Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Dating Security

How to Delete Yourself from Social Media

…our If you are serious about deleting your social media account, make sure that you are looking beyond the big four: Facebook, Twitter, LinkedIn, and Google Plus. Other sites have your data, too, including sites like Flickr, dating sites, blogs, support forums, Amazon, eBay, etc. There are also old social media sites you might not use anymore, like MySpace. Whether you have signed in lately or not, your old MySpace could be lurking out there….

Study Shows Millennials Choose Convenience Over Security

…e way millennials are viewing their identities, as well as how they view the people and businesses they interact with. Millennials have a need to want to better verify another person’s identity. To support this, just look at dating apps. Approximately 88% of people using them find the idea of verifying the identity of the people they might see offsite as appealing. It’s similar with ride sharing, where about 75% of millennials want to know,…

Should you take active Shooter Training?

…ting back. Reasoning with the gunman has also worked, but these are truly exceptional cases. In a workplace setting, often the gunman is a former employee. The grievance he has may be towards his boss or someone there he was dating or wanted to date but was rejected. The myfoxboston.com article notes some risk factors for deviantly violent behavior including divorce, loss of the job, financial woes, being bullied and experiencing child custody…

How Parents can de-motivate Sexting in their Teens

Whatever the appeal of sexting is to kids (attention), it’s definitely there, and won’t be going away too soon. Of all the things that teens can do in their daily lives, why spend time sexting? To feel cool To get a crush’s attention To make a relationship seem more serious To harass the recipient Peer pressure ATTENTION, SHOCK, AWE, SEX. Before the advent of sexting, teens talked sex and even shared racy photos with each other. But the…

Protect Yourself from Online Dating Scams

$200 million: The amount people were ripped off by online dating scams in a year. DUI: dating while under the influence…of the quest for love…is costly to countless people. A nytimes.com article notes that this quest impairs judgment, making it easy for con artists to bilk lonely people. Or are some people just plain stupid? But many victims are highly educated. It all begins with a phony profile that grabs the victim’s attention. The…

Why Are Cyber Hucksters so successful?

…mitting it [getting rooked] would mean admitting you’re a sap.” And in this day of rapidly evolving cyber technology, the huckster’s job is becoming easier, what with all sorts of pathways he can snag a victim, such as dating sites and pop-up ads warning your computer has been infected. But something else is on the crook’s side: the false sense of security that all this techy mumbo jumbo gives the common user—who hence lets down their…

Beware of ALL these Scams

…m someone claiming to be from Microsoft or some other tech giant, claiming your computer has a virus, is a scam. The scam includes background noise that sounds like a busy call center. This scam is also conducted via e-mail. Dating Never give money to someone you met through an online dating service. If they sound and look too good to be true, they probably are. A sudden sob story in which they desperately need money is a cue for you to run for…

How to prevent your Pics from being lifted: Part 2 of 2

There are many reasons someone might right-click on your image and “Save image as…” Porn, Sex and Dating Sites A woman might steal your blog headshot and use it for her dating site profile. A perv might take the picture of your child off your Facebook page and put it on a porn site. A person who runs a racy dating site might take your image and use it to advertise his service. Scams Someone might use, without your knowledge, a photo of your…

How to prevent your Pics from being lifted: Part 1 of 2

You need not be a celebrity or some big wig to suffer the devastating fallout of your online images (and videos) being stolen or used without your permission. So how does someone steal your image or use it without your permission? Hacking Hacking is one way, especially if passwords are weak and the answers to security questions can easily be figured out (e.g., “Name of your first pet,” and on your Facebook page there’s a picture of you: “My…

Seniors big Target for Romance Scams

…. but are now overseas or are entrenched in some heavy business or family situation. Be leery of those insisting, very early on, that all communications be done via e-mail, phone or instant message (to avoid detection by the dating site). If they claim they need you to send money for their travel expenses to meet you, make like an airplane and drop the bomb on them. Older women are typical targets due to their accumulated wealth. It’s a numbers…

Cheating Website hacked hard

…m got hacked. This site helps and suggests married people cheat. The hack threatens millions of users, potentially revealing their credit card information, addresses, real names, pictures and content of their chat logs. This dating site has 37 million users and is owned by Avid Life Media. Their other sites, Established Men and Cougar Life, were also hacked. The hackers responsible call themselves The Impact Team. They object strongly to…

Work at Home Environment is a safe, secure Solution

There was a time when online dating was a novelty, perceived as unsafe. Today, 59 percent of people agree that online dating is a good way to meet others (Pew Research, 2015). In fact, it’s the preferred method of matchmaking. A different online environment with similar views from the public is working from home. People who want to work at home fear its safety and security, understandably. But working from home is already a safe and secure…

Company for sale includes your Data

…ple. On one hand, such companies assure consumers that privacy is important. Next second they’re telling you your data will get into third-party hands if they sell out or fizzle out. A real-life example is the True.com Texas dating site that attempted to sell its customer database to another dating site. However, True.com’s privacy policy assured members that their personal details would never be sold without their permission. Texas law stopped…

Catphishing is a Heartless Scam

When someone online presents as a different person than their true self, this is called catphishing, and it occurs on online dating sites. Google the name of the object of your interest. Obviously, “Kelly Smith” and “John Miller” won’t get you far, but “Jaycina McArthur” just might. What comes up? See if they have social media accounts, as these suggest they’re a real person. But the absence doesn’t prove they’re a phony, either. Not every…

How the Internet of Things is further killing Privacy

…htly images—you know what I’m talking about), our privacy will be dissolved along with us. Strangers already can figure out what things we like to shop for without ever communicating to us. Your health habits, eating habits, dating habits…all the data that makes you YOU is continuously being shagged by Big Data. “Privacy” may one day become one of those words, like “oil lamp,” that’s no longer in use because by then, it will be such a…

What is Catphishing?

…difficult to discover that your image/name is being used by a catphisher. For example, suppose your name is Ashlee Patrick and you’re gorgeous. And someone named Ann Casey has decided to use your Facebook profile photo for a dating site she wants to register with, or maybe she wants to create a Facebook account. How will you ever learn of this…unless, by freako chance, someone who knows you just happens to be on Ann Casey’s (if that’s even her…

10 Tips to Protect Yourself on Social Networks

…lso make sure you use different passwords for each account. Close old accounts that you don’t use anymore: Don’t risk leaving personal data in an old account, such as a MySpace page you haven’t used in years, or on an online dating site you no longer need. Instead, close the accounts you don’t use and delete as much personal information from them as possible. Social networking is meant to be fun…let’s keep it that way by staying safe online….

Meeting a Stranger: Safety Tips for Online and In-Person

…e more than one meeting place (well-lit, very public). This is because you may want to go to a second location if it’s a date, or if it’s a buy-sell, the other person may get lost. For a buy-sell, bring someone with you. For dating or business, bring minimal cash, only the amount you expect to pay for an item. Keep extra cash (for haggling) separate and unseen by the stranger. If the stranger must come to your home to view an item you’re…

Seniors targeted for Online Dating Scams

…ana who said she would take care of him. Then requests for money followed. The man’s son believed that the “nurse” was likely a male con artist. Another case involved an 81-year-old man whose caregiver, whom he met through a dating site, wrote $80,000 in checks from his account. Online dating scams affect all ages, but seniors in particular are vulnerable due to their loneliness and sometimes compromised mental state. Some tips: Seniors should…

Catphishing is a loveless Nightmare

…categories specific to dating, including bullying, account takeovers, underage members, and so on. What’s unique to their globally shared system is that their clients can choose what to take action on or not. For example, a dating site may choose to be indifferent to cheating in online gaming sites, but set up rules to trigger multiple account creations looking for profile misrepresentation. Dating sites can specify which type of behavior to…

North carolinians scammed for millions dating online

…defense-in-depth approach to keeping their site and members safe, by layering authentication, trust, and fraud detection tools to help with the early detection of bad actors. Device reputation is one technology used by many dating sites that allows them to share fraud and abuse reports across businesses and geographies. Dating sites access Portland-based iovation Inc.’s device reputation service, ReputationManager 360, so that they can…

Secure Your Identity When Traveling

…rs your passwords. Autocomplete on a public computer means potential identity theft. If at all possible, avoid business center or Internet cafe PCs. Many mobile phones can function as a temporary replacement for a PC. Online dating scams. Millions of people use online dating sites to broaden their networks and meet potential mates, but not every person on these sites is sincere—some are scammers hoping to lure you in with false affection, with…

Safety Tips for Online Dating

…e new and agree to check in with them by a certain time so that they know you are okay. You might also set up a pick up spot in case you need your friend to pick you up if you need to bail on your date for any reason. Online dating isn’t all about being cynical and mistrusting, of course, but taking precautions when meeting someone new will make it all the better when you meet someone who you want to get to know better. Anyone who is worth…

Why are Cybercriminals Moving from PCs to Mobile Devices?

…p before some other technology nudges aside mobile in popularity. There are approximately 40,000 viruses targeting the Android operating system today. In Android’s young life, that’s astounding compared to a similar lifespan dating back to when Microsoft Windows was first launched. So you need to make sure you protect yourself, because for most of us, our mobile devices are our most personal computers. Here are some things you should do to…

Identity Theft on the Rise…Again

…geolocation alerts are triggered, the retailer knows that too, also in real time. The company maintains a living database of device intelligence, sharings the data across its global base of finance, gaming, travel, shipping, dating, and retail clients. Information is shared in order to detect fraudulent activity as soon as possible—before a product is shipped and chargebacks and fees are incurred. iovation calls it device reputation; I call it…

Why Elderly Are Targeted By Scammers

…Remember, if a cybercriminal targeting you is missing certain details needed to steal your identity, they just might ask one of your “specified” relatives. Don’t make it easy for them. Many social networks, dating sites, gaming sites and online auctions are one step ahead of such bad actors. By employing identity, credit and device reputation checks provided by online fraud prevention companies, these layered approaches…

Dating Extortion Scams On The Rise

…information, including your middle name, full address, phone number or entire birth date. To vet potential dates, look for information about them elsewhere online, and confirm that it matches the information in their online dating profiles. If a potential date asks for a loan or any financial information, report them to the dating website immediately. Robert Siciliano, personal security and identity theft expert contributor to iovation. He is…

Internet Fraud: Online Dating Scams Cost Millions

…C, which is encouraging online dating websites to help protect users from these kinds of internet scams by warning them of the risks and verifying dating profiles. Meanwhile, Mashable reports a 150% increase in global online dating fraud in 2011 If you use an online dating service, be on guard for internet fraud and follow these internet safety tips: Stick to legitimate, well-known online dating sites, and get referrals from friends who have…

Ode to the Nigerian Scammer

…not sharing them with others. Installing anti-phishing technology on one’s computer or other device is also known to prevent many of the messages from reaching you in the first place. On the business-side, banks, retailers, dating sites and social networks help prevent scams by identifying known scammers and spammers the moment they touch their website. By using iovation’s device identification service, ReputationManager 360, which shares the…

European Cybercrime Not Slowing Down

…eCommerce fraud such as the use of stolen credentials or card-not-present (CNP) fraud, financial fraud and bonus abuse on gambling sites, and a plethora of online scams and solicitations being detected in social networks and dating sites. Scammers who spend their days targeting consumers in the developed world are often blocked by businesses that are using layered fraud prevention technologies. iovation’s real-time device reputation technology…

U.S. Department of State Shares Red Flags to Identify Dating Scams

…The scammer claims to be a native-born American citizen, but uses poor grammar indicative of a non-native English speaker. Sometimes the scammer will use eloquent romantic language that is plagiarized from the Internet. Many dating sites and online communities have turned to device identification leader iovation Inc. for help. iovation works with global dating websites and social networks to protect their members from behind the scenes by…

Don’t Let Location-Based Services Put You in Danger

…licies or collect and save user data for an indefinite period of time. Some companies have even adopted the technology, which they’ve dubbed “GPS dating,” to connect singles with other local singles anywhere, any time. These dating services make it easy to find other users by providing photos and personal descriptions. This technology is immensely useful to predators, thieves, and other criminals, since it makes it so simple to determine where…

Bad Drivers And Insurance Scams Uncovered Online

…escape the truth. Device reputation analysis examines computers, tablets, and smartphones for a history of suspicious behavior, investigating for characteristics consistent with fraudulent use. This allows online retailers, dating websites, gaming websites, and insurance companies to deny criminals access to their networks, often before their first attempt. Robert Siciliano, personal security and identity theft expert contributor to iovation,…

Organized Crime Drives Increasing Auto Insurance Costs

…m, leaving the victim’s insurance on the hook for the cost of damages. One way of minimizing fraud is to stop organized criminals from transacting with a business over the Internet. Online insurance, retail, gaming, and even dating sites can weed out risky accounts based on devices’ reputations using iovation’s device identification service. When PCs, Macs, tablets, or smartphones collude, a pattern can be detected and fraud can be prevented. By…

5 Online Security Tips For Valentines Day

…stances wire money, send checks, cash etc. #4 When communicating with someone online and it seems it takes days for them to respond, this may be a sign they are married. #5 When communicating with a potential mate via online dating or even in the physical world, please do not give up any information to them until you are entirely sure they are “good”. Robert Siciliano personal and home security specialist to ADT Home Security Source…

Lonely Hearts Target of Dating Scams

…e the truth. Keep your head up and be attentive to people’s intentions. In context of the “Color Code of Mental Awareness” this would mean operating in the yellow zone (not in the white zone) while interacting with others on dating and social networking sites. One company looking out for you behind the scenes is iovation Inc. They work with dating sites and social networks around the world to rid their sites of bad actors. They have stopped more…

Almost 80% of Retailers Data At High Risk

…d in real time. And when velocity or geolocation alerts are triggered, the retailer knows in real time. iovation’s living database of device intelligence is shared across its global base of finance, gaming, travel, shipping, dating and retail clients. They share information to detect fraudulent activity as soon as possible, before product is shipped and chargebacks and fees are incurred. They call it device reputation. I call it another bit of…

iovation-stop-dating-scams

Trust: A Rare Commodity Online

People lie when they set up online dating profiles, they lie when they put up fake social media profiles, and they lie to the innocent victims of their scams. Banks and retailers know better than anyone that people lie. There are countless scenarios and justifications, but people who lie invariably do it in order to get something. In general, we strive to be a kind and civil species. We trust by default. We want to be helpful and accommodating….

Cybercriminals Target Senior Citizens

…. Many common scams take place using the telephone rather than the Internet, such as “grandparent scams,” in which victims receive calls from their supposed grandchildren, requesting money. Online, beware of social media and dating scams. Not everyone who contacts you online is your friend, so be cautious before sharing personal information. Never, under any circumstances, should you send money on the basis an online relationship. You’re most…

Device Intelligence Helps Stop Scammers Targeting Social Media Sites

…n iovation’s device reputation knowledge base. Computers that are new to these social networks dealing with scammers and spammers are rarely new to iovation. They have seen these devices on retail, financial, gaming or other dating sites and will help social sites know in real-time, whether to trust them. In the case above, the phone numbers used in the scam were traced overseas. The computer or other device the scammer used to go online could…

Disclosing Data, Despite Breaches

…true, without question. Halfway through the year, data breaches are an incessant news story. And despite the constant stream of bad news, consumers continue divulging a tremendous amount of data to retailers, auction sites, dating sites, and gaming sites. While awareness of fraud and cybercrime is at an all time high, consumers seem to feel they don’t have much of a choice but to provide all their data. People have grown to love the Internet…

Talk To Your Kids about Teen Dating Violence

Teen dating violence is a difficult and touchy subject. But approaching the issue, or not, can mean the difference between life and death. Some studies show as many as 1 in 3 teens are affected. Both young men and women are capable of acting out in abusive ways, and parents need to be aware of any signs of trouble. Teen angst can be a low level annoyance or escalate to dangerous uncontrollable anger. I was a teen once and can attest to both…

Grandmother Taken for $5400 in Online Dating Scam

…ntial dates, look for information about them elsewhere online, and confirm that it matches the information in their online dating profiles. If a potential date asks for a loan or any financial information, report them to the dating website immediately. Dating sites could protect users by incorporating device identification, device reputation and risk profiling services to keep scammers out. Oregon-based iovation Inc. offers the world’s leading…

Consumer Fraud No Longer Shocking

…included for shipping, and requests that the buyer deposit the check and then wire the payment to the shippers from the buyer’s own account. By the time the check bounces, the scammer has already received the seller’s money. Dating Scams: Criminals pose as lovesick Romeos or Juliets, looking to sweep their victims off their feet while emptying their bank accounts. Marriage is often discussed within the first week of communications, and the word…

img-jun-dating-scam

img-jun-dating-scam

Sex Offender Checks Won’t Stop Assaults

…cept that there are now many more ways for bad guys to ensnare their victims. Studies show online dating and matchmaking services are growing, even in a recession. Many single men and women are signing up and attending speed-dating sessions than ever before. There are a couple of reasons for the increase in online dating’s popularity. First, it is cheaper to join a service than to spend money on countless bad blind dates. Second, in turbulent…

Match.com Screening For Sex Offenders a Partial Solution

…ne, or tablet used to connect to the dating website or social network. If a device is associated with unwanted behavior, such as spam, online scams, fake profiles, bullying, or predatory behavior from a previous ban, the website can reject the new account or transaction. Arguably, dating sites should not have to do any of this, but implementing new layers of security is the appropriate response to an unfortunate tragedy. Let’s hope dating sites…

Scams Setting Record Pace

There is limit to what the criminal scammy mind can conjure up. KMOV reports Scammers have been using military photos to trick unsuspecting women on dating websites into giving them money. The scam artists use pictures of soldiers and post them as their own. Once they convince the women to trust them, they ask for money. The military says it gets a lot of complaints about scammers swiping official military photos and using them to create dating

Security Expert’s Credit Card Hacked

…rming him that his card data was being used overseas, on an online dating website. A scammer used Cringley’s credit card number to create a fake profile, posing as a woman named Katya to lure desperate, unsuspecting men into dating scams. Cringley determined that the IP address associated with the fraud was anonymized, going through numerous channels to disguise its origin. A Russia-based email address may mean Russian criminals are involved in…

How Much Would You Pay For a Fake Girlfriend?

…re now in their late 40s or early 50s, facing a new chapter of their lives. This dramatic life transition can foster a degree of loneliness and uncertainty that is extremely difficult to overcome without support from others. Dating sites could protect users by incorporating another layer of protection, such as device reputation management, which would analyze the computers, smartphones, and tablets used to create new accounts. By examining the…

Spring Is In The Air (And So Are Dating Scams)

Despite the recession, online dating and matchmaking services are becoming increasingly popular. More than ever before, people are looking for love online. Like a roller coaster, online dating can be fun and exciting, or it can be nauseating. Most dating veterans have been there, done that, with a few regrets and lots of lessons learned. While you may have already experienced a lot, you have yet to see it all. It’s essential to be able to…

Top 5 Business Security Risks

…profit while they have the chance. 5. Fraudulent Accounts: Many businesses lay claim to thousands or millions of members or clients who have access to web-based accounts. No matter the nature of the business, social network, dating site, gaming site, or even bank or retailer, some percentage of the accounts are ongoing instigators and repositories for fraud. Troublemaker accounts infect the overall stability of any organization, and flushing…

spring dating

Dumb Pizza Burglar Stuck In Vent

…T-shirt and jeans were coated in grease and grime. The dumb criminal was on parole after being released from prison on Jan. 27, 2010. Records show he has served five previous prison stints for burglary or attempted burglary dating back to 1992.” Sounds like he has a problem. Officials say he did extensive damage to the duct and the fire suppression system. More than likely the damage done would equate to thousands of dollars in repairs and…

Should Dating Sites Require Background Checks?

…eneral Law Committee. And in Texas, State Representative Diane Patrick, is proposing that online dating sites be required to disclose to members whether or not background checks are done, which she believes would make online dating safer. Online dating sites argue that people should use common sense, and point out that not all background checks are entirely accurate. What if the person’s profile is made from stolen information in the first…

img_mar_dating

img_mar_dating

Online Dating Sites a Haven For Criminals

…job for them. They know all the new scams and come up with better ways of executing the old ones. It blows me away that these scams are even possible. In many cases, the same scammers maintain multiple profiles on different dating sites, and the dating sites do almost nothing to prevent or police this. We caught up with anti-fraud provider iovation to see what dating sites around the world were reporting about fraudster activities. In the last…

Survey Shows “Account Takeover Fraud” Drops

…iness has a predetermined threshold) – Too many countries are accessing the account (Ex: a United States account is being accessed from Ghana) – A non-allowed country accesses the account (Your United States-only dating site just had devices from Russia and Romania trying to get into accounts, but it’s blocked automatically with customized business rules.) It’s no secret that it’s often a few bad apples that upset the bunch. Here’s…

Be Aware Online Daters – Romance Scams & Threats

…rd from a loved one could actually download malware on your machine when you click on the link, leaving you with an infection, rather than affection. In Honor of Your Heart – How To Stay Safe When signing up for online dating, go with a well-known dating site and get referrals from friends on which sites they use Design your dating profile with care—think about the image you want to project and NEVER, under any circumstance, post personal…

How Does Device Reputation Protect Me?

…sites’ comments sections are filled with vitriol that you’d never hear real people utter. Pedophiles who’d never approach a child on the street contact kids over the Internet. Sex offenders avoid the stigma of their label on dating sites and social media. Scammers create accounts in order to con people and businesses into forking over money. And identity thieves use your personal information to fill out online applications for credit. All of…

Front Row Seats When Internet Doomsday Hits Egypt

…meltdown or maybe Egyptian scammers all of a sudden decided to get a job. Normally, iovation would see thousands of queries from Egyptian customers interacting with businesses of all types, including social networks, online dating sites, online gaming sites, banks and retailers. Then at about 6:00 pm Eastern time, nothing. “We’ve got a unique view of the Internet at iovation. Our service experiences the interaction of unique…

Geolocation Technology; Please Stalk and Rob Me

…our PCs IP address or your phones GPS longitude and latitude. It’s actually a nifty “tool” and a smart use of available technologies. Some companies have even adopted the technology calling it “GPS Dating” for singles on the dating scene and help a person find someone local to them whenever and wherever. These same sites have photos and descriptions of the person which makes it that much easier to “find” the person. I did a spot on Good Morning…

Dating Security

Should Background Checks Be Required for Dating Sites?

…el” them. Intuition often plays a role in making effective decisions. Online dating sites argue that people should use their common sense. They further note that not all checks are completely accurate. But the fact is online dating sites are selling a lot more than an opportunity to connect. By default they give the people who sign on a level of legitimacy. There is an intended level of credibility granted to all who post their profile. These…

Auditioning For The Bachelorette

…n they do a blood and urine test for drugs and alcohol and sexually transmitted diseases. And finally a psychologist interviews you. I have a whole new respect for trash TV. Robert Siciliano is a Personal Security Expert and Adviser to Intelius.com . For more information see Intelius at Date Check to reduce your chances of encountering a bad guy. See him discussing dating security on E! True Hollywood Stories. (Disclosures)…

Sex Offenders and Predators and Criminals Oh My!

…vulnerable. Either way, my goal is to empower the reader and provide them with options and solutions so they don’t end up a victim. Going forward you will see numerous posts on sex offenders, who they are and where they are, dating in all its forms and how to protect yourself, criminals in our society and who they have access to and how to protect yourself from them. This will be a constant beating of the drum that at times may be repetitive,…

Summer Heat: On-line Dating Scams PT II

After my recent post Summer Heat: On-line Dating Scams a reader responded with the following: “I just had a similar experience that you described in your blog “Summer Heat: On-line Dating Scams”. I had joined Plenty of Fish and upgraded my profile to have more exposure. I received an email from “exquisitedaddy” a few weeks ago. We started sending emails back and forth. Then he asked me to IM on Yahoo Messenger. His IM email address…

School volunteers face background checks

…adult is positioned to work alongside children in any capacity it is essential that adult is fully checked to determine any prior history of wrong doing that may affect the safety and security of a child. Robert Siciliano is a Personal Security Expert and Adviser to Intelius.com. For more information see Intelius background checks to learn more. See him discussing Dating Security on E! True Hollywood Stories. (Disclosures)…

2004-2005 Press Releases

…uly 11, 2005: Battle over stun guns plays pivotal role in setting stage for general acceptance, says president of StunGun.com July 11, 2005: Leading Privacy and Safety Advocate Encourages Reality Television’s Upcoming Online Dating Documentary To Address Dating Safety June 23, 2005: Civilian ownership of stun guns warrants fewer safety measures than firearm use, according to the president of StunGun.com June 21, 2005: The jeopardizing of 40…

Chicago: Homicides up, Citywide Crime Down 5.8 Percent

Thanks to Al Capone the infamous gangster, The Windy City has long been known for organized crime dating back to the 30’ s. In concentrat ed areas like big cities, crime is often a factor. But as proven in New York City, effective policing can reduce crime. Chicago seems to be making positive strides in managing its crime climate as well. Law enforcement in Chicago just announced t here was an 11. 2 percent drop in violent offenses and 4.2…

Summer Heat: Online Dating Scams

…like,my,profile . She wasn’t really a she, But a he , probably named Zambabooboo . After communicating with “her” for 2 days she was talking love and marriage. After 4 days she wanted desperately to see me. On the 7 th day she asked me for money for a plane ticket so she could come see me. I declined. R obert Siciliano is a Personal Security Expert and Adviser to Intelius.com . See him discussing Safe Personal Dating on Tyra . For more…

Online Dating Liar Liar is 5’4, not 5’10

…lady he was about to meet via chatting in an online dating service cared as well. Maybe she did, maybe she didn’t. Either way he started out in the relationship lying. Many single people have been turning to the Internet for dating services. You can meet someone with the same interests, hobbies, and lifestyle. Dating services allow you to browse profile pages to shop for a potential mate while chatting it up with potential dates. In the process…

Published Articles

…2009 Jason Truxel says his father, Michael, committed identity theft, racking up debts in his name) http://www.pantagraph.com/news/article_a20f2316-7619-11de-b6dd-001cc4c03286.html http://singlemindedwomen.com/2009/07/online-dating-for-single-women-are-you-safe/ (authored July 2009 Online Dating for Single Women: Are You Safe?) http://www.sun-sentinel.com/news/local/breakingnews/sfl-wexler-target-073009,0,1285685.story (quoted July 2009 Rep….

Rape Prevention

…to lure you in with false affection, with the goal of gaining your trust, and eventually, your money.” When seeking friends Protect Yourself from Online Dating Scams $200 million: The amount people were ripped off by online dating scams in a year. DUI: dating while under the influence…of the quest for love…is costly to countless people. A nytimes.com article notes that this quest impairs judgment, making it easy for con artists to bilk lonely…

The Quality of Ones Life Rests on Effective Communication Skills

…to Create Product that Builds your Brand PR/RX: A Foolproof Prescription for a Healthy PR Plan Pop! Your Business, Brand Book and Speaking Career! The Art of Being Fabulous: Make a Powerful First Impression with Clients The Dating Game, Speaker Edition: Do you Have What it Takes to Get Booked Social Media for the Aspiring Speaker Get your Book Published This Year! This is No Time to Be Shy: How to Reach Out And Build Relationships PR and…

Safety and Security on College Campuses

…e. But things can go wrong too. The stresses of college life can lead to violence at times. Additionally, college students are sometimes targeted by locals who know the students are in an unfamiliar environment. Then there’s dating violence, stalking, and way too much alcohol and sometimes drugs involved. Another security issue here is that learning institutions are generally “open” and inviting opposed to locked down and secure. Not doing your…

My Identity Thief Loves Me (PTI)

…Much of my “research” or “antics” as some would call it is prompted by my desire to learn more about the scumbags of society or predators that prey on other people. My research has taken me down a dark seedy road into online dating scams, where some people are at their most emotionally vulnerable. The predators work a form of 419/advanced fee scam that always involved a money wire transfer. There is something about people with antisocial…

My Identity Thief Loves Me (PTII)

…30;.wish i was there to keep your accompany….i’m also single,nerver maried with no kids..i love kids though,and i hope to have some with the right man someday..So tell me since when you’ve been doing online dating and how many woman have you meet online lately?what kind of relationship are you looking foir? Kathline 1/20/10 Me: No kids! Thats OK. Ive been doing the online dating thing for about 6 months. I just got a computer…

New iPhone App Helps Vet a Potential Mate

…general information that helps you to determine if they are truthful or lying about assets. “Living Situation” finds other people living at the same address. So if he’s one of the majority of married men subscribed to online dating services and he tells you he is single, you can call his bluff. “Interests” scans social networks and other references. It’s always a good idea to check the social media sites a person is connected to. If you discover…

10 Tips to Safety and Security in Online Matchmaking

…at there are many more ways for the bad guy to snare their victims. Studies show online dating and matchmaking services in general are growing even in a recession. Many single men and women are logging in and attending speed dating sessions more than ever before. There are a couple of reasons for the increase in online dating. One, it is cheaper to join a service than it is to spend all kinds of money on a dinner and a bad blind date. Second,…

mCrime; Hacking Mobile Phones for Identity Theft

…oom and bust occurred. Then, as e-commerce picked up speed, high speed and broadband connections made it easier to shop and bank online, quickly and efficiently. Around 2003, social networking was born, in the form of online dating services and Friendster. PCs became integral to our fiscal and social lives. We funneled all our personal and financial information onto our computers, and spent more and more of our time on the Internet. And the…

Unlucky in Love? Feb. 13th is Your Lucky Day!

…nd the relationship you deserve, including: where and how to meet better men, 5 easy tips to chat up any stranger, what you may be doing to make yourself a magnet for losers, little-known secrets to dramatically improve your dating odds, and the one simple thing you can do in the bedroom to make a man speed up his marriage proposal. (It’s not what you think!) For today only, you can get an online goodie bag worth $800 when you purchase How…

Personal Security and Identity Theft Expert on E! THS Investigates: Dating Nightmares

…Robert Siciliano www.IDTheftSecurity.com featured on link; E! THS Investigates: Dating Nightmares True Hollywood Stories Investigates probes the dark side of dating in all its forms – the cyber hook-ups, sexual secrets, swindling suitors, psychopathic Prince Charmings, and deranged stalkers. Thursday, Feb 5 5:00 pm eastern Roberts Internet Movie Database resume Here and Here…

Personal Security and Identity Theft Expert Speaker to Appear on E! Network’s ‘True Hollywood Stories Investigates’

…ingle in the dating game,” said Siciliano. “While singles have far more options than ever before to meet their match, the new ways of finding that special someone are also fraught with dangers. Anyone who’s dating, especially women and those who are dating online, must educate themselves.” Member of the Bank Fraud & IT Security Report‘s editorial board, Siciliano leads Fortune 500 companies and their clients…

Identity Theft Expert and Speaker on Personal Security: News Media Chronicles Robert Siciliano’s Disagreement with Policymakers on REAL ID Act

…il to understand that privacy is an illusion.” Security breaches in the first quarter of 2008 compromised about 8.3 million unique data records, an April 9th news release from the Identity Theft Resource Center stated. Dating back three years, Siciliano’s views on a revamped national identification system, which he has said would greatly hamper identity thieves’ ability to capitalize on the preponderance of data breaches, have…

Identity Theft Expert and Speaker on Personal Security Says Any Laptop Computer Theft Must Also Be Treated as a Breach of Data

…loan borrowers. • On July 11, the University of Minnesota’s newspaper, The Minnesota Daily, reported the theft of a political science professor’s laptop computer containing information on students of her classes dating back to fall 2005. According to the article, the laptop was in a locked car at the time of burglary. • On June 25, the Associated Press reported on the May 30th theft of a laptop computer belonging to the Ohio Bureau…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in