Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

P2P Peer to Peer Scams

What is a Remote Administration Tool (RAT)?

…on how you can avoid a RAT. Be careful what links you click and what you download. Often times RATs are installed unknowingly by you after you’ve opened an email attachment or visited an software in the background. Beware of P2P file-sharing. Not only is a lot the content in these files pirated, criminals love to sneak in a few malware surprises in there too. Use comprehensive security software on all your devices. Make sure you install a…

What is a Computer Worm?

…read by tricking Internet users. Mass-mailing worms, for instance, spread via email or instant message (IM). They arrive in message attachments and once you download them the worm silently infects your machine. Peer-to-peer (P2P) networks are another avenue for worms: cybercriminals upload infected files with desirable names to entice users into downloading them. And once you download the file your computer is infected. Once your machine is…

How sharing Files puts You at risk

…ks, such as pirated music etc. creates a hacking risk. The P2P software is a welcome mat to cyber criminals who want to steal information like credit card numbers and information on secret documents. It’s not surprising that P2P software is often in a system that’s been hacked. The solution is to avoid having P2P software installed at all, including on any BYOD devices. You don’t want to be “that” employee. Along the same lines, make sure…

How To Stop Criminal Hackers In Their Tracks

…need to understand that your access point can be used for criminal activity—and to hack your own business, too. So what are criminals looking for? Criminals connect to free Wi-Fi for: Pirating music, movies and software via P2P programs. This criminal activity costs the recording and motion picture industries billions of dollars every year. The Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA)…

What is a Keylogger?

…s are purchased and installed by a jealous spouse or partner, and the use of keyloggers by security services, keyloggers are installed on your system when you open a file attachment that you received via email, text message, P2P networks, instant message or social networks. Keyloggers can also be installed just by you visiting a website if that site is infected. How do you detect a keylogger? Keyloggers are tricky to detect. Some signs that you…

Be Proactive During Cyber Security Awareness Month

…phish email Surfing pornography websites increases your risk, as does frequenting gaming websites hosted in foreign countries. And don’t engage in risky online activities that invite attacks. Downloading pirated content from P2P (peer-to-peer) websites is also risky. Remember, there is no honor among thieves. Make sure to set your antivirus software to update automatically. Use a paid product that provides antivirus, antiphishing, antispyware…

How to Defend your Small Business against Cybercrime

…and passwords the employees use to log in to their online banking accounts. Surfing pornography websites increases your risk, as does frequenting gaming websites hosted in foreign countries. Downloading pirated content from P2P (peer-to-peer) websites is also risky. Computers with old, outdated, or unsupported operating systems are extremely vulnerable to cybercrime. Systems using old or outdated browsers such as IE 5, 6, or older versions of…

P2P Security Concerns for Small Business

…tgage brokers and others discovering P2P software on their networks after personal data was leaked. Blueprints for President Obama’s private helicopters were recently compromised because a Maryland-based defense contractor’s P2P software had leaked them to the wild, wild web. #1 HaveP2P security policies in place not allowing the installation of P2P software on your workplace computers or employee laptops. #2 A quick look at the “All Programs…

Digital Photos Held for Sextortion

…im attempted suicide. The hacks occur when: Users have simple and easy to guess passwords and their accounts are infiltrated Malicious software is installed on the users PCs in a number of ways The computer has Peer to Peer (P2P) file sharing programs that allow anyone to scan the computers hard drive. Here’s the bottom line: If you don’t want the world to ever see it, then do not do it. Because if an ex-boyfriend, ex-husband, ex-girlfriend or…

Botnets Turn Your PC into A Zombie

…f being turned into zombies. Certain user behaviors can also invite attacks. Surfing pornography websites increases your risk, as does frequenting gaming websites hosted in foreign countries. Downloading pirated content from P2P (peer-to-peer) websites is also risky. Remember, there is no honor among thieves. Computers with old, outdated, or unsupported operating systems like Windows 95, 98, and 2000 are extremely vulnerable. Systems using old…

Five Ways Identities Are Stolen Online

…eer file sharing is a fantastic way to leak company and client data to the world. Obama’s helicopter plans, security details, and notes on Congressional depositions have all been leaked on government-controlled computers via P2P. You should set administrative privileges to prevent the installation of P2P software. Social Networking: One of the easiest ways into a company’s networks is through social media. Social networking websites have grown…

P2P File Sharing On College Campuses

…urce files on P2P networks are not being validated, so it’s easy to trick you into downloading a virus or spyware instead of the Justin Beiber video you thought you were getting. The other major issue is the simple fact that P2P programs share your data with all of the other P2P users in cyberspace. Because of this, there is a good chance you might unknowingly share your most precious and private data with the rest of the world. During…

P2P Peer to Peer Scams

100 Million Facebook Profiles Published via P2P

Personal information on 100 million Facebook users has been scraped from the social media site and is being shared and download as a single file via what is called a Bittorrent. BitTorrent is a peer-to-peer (P2P) file sharing protocol used for distributing large amounts of data. Facebook takes on the issue is the data that was scraped wasn’t private at all. To a degree, I agree. The data is being shared through the site, it’s already public….

2007 Press Releases

…courages IT Departments to Secure Their Laptop Computer Fleets with Internet-based GPS September 14, 2007: Identity Theft: Expert and Speaker on Personal Security Says Recent News Underscores Implications of Research Linking P2P Networks to Data Breaches September 10, 2007: Identity Theft Expert: and Speaker on Personal Security Comments on Research into IT Security Professionals’ Attitudes about Security August 29, 2007: Identity Theft: Expert…

Data Breaches Persist In Health Care

…ce and the FTC to help prevent illegal use of peer to peer networks, and in the same letter, asked what the government is doing to protect its citizens. But ultimately, it’s up to you to protect yourself. Don’t install P2P software on your computer. If you aren’t sure whether a family member or employee may have installed P2P software, check for new, unfamiliar applications. A look at your “All Programs Menu” will show nearly every program…

Published Articles

…dipping) http://www.expertclick.com/NewsReleaseWire/default.cfm?Action=ReleaseDetail&ID=22307 (quoted July 17 Identity Theft Protection Expert and One You Security: Recent News Highlights Thieves’ Access to Data on P2P Networks) http://www.pr-usa.net/index.php?option=com_content&task=view&id=120128&Itemid=31 (quoted July 16 Identity Theft Protection Expert and One You Security: News Highlights Unsecure P2P Networks)…

Radio Appearances

…10 WTOP Botnets Audio HERE 03/01/10 Michael Ray Dresser Online Reputation Management Audio HERE 02/26/10 The Rick Dees Top 40 Audio HERE 02/25/10 KNEWS The Mark Christopher Show Audio HERE 01/23/10 Michael Ray Dresser “P2P file sharing risks” Audio HERE 02/22/10 Peter Anthony Holder Audio HERE 02/22/10 KORN Jena O’Connor Audio HERE 02/18/10 FMTalk1011 Allan Handelman Audio HERE 02/15/10 Michael Ray Dresser, Dresser After Dark…

Top 10 Cities for Cyber Crime

…s to PCs that aren’t properly secured, coupled with user behavior that invites attacks. If you are surfing porn all day or gaming on distant websites in foreign countries then you are at a higher risk. Downloading files from P2P sites or seeking software cracks or pirated content is also risky. Remember frat boy , there is no honor among thieves. The Boston Business Journal stated another factor is the Hub’s many unsecured WiFi hotspots — 53.6…

Biggest Botnet Goes Bust

…nd Canadian based corporations , along with the FBI and Spain ’s Guarda Civil took down the Boat after almost 10 months of investigations. The Register reports “ Mariposa (Spanish for butterfly) botnet malware spread through P2P networks, infected USB drives, and via MSN links that directed surfers to infected websites. Once infected by the Mariposa bot client, compromised machines would have various strains of malware installed (advanced…

Assassin or Identity Theft Victims?

…as an App or go to my website and get my FREE ebook on how to protect yourself from the bad guy. 4. Invest in Intelius identity theft protection and prevention. Not all forms of identity theft can be prevented, but identity theft protection services can dramatically reduce your risk. (Disclosures) Robert Siciliano Identity Theft Speaker video hacking P2P getting lots of fun data….

When FTC Sends a Warning, Data Theft Has Jumped the Shark

…tgage brokers and others discovering P2P software on their networks after personal data was leaked. Blueprints for President Obama’s private helicopters were recently compromised because a Maryland-based defense contractor’s P2P software had leaked them to the wild, wild web. Don’t install P2P software on your computer. If you aren’t sure whether a family member or employee has installed P2P software, check to see whether anything unfamiliar has…

10 Business Identity Theft Risks in 2010

…(P2P) file sharing is a fantastic way to leak company and client data to the world. Obamas helicopter plans, security details and notes on congress members being deposed were all leaked on government controlled computers via P2P. Setting admin privileges and installing numerous technologies that will prevent P2P is essential. Identity theft will get worse before it gets better. And whether it’s your identity, your families or your employee’s…

Sponsored Broadcast Radio

…10 WTOP Botnets Audio HERE 03.01.10 Michael Ray Dresser Online Reputation Management Audio HERE 02.26.10 The Rick Dees Top 40 Audio HERE 02.25.10 KNEWS The Mark Christopher Show Audio HERE 01.23.10 Michael Ray Dresser “P2P file sharing risks” Audio HERE 02.22.10 Peter Anthony Holder Audio HERE 02.22.10 KORN Jena O’Connor Audio HERE 02.18.10 FMTalk1011 Allan Handelman Audio HERE 02.15.10 Michael Ray Dresser, Dresser After Dark…

Congress Breached via P2P Filesharing…AGAIN!

…sensitive data was leaked. Savvy users lock down their file sharing software to prevent others from tooling around with their settings. If your IT abilities are scant, you should take the following precautions: Don’t install P2P software on your computer. If you aren’t sure whether a family member or employee has installed P2P software, check to see whether anything unfamiliar has been installed. A look at your “All Programs Menu” will show…

Government Tries to Thwart P2P Identity Theft

…ristmas lists, love letters, private photos and videos (naughty ones, too) and just about anything else that can be saved as a digital file. Information on a U.S. Secret Service detail for the First Family was discovered via P2P. Even if P2P were made illegal, P2P file sharing is a wild animal that can’t be tamed. There are already millions of P2P programs in circulation that can easily be set up inappropriately, and plenty of developers flying…

Identity Theft Is Easy Over P2P

…heir data with the world. The reporter asked me how much personal information I could find on the P2P network in five minutes. I responded, “Let’s do it in one minute.” There are millions of PCs loaded with P2P software, and parents are usually clueless about the exposure of their data. P2P offers a path of least resistance into a person’s computer, so be smart and make sure you aren’t opening a door to identity…

p2p-image1

p2p-image

P2P on Your PC Equals Identity Theft

…ight and Government Reform sent letters to the Attorney General and FTC Chairman, asking what the Department of Justice is doing to prevent the illegal use of P2P. Which is kind of ridiculous, because it’s not illegal to use P2P programs. Even if it were made illegal, P2P file sharing is a wild animal that can’t be tamed. The letter also asks what the government is doing to protect its citizens. Okay. I’ve sat with both the FTC and the DoJ….

Conficker flexes muscles, phones home

…rt Robert Siciliano The internets number one virus Conficker, called home and sent its next set of updates to its global botnet. Conficker’s botnet, which includes anywhere from 3 to 15 million PCs, has a peer to peer (P2P) feature that allows each PC on the network to talk to one another. Each PC has the ability to become the command server. This characteristic allows Conficker to fluidly update each PC on the network. The latest variant…

Identity Theft Expert; Are Legitimate Sites the Next Malware Threat?

…hackers the path of least resistance inside the walls of SMBs and large enterprise networks. Most of us are privy to fundamentals such as not opening attachments, updating anti-virus, securing wireless connections, avoiding P2P downloads and not spending any time in the bowels of the web. Where many fail is routinely updating whats is outdated or flawed. Further, attention is often paid to functionality and to build-out of an application during…

Identity Theft Protection Expert and One You Security: Recent News Highlights Susceptibility of Data Exposed to Peer-to-Peer Networks

…, widely televised and quoted identity theft protection expert and chief security analyst for One You Security, LLC, who urged organizations to limit their computer users’ access to file-sharing networks, also known as P2P or peer-to-peer networks. Siciliano further encouraged firms of all kinds to introduce employees to One You Security, a firm whose focus is to render Social Security numbers unusable to thieves who want to steal…

CEO "Identity Theft Expert"?? ID compromised 90 times

The press has recently taken issue with CEO of an identity theft prevention company who has given his SSN out for all the world to see. His identity theft protection service is designed to protect the consumer from identity theft. Because he used the marketing gimmick to drive sales, it has resulted in a never ending battle where identity thieves and others are using his ID to prove a point, that giving out your SSN is never a good idea. His…

Identity Theft Expert and Speaker on Personal Security Says Recent News Underscores Implications of Research Linking P2P Networks to Data Breaches

…es. The arrest underscored the implications of research from Dartmouth University’s Tuck School of Business. The findings, reported earlier this year, suggesting that corporate data breaches trace back to peer-to-peer (P2P) network usage by employees. According to the study, the number of P2P users, already at 4 million in 2003, had more than doubled at the time the report was published, May 2007. The researchers said efforts by officials…

Identity Theft: P2P Networks Invite Online Thieves—Identity Theft Expert and Speaker on Personal Security

…from Dartmouth University’s Tuck School of Business released findings on May 15 suggesting that corporate data breaches trace back to peer-to-peer (P2P) network usage by employees. According to the study, the number of P2P users, already at 4 million in 2003, has more than doubled since. Furthermore, the researchers said efforts by officials to surveil, monitor, and dissuade the use of P2P networks in the workplace have failed to keep pace…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in