word out that “crackers” was the term of choice. But it just didn’t take. Maybe one reason is because the word “hacker” has more of a novel…

Why Hacking is a National Emergency

…ecause the U.S. has a crucial financial relationship with these countries. And that needs to be preserved. For instance, there’d be little adverse impact to the U.S. if our government choked off the bank accounts of isolated hackers who were part of the Chinese government, vs. strangling the entire Chinese government. In short, the activities of small hacking groups or individual hackers within a foreign government will be dealt with without…

3 Ways We are Tricked into Cyber Attacks

…one of the hacker’s preferred tools, since the trick is directed towards humans, not computers. To check if a link is going to a phishing site, hover your cursor over the link to see its actual destination. Keep in mind that hackers can still make a link look like a legitimate destination, so watch our for misspellings and bad grammar. Oversharing. Malicious links are like pollen—they get transported all over the place by the winds of social…

Hackers for Hire both Good and Bad

…el to make sure they don’t get in trouble. Hiring hackers can easily occur beyond an organized website where jobs are posted and bid on. And there’s no sign of this industry slowing down. The line of demarcation between good hackers and bad is broad and blurry, beginning with legitimate businesses hiring hackers to analyze the companies’ networks for any vulnerabilities. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com…

Russian Hackers getting rich from your Identity

…opment of new ways to commit theft off of users of smartphones. In fact, several new crime rings have emerged this year that center on bank theft of mobile device users. There’s currently just no end in sight for the Russian hackers, and there perhaps never will be, especially since geography is a barrier to prosecution. 6 ways to watch your statements. Monitor your paper statements monthly Monitor your e-statments when they come in Login to…

5 ways Criminals hack your PC

…a million dollars worth of jewels that he knows is stashed inside a mansion surrounded by a moat filled with crocodiles. This won’t stop him. It will only determine the dynamics of how he penetrates. Yes, less sophisticated hackers will target more vulnerable networks, but there’s a lot of hefty hackers out there who aren’t intimidated by persistence. If cyber thieves want a goal badly enough, they’ll get into every nook and cranny to achieve…

6 Ways to Protect your Internet of Things from Hackers

…cray), and more. A study by HP shows that 70 percent of devices have vulnerabilities. Researchers have revealed that most of the devices in their study, plus the devices’ mobile and cloud applications, had a welcome mat for hackers. Most of these devices had weak passwords (like qwerty) or weakly protected credentials (unencrypted): beacons for hackers. Seventy percent of the devices lacked encryption. Sixty percent had insecure software…

Are All Hackers Bad?

…crack their systems, all the time. Why would these companies want to hire or incentivize hackers? The truth is not all hackers are the same. Here are the different kinds of hackers: White hat hackers: Also known as “ethical hackers,” these hackers use their skills to make the Internet a safer place. Some white hat hackers do this for fun and then report the information to companies or sites they have broken into so the companies and sites can…

Russian Organized Crime: Krem D’la Krem of Hackers

…vate it. Call the bank if its website doesn’t have this information. Online banking. If possible, conduct this on a separate computer just for this purpose. Change the router’s default password; otherwise it will be easy for hackers to do their job. Wired ethernet link. This is better than a powerline or Wi-Fi for protection. To carry out an ethernet attack, the thief would probably have to break into a home and set up a device, whereas Wi-Fi…

10 Ways you may get Hacked this Summer

…will open the e-mail and take the bait: a link to click to see the photos. The link is malware and will infect your computer. Wi-Fi Sharing Using a public computer is always risky, as anyone can monitor your online actions. Hackers can even “make” your device go to malicious websites that will infect your device. Stay away from public Wi-Fi or use a VPN (virtual private network) like Hotspot Shield. A VPN will protect you summertime and all…

Protecting Your Business’s Data From Organized Crime

…ing new lines of credit or taking over existing accounts. Transactions include making charges to credit cards, initiating electronic fund transfers or using email addresses for large phishing or spear phishing campaigns. How Hackers Hack Hackers are the bad guys who use penetration-testing tools—both legal and illegal—that are available commercially or only available on the black market. Their tools come in different forms of hardware and…

How To Stop Criminal Hackers In Their Tracks

…ng as vulnerable kids, chatting it up with pedophiles who buy sell and trade in child pornography. If your IP address is used for this purpose, you will get a knock on the door with a battering ram. Criminal hacking. Bad-guy hackers look for vulnerabilities in others’ devices when using free Wi-Fi networks. They steal keystrokes, usernames, passwords and account info, and install spyware and viruses. You’re not powerless against these…

Danger: Wireless Toilets Next on Hackers’ List

…ave to do is download the My Satis app, get in range, pair it to the toilet using the code and flush away.” Scary! As we rely more and more on wireless communication, it is important to keep your wireless devices secure from hackers bent on flushing your data out. (That was bad.) Anyway… Be smart about what kind of data you transmit on a public wireless connection. Limit your transmission of critical data and use secure sites, ones where “HTTPS”…

Connecting the Dots–How Your Digital Life Affects Identity Theft and Financial Loss

…texts, social media posts, and instant messages from people you don’t know, and always exercise caution when it comes to sharing any sensitive information. Educate yourself: Keep up to date about the latest scams and tricks hackers use to grab your information so you can avoid potential attacks. Use comprehensive protection: Because there are a variety of ways in which hackers can access your information, you need to make sure that you employ a…

How Hackers Use Our Information Against Us

…xpose a lot of your personal information online and even through the technologies you use. From information posted to social networking sites to data sent over unsecured wireless networks, you reveal bits of information that hackers can piece together to either scam or impersonate you. This information is currency to hackers because it allows them to get what they want—your money. Or worse, a criminal can take your information and make you look…

Hackers: The Good, The Bad and The Money

…ver I’m talking bad guy hacker I’m careful to precede the word hacker with “criminal” so I don’t piss off anyone who considers themselves a good guy hacker. Thomas Edison, Benjamin Franklin and Alexander Graham Bell were all hackers. Good ones too. Today we are faced with a real issue of hackers attacking our financial systems, critical infrastructure and even our own PC’s. And now as we use our mobile phones for commerce hackers are going after…

FBI: Focusing on Hackers and Intrusions

Your tax dollars are being put to work in ways to secure your bank accounts and our critical infrastructure. But there’s still more work to do. The FBI reports Early last year, hackers were discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users’ valuable personal and financial information. Last fall, an overseas crime ring was shut down after infecting four million…

Protecting Your Customer Data from Hackers

…o reasons hackers attacked websites were site defacement at 15% and site downtime at 33%.) Once customer information is hacked, it can be used to open new accounts or to take over existing accounts. It often takes only a few hackers to crack a system containing millions of customerrecords. These thieves will then broker and sell the information to other hackers. The victims find and repair the vulnerabilities in their systems, but the damage has…

Hackers Hacked Away in Las Vegas

…One interesting tidbit about DEFCON is you can’t pre-register, as in give them your credit card ahead of time to book your spot because DEFCON only accepts cash! And for good reason! What most people don’t realize is not all hackers are bad. Certainly “crackers and cyber criminals” are bad, but many hackers are full time security professionals and work around the clock to create the security software to protect us. If you have someone local that…

Hackers Go After Points, Credits, and Virtual Currency

…s spend on games and other Facebook content. Facebook has worked with fraud fighters to test and structure this currency so as to avoid attracting criminals, but as with any virtual currency, criminal activity is inevitable. Hackers even steal carbon credits. European carbon traders were fooled by a phishing email, which allowed hackers to access the victims’ online accounts and then transfer more than $50 million in carbon credits into their…

Hackerville: The Epicenter of Romanian Hackers

Scammers and hackers often originate from Ghana, Nigeria, Romania, Korea, Israel, Columbia, Argentina, Philippines, Malaysia, and, of course, China and the good old USA. These developing countries breed MIT-like hackers who spend all their days targeting consumers and Internet users like you and me. But Râmnicu Vâlcea is different. Wired describes the odd contrast between flapping clotheslines and the luxury Mercedes-Benz dealership in this…

7 Types of Hacker Motivations

…y experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of technology to battle hackers. Black Hat Hackers: These are the bad guys, who are typically referred to as just plain hackers. The term is often used specifically for hackers who break into networks or computers, or create computer viruses. Black…

Criminal Hackers: The Soldiers of the Web Mob

…lude: Programmers, who write the viruses that will infect victim’s PCs Carders, who sell stolen credit card data IT guys, or black hat computer professionals, who maintain the hardware necessary to keep the operation running Hackers, who look for vulnerabilities in networks and plant malicious code Social engineers, who come up with the scam and write phishing emails to send to potential victims Money mules, who are often foreign, traveling to…

Half Billion Records Breached in 5 Years

…opping, banking, and managing personal affairs. Hackers are no longer wreaking havoc for its own sake, deleting files, or tormenting IT administrators. Now, they’re stealing proprietary data. Instead of fun and fame, today’s hackers are motivated by illegal financial gain. Over the past five years, criminal hackers from all over the world have been targeting huge databases of Social Security and credit card numbers. The endgame for criminal…

Criminal Hackers Create 3 Million Fraudulent Websites Annually

A recent study shows that organized criminals create approximately 8,000 malicious websites every day, or over 57,000 each week. These malicious websites model legitimate websites that we visit every day, such as bank websites, online shopping sites, and eBay. According to this study, the most frequently impersonated companies include Visa, Amazon.com, PayPal, HSBC, and the United States Internal Revenue Service. People are typically directed…

Criminal Hackers Steal Victims Home

…zed the other properties had been sold and were no longer his. The thieves, were believed to be Nigerian, and had enough information on the man to allow the real estate transactions to go through. It is believed the criminal hackers got into his email account and obtained his personal identifying information along with his property documents which enabled the criminals to sell the houses. Reports state the transactions were made virtually via…

mCrime Higher on Hackers’ Radar

This year’s Defcon convention of hackers in August brought to light a fact that many in the security industry have known: mobile phones are becoming a bigger target for criminals. Recent news of applications on the iPhone and Android that are vulnerable to attack and possibly designed to send your data offshore have reinforced the security concerns for mobiles. It is inevitable that over the next few years as millions of smartphones replace…

Giving Your Credit Card to a Hotel? Watch Your Statements.

…departments, too. The root of the issue is the hotel industry’s insufficient security measures to prevent data breaches. Many rely on older point of sale terminals and outdated operating systems, which are more vulnerable to hackers. When the recession hit, many hotels cut back and decided to hold off on upgrades. While their defenses were down, hackers slithered into their networks to steal guests’ personal financial data. Once thieves have…

Adobe a Target for Criminal Hackers

…’re in the spotlight.” Adobe, in response is doing everything a responsible software developer should do. Adobe is the same boat today that Microsoft found itself in years ago. Ground zero. Hack central. Criminal hackers love it. Adobe’s software or files are used on almost every PC and across operating all systems. Every browser requires a program to open PDFs and many websites either have links with PDFs or incorporate Flash…

Hackers Play "Social Engineering Capture The Flag" At Defcon

…to be able to trust one another in order to survive as an interdependent communal species, otherwise fear would prevent us from relying on others to nurture us until we are tossed out of the nest. Defcon is a conference for hackers of all breeds. There are good guys, bad guys, and those who are somewhere in between, plus law enforcement and government agents. All kinds of inventive people with an intuition for technology decend on Las Vegas to…

Published Articles

…id=123887&Itemid=30 (quoted August 7 Identity Theft Protection Expert and One You Security: Year-Over-Year Spike in Data Breaches) http://www.tech-support-news.com/computer-security/ways-to-protect-yourself-from-computer-hackers/ (quoted August 7 Ways To Protect Yourself From Computer Hackers) http://www.expertclick.com/NewsReleaseWire/default.cfm?Action=ReleaseDetail&ID=22573 (quoted August 7 Identity Theft Protection Expert and One You…

Watching Out For Criminal Hacks

Robert Siciliano Identity Theft Expert We use the web to search out tons of information, to shop online and to connect with friends and family. And in the process criminals are trying to whack us over the head and steal from us. And they’ve become very proficient at their craft while most computer users know enough about protecting themselves today as they did 15 years ago. Which equates to not so much. Back in the day , a person only had to…

Criminal Hackers Had Their Best Year

Identity Theft Expert Robert Siciliano The FBI reported that last year, organized criminals made double what was reported in 2008 . Phishing emails containing the name and logo of the FBI were one of the top money makers for scam artists. Successful scams included auction scams where products were bought and paid for but product was not delivered. Advanced fee scams also topped the list. Scammers will say and do anything to get a person to part…

Top 10 Jobs For Criminal Hackers

…e like any computer professionals who maintain all the hardware to keep the operation running as it should. 4. Criminal H ackers: t hese are the tech savvy penetration testers who aren’t legitimate penn testers but black hat hackers. They look for vulnerabilities in networks and plant code to exploit the users. 5. Social E ngineers: these are the scammers and liars that think up all the different scams and communicate with people via phishing…

EFT Point of Sales Hackers Net $50 Million

Robert Siciliano Identity Theft Expert Readers of these posts are familiar with ATM skimming. ATM skimming is a billion dollar problem and growing. A relatively new scam over the past few years is electronic funds transfers at the point of sale (EFTPOS ) skimming. People commonly swipe both credit and debit cards through the in-store machines to pay for goods and services at these outlets. In Australia, Fast-food, convenience and specialist…

Criminal Hackers Buying and Selling Hacked Accounts

…media sites also allows the hacker to spread more spyware to those in the trusted circle and gives the attacker an opportunity reach out to the friends or followers of the victims to scam money in many other ways. These same hackers are enjoying access to a persons email account which may have a trove of data leading to even more usernames and passwords either contained in attached or cloud based documents. Having access to hacked email allows…

Meet Raoul Chiesa: UN Interregional Crime & Justice Research Inst.

…d, “Information is the Power”, that’s the sole reason why all of this is happening. Sum up a profile of the criminal hacker today vs. 10 years ago. There are huge differences between hackers in the past and hackers nowadays. Hackers from the past were not “mandatory” criminals. While their actions were illegal (note: during the 80’s and the 90’s, “hacking” was not a crime in many countries of…

Google Gets Hacked & What It Means to You

…its high degree of sophistication. This attack may understandably raise some questions.” Girouad stated, “We believe our customer cloud-based data remains secure.” The most successful techniques of Chinese hackers involve phishing and social engineering. These hackers determine their targets, then send a “spear phish,” or targeted email, to a specific employee, in which they pose as a coworker or a vendor. Once the…

How I Wasted 4 Hours with a Criminal Hacker

…just to study how to hack very experiencely and perfect way man [12:26] robertsicili: in the US we are hacked by many countries. The chinese are great hackers, Romanians too. [12:27] robertsicili: I have heard of vietnamese hackers too but not as often.Ukraine have many good hackers [12:27] dskimmed2009: oh yes man [12:27] dskimmed2009: RUSSIAN,VIETNAM,THIALAND,ROMANIA,UKRAINE,NIGERIA ,GHANA [12:28] robertsicili: Yes. All hacking Americans or…

Profile of a "REAL (Bad) HACKER HERE"

…count numbers, credit card numbers, CCV2 numbers, Paypal account logins, you name it. On his “Rates and Services” page, he states: “We are a group of Ethical Hackers based in the Turkey but our staff comprises of Experienced hackers around the world, we have over the years strategically recruited the best hackers from the UK,USA,Russia,India,Philippians,Vietnam and Egypt. Our policy is simple “making the world a better place by creating an equal…

U.S. Cyber Challenge to Defeat Criminal Identity Theft

…range from as young as 17 to 21 with perhaps little formal computer education who, nonetheless, could contribute to the defense of the nation’s cyber-networks. In many cases, organizers of the U.S. Cyber Challenge say, hackers’ skills go unrecognized or unappreciated by those around them and sometimes even by themselves. “Organizers say the competition is aimed at identifying young people with exceptional computer skills and…

Russian Hackers Make Millions Breaching 7/11 and ATMs

Robert Siciliano Identity Theft Expert It started simply by hacking 7-Elevens public website using a SQL injection. SQL is abbreviation of Structured Query Language. Pronounced ”Ess Que El” or ”Sequel” depending on who you ask. This led to 7 elevens main servers compromised which led to ATMs within 7-Eleven hacked. Wired reports ““The Russians, evidently using an SQL injection vulnerability, “gained unauthorized access to 7-Eleven, Inc.’s…

Hackers Indicted for Jacking Comcast

…w that the Comcast homepage and all 200 Comcast domain names were vulnerable, he hung up on them. It has not been disclosed how the email was compromised, but there are many ways it could be. According to the indictment, the hackers got control of the domain with two phone calls, and an email was sent to the company’s domain registrar, Network Solutions, from a hacked Comcast email account. That gave them entry to the Network Solutions…

I Bought an ATM off Craigslist for $750 w/1000 CC#s on it. Yup.

Robert Siciliano Identity Theft Expert After the Vegas DEFCON ATM debacle where hackers hacked hackers by setting up a fake ATM in front of the facilities security office, I needed to see how stupid easy it was to buy and ATM and just set it up anywhere. So my search began. I started looking on e-bay and found plenty of new and used ATMs ranging from $500-2500 but quickly determined I didn’t want to pay $300 for shipping. Next was Craigslist,…

High-Tech Harassment in Social Media

Robert Siciliano Identity Theft Expert Technology keeps providing new opportunities for harassment: social media identity theft, cell phone abuse, online bullying, the list goes on. Over a year ago, I appeared on The Tyra Show to discuss high tech harassment. I met a family from Washington, who found that several of their phones had been hacked and were being used to spy on and harass them. The hacker was able to turn a compromised phone on and…

Criminal Hackers Get to Momma and DaDa Via Children

Robert Siciliano Identity Theft Expert I’m particularly irate about this. There’s criminal hackers, then there’s complete lowlife scumbag criminal hackers that hack children. InternetNews reports hackers took over sections of the PBS.org Web site earlier this week, installing malicious JavaScript code on the site’s “Curious George” page that infects visitors with a slew of software exploits. For the uninitiated Curious…

Carders, Dumps, and Identity Theft

…n data is bought and sold. Gonzalez pleaded guilty to his crimes and will be serving the next fifteen years in jail. He and his gang used a combination of schemes that have caused a significant increase in counterfeit fraud. Hackers rely on a variety of techniques to obtain credit card data. One such technique is wardriving, in which criminals hack into wireless networks and install spyware. Another is phishing, in which spoofed emails prompt…

Cybersquatting Leads to Identity Theft

…terworld discussed the havoc that cybersquatting can have on a brand’s reputation. Sometimes, criminals copy a brand’s entire website in order to collect usernames and passwords from unwitting visitors. Then, the hackers will test those names and passwords on other websites. Cybersquatting increased by 18% last year, with a documented 440,584 cybersquatting sites in the fourth quarter alone, according to MarkMonitor’s annual…

Another Identity Theft Ring Busted

Identity Theft Expert Robert Siciliano The feds are getting better at busting criminals every day. Seventeen criminals, many from Eastern Europe, pilfered more than 95,000 stolen credit card numbers and $4 million worth of fraudulent transactions. The New York Times reports the men were involved in a vast conspiracy known as the Western Express Cybercrime Group, which trafficked in stolen credit card information through the Internet and used it…

Big Time Identity Theft Hackers Indicted

…it card numbers.. Gonzalez was originally arrested in 2003 by the U.S. Secret Service and began working with the agency as an informant. Federal investigators say they later learned that the hacker had been tipping off other hackers on how to evade detection of security and law enforcement worldwide. Gonzalez provided “sniffer” software used to intercept the credit and debit card numbers for the Russian hackers. Sniffer software or…

Identity Theft Is Easy Over P2P

…ft Expert Peer to peer file sharing is a great technology used to share data over peer networks. It’s also great software to get hacked and have your identity stolen. Installing P2P software allows anyone, including criminal hackers, to access your data. This can result in data breaches, credit card fraud and identity theft. This is the easiest and, frankly, the most fun kind of hacking. I’ve seen numerous reports of government agencies, drug…

A Glorious Week of Identity Theft

…a week to get high, totally drunk, on information security and identity theft scammers and hackers, then this is it! Media outlets everywhere have been pumping out story after story of data breaches, identity theft, criminal hackers and indictments! Yeah team! For a criminal hacker groupie, this is Woodstock! Dark reading reports Eight defendants were arraigned in a Brooklyn court for allegedly using the stolen identities of AT&T, T-Mobile,…

Social Media Banned, Creates Identity Theft Risk

…pposedly private data through the Facebook API, including friends, groups, wall postings and applications. Facebook applications allow a third party to access your data, which opens a Pandora’s box of possibilities for hackers. So if you send me a Facebook application and I refuse, it isn’t because I’m being rude, it’s because I think that the potential risks simply outweigh the benefits. No offense. I just don’t want my…

Criminal Hackers Clean Out Bank Accounts Using Spear Phishing

…prevalent. According to a recent study, a 52% increase in phishing scams occurred in July alone. Computerworld reports that basic phishing emails successfully led to corporate bank accounts being completely drained. Criminal hackers waited until Pennsylvania schools administrators were on vacation, then used simple money transfers to liquidate over $440,000 between December 29 and January 2. Much of the phishing that occurs today is “spear…

Identity Theft Attempt at Defcon

Identity Theft Expert Robert Siciliano Hackers hacked hackers at the annual Defcon conference in Las Vegas this past weekend. Defcon is a conference for hackers of all breeds. There are good guys, bad guys, those who are somewhere in between, plus law enforcement and government agents. All kinds of inventive people with an intuition for technology decend on Las Vegas to learn, explore, and hack. At this year’s Defcon, someone planted a…

Government Officials Contributing to Identity Theft

Robert Siciliano Identity Theft Expert Government officials are posting our Social Security numbers on the web, but corporations are required to keep them under lock and key. Congressman Robert Wexler was recently targeted by a Ghanaian extortionist who supposedly obtained Wexler’s Social Security number, as well as his wife’s, from a public record posted at The Virginia Watchdog. Betty Ostergren, founder of The Virginia Watchdog,…

A 'Whac-A-Mole' Approach to Preventing Identity Theft

…k your cell phone company. You need to understand the problem and proactively implement a solution. In the late 90’s and early 2000’s, hackers hacked for challenge, fun, and fame. It made them popular among other hackers. Soon after, consumers began spending more time online. They used their PCs to shop, bank, and manage personal affairs. Now, hackers aren’t just wreaking havoc, deleting files, or making IT administrators…

Identity Thieves Gather Data From Social Networks

Robert Siciliano Identity Theft Expert There’s a lot of excessive trust in the Facebook world. People have entirely dropped their sense of cynicism when logged on. Apparently, they see no reason to distrust. Generally, your “friends” are people who you “know, like and trust.” In this world, your guard is as down as it will ever be. You can be in the safety of your own home or office, hanging with people from all over the world, in big cities…

Web Based emails Insecurity Leads to Identity Theft

Robert Siciliano identity theft expert I recently appeared on Fox and Friends to discuss email hacking. Dave Briggs, a FOX & Friends Weekend co-host, lost access to his Hotmail email account when hackers were able to guess either his password or his qualifying question. (He admitted that his password was not as strong as it should have been.) The hackers locked Briggs out of his own account and spammed all of his contacts with a fraudulent…

Sarah Palin Victim of Social Media Identity Theft, LaRussa Drops Suit

…beginning of the presidential campaign, Sarah Palin has used Twitter and Facebook to communicate with the public. Impostors have taken every opportunity to jack her persona, even hacking into her personal email account. Now, hackers and impostors are chiming in on Sarah Palin’s resignation. The Twitter profile for ExGovSarahPalin snags and reuses graphics, photos and tweets from Sarah Palin’s “Verified” Twitter acount,…

TJX Identity Theft Costs Another 10 million, Protect Yourself from WarDriving

…tates to settle an investigation of the massive data breach. According to some reports, TJX has spent up to $256 million attempting to fix the problem that led to the breach. It’s been said repeatedly that the criminal hackers responsible for the breach were sitting in a car outside a store when they stumbled across a vulnerable, unprotected wireless network using a laptop, a telescope antenna, and an 802.11 wireless LAN adapter. This…

Social Media Identity Theft Hits MLB Coach On Twitter

Identity Theft Expert Robert Siciliano The scourge of identity theft knows no boundaries. It can happen to anyone: rich, poor, good credit, bad credit. Victims include children, the elderly, celebrities and politicians, even the dead. Identity theft may include new account fraud, account takeover, criminal identity theft, business identity theft and medical identity theft. Most of these result in financial loss. One form of identity theft that…

mCrime; Hacking Mobile Phones for Identity Theft

…troke of the user’s mouse and keyboard. Parents can use spyware to monitor their young children’s surfing habits and employers can make sure their employees are working, as opposed to surfing for porn all day. Criminal hackers created a cocktail of viruses and spyware, which allows for the infection and duplication of a virus that gives the criminal total, remote access to the user’s data. This same technology is being introduced to cell…

Data Breaches; LexisNexis – FAA Hacked, Botnets Grow, Hackers Hold Data Ransom

…breach notification letter sent by LexisNexis to its customers. The U.S. Postal Inspection Service is investigating the matter. (Check your credit reports and examine your credit card statements carefully!) CNET reports that hackers broke into FAA air traffic control systems, too. The hackers compromised an FAA public-facing computer and used it to gain access to personally identifiable information, such as Social Security numbers, for 48,000…

P2P on Your PC Equals Identity Theft

…tire family. I’ve found Christmas lists, love letters, private photos and videos (naughty ones, too) and just about anything else that can be saved as a digital file. Installing P2P software allows anyone, including criminal hackers, to access your data. This can result in data breaches, credit card fraud and identity theft. This is the easiest and, frankly, the most fun kind of hacking. I’ve seen reports of numerous government agencies, drug…

Government Agencies Engaging in Criminal Hacking Techniques

…cal. However bad guys are trying to win a cyberwar against us and it’s important to understand what’s being done to protect us. The US National Security Agency is probably the most sophisticated group of security hackers in the world. Many will argue this point. The fact is, without NSA, US STRATCOM, which directs the operation and defense of the military’s Global Information Grid, and US CERT, attacks on our critical infrastructures…

Identity Theft Expert; Organized Webmobs Focused on Cyber Crime

…ly implanted on the network to extract usernames and passwords. Once the criminals have full access, they use the breached system as their own, storing the stolen data and eventually turning it into cash. Meanwhile, criminal hackers have created approximately 1.6 million security threats, according to Symantec’s Internet Security Threat Report. 90% of these attacks were designed to steal personal information including names, addresses and credit…

E-banking just got less secure

…s has been a point of compromise. Now, Wired reports that the transaction itself puts your PIN number at risk. Academics discovered this flaw years ago, but didn’t think it would be possible to execute in the field. Criminal hackers, however, have come up with the holy grail of hacks, stealing large amounts of encrypted and unencrypted debit card and pin numbers. And they have figured a way to crack the encryption codes. The first signs of PIN…

Scamming the scammers

…ling and extorting other scammers. The FBI recently caught up with one couple who has been posing as minors, engaging sexual predators in explicit online conversations and then adding a twist. This tech savvy couple are also hackers who engage in black-hat activities. As the predators attempted to gain the trust of the supposed “minors,” the couple was actually gaining access to the predators’ computers, sending numerous files that, when…

Week of FUD; Hackers breach electric grid, Conficker sells out, Obama has a plan

Robert Siciliano Identity Theft Expert They say adversity university and the school of hard knocks makes your stronger, faster and streetsmart. And if it doesn’t kill you it makes you stronger. Lately, I’ve been killing my readers with lots of deadly data so I bet your security muscles are getting huge! The security community has bombarded the media with fascinating claims of gloom and doom. (I’m guilty of it, too.) The hype hasn’t…

WWW. Weird Wild Web Goes Nutty

…ce of originating from the FBI but seek bank account information to help in investigations of money being transferred to Nigeria. Recipients of the e-mails are told they could be richly rewarded by cooperating. Duh. Criminal hackers are going hog wild. Invest in identity theft protection and secure your PC with anti-virus protection such as McAfee Meanwhile two scumbag criminal hackers are arrested while spying on children between the ages of 14…

Identity Theft Expert; Conficker Virus Countdown

…cAfee or others. But with an estimated 15,000 new infections daily it’s difficult for the every day user to protect themselves unless they are automatically downloading virus definitions. And that may not be enough. Criminal hackers come in all shapes and colors from every corner of the world. Russian hackers are often depicted as the best of the worst. These cyber criminals are often put on a pedestal in their communities as they brag about…

Identity Theft Expert; Anatomy of a Hack

…t spring, US investigators working with Dutch authorities requested that all data traffic from the Dutch servers on route to Virginia be intercepted through wiretapping and provided to authorities. During this time, criminal hackers from all over the world used the stolen data to create ATM white cards and prepaid gift cards loaded with cash. They withdrew cash from ATMs on three continents to the tune of approximately $450,000. According to…

Identity Theft Speaker; April Fools Day is conficker worm day

Robert Siciliano Identity Theft Expert Criminal hackers have created a virus that has slipped into millions of PCs and is set to strike on April Fools day. This is no joke. So far this year it is estimated that somewhere between 3 and 12 million computers have been compromised by the “Conficker” worm, also known as “Downup,” “Downadup” and “Kido,” possibly considered the largest known global…

Identity Theft Expert; Scareware Scares You Into Paying

…ishing Working Group, released in March 2009, found 9,287 bogus anti-malware programs in circulation in December 2008 – a rise of 225% since January 2008. That’s simply because the scam works so well. Teams of criminal hackers each have their own tasks and responsibilities. Team 1 creates pages loaded with scareware and works those pages into the search engines, while others infect legitimate websites. Team 2 creates the junky or…

Credit Card Hackers Target Small Business

…medium size businesses (SMB’s) are the criminal hackers next target. This should come as no surprise, as large enterprise networks have gradually become better at defending themselves. Over the past few years, criminal hackers have acted like hornets, attacking and swarming unassuming enterprise networks. Big business has responded by allocated billions of dollars in funding for technology and talent to thwart their sting. In 2009,…

Identity Theft Prevention is a People Problem

Robert Siciliano Identity Theft Expert Every week we learn of a new hack, another breach, credit cards stolen and another identity theft victim. Many have blamed the bad guy or criminal hackers for all the problems we have in the security world. And while the bad guy is certainly a problem, they are a small part. The people responsible for their own physical or computer security or the security of others are often the guilty. You wonder why…

Recession Turns IT Workers Into Hackers

Robert Siciliano Identity Theft Expert What a nasty headline for an article. From ABCnews.com the journalist roasts IT professionals on a spit. And the comments were all inspiring. As the recession rears its ugly head, disgruntled ex employees are in the best position to drop a bomb in the companies network or suck all the data out with a few terabyte drives. A recent study by McAfee and Purdue University put the tally of fraud, data loss and…

Are You a Hacker or Hackee?

…ver I’m talking bad guy hacker I’m careful to precede the word hacker with “criminal” so I don’t piss off anyone who considers themselves a good guy hacker. Thomas Edison, Benjamin Franklin and Alexander Graham Bell were all hackers. Good ones too. Hackers in general take pride in their skills, as they should. They are often a head above the rest, on top of what is new and ahead of whats next in technology. Many are self taught and many hone…

Your Online Bank Account'; Criminal Hackers Hacking It

…liano Identity Theft Speaker Expert Why hack your online bank? Because thats where the money is! White Hat Hackers (good guys) probably never anticipated whats happening. There are more viruses out there than ever. Black Hat Hackers (bad guys) are in full force. Back in the year 2000 some have said the white hats were about a year ahead of the black hats in technology. Meaning it would take about a year for the bad guys to crack the white hats…

Identity Theft Speaker; Hold off the hackers by scanning credit

…ings, and experts say it’s vital to keep a tighter grip on personal information. Identity thieves are lurking everywhere, and the tally of such thefts has jumped in recent years. “With the downturn in the economy, along with hackers getting that much more sophisticated, you’re seeing a lot more desperate people, and hackers are taking advantage of that,” said Robert Siciliano, CEO of IDtheftsecurity.com. Article here Hold off the hackers by…

Identity Theft Expert and Speaker on Personal Security: Young, Organized Criminal Hackers Can Hijack Unprotected Computers on a Grand Scale

…he fight against computer crime. But he also noted that computer users themselves can do a great deal to thwart criminal hackers’ activities. “Robust law enforcement is a key approach to slowing criminal computer hackers,” said Siciliano. “These criminals need to know that somebody might be watching. But just as important is robust computer system security. Criminal hackers, including those who specialize in botnet…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in