Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO, CEO of www.IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Advisory Boards

Social Media Identity Theft

6 Ways to prevent Social Engineering Attacks

…ve dashboards that show where you’re logged in and what tools or apps are connected. This includes financial and social media accounts. Beware of emails coming from anyone, for any reason that require you to click links for any reason. Social engineering via email is one of the true successful ways to con someone. Just be ridiculously aware. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing  identity theft preven…

Robert Siciliano Joins Identity Theft Resource Center Board of Directors

…provides victim assistance and consumer education through its toll-free call center, website and highly visible social media efforts. It is the mission of the ITRC to: provide best-in-class victim assistance at no charge to consumers throughout the United States; educate consumers, corporations, government agencies, and other organizations on best practices for fraud and identity theft detection, reduction and mitigation; and, serve as a relevan…

8 Ways to bullet proof your Social Accounts

…vice, then pose as you in your Facebook account. #2 Log out. Setting your device to automatically get you onto a social media site eliminates the hassle of having to enter your username and password every time you want to visit the site. However, if the wrong person gets ahold of your computer, mobile or tablet, that person can easily get into your social media accounts. Log out. #3 Remove apps you don’t use. If your accounts like Facebook and Tw…

Spring Clean Your Online Reputation

…tings. Job seekers and upcoming college graduates take note: Difficulty getting or keeping a job due to negative social media content is a reality. I assure you anything on your social media profile that makes you look less than desirable as an employee, even an innocuous comment such as, “I always have trouble being on time,” can kill your chances at getting that dream job. Tips on how you (the job seeker) can make your online profile look good:…

10 Tips to Protect Yourself on Social Networks

…d check them regularly in case there are any changes. Be aware of the fact that the information you share on one social network may be linked to another: For instance, a photo you post to Twitter may automatically post to your Facebook profile. Don’t reveal personal information: Be suspicious of anyone who asks for your personal information online and never share your home address, phone number, Social Security number, or other personal identifyi…

What is Social Engineering?

No, it’s not some new engineering field to develop social media sites. Social engineering has been around as long as the con artist has been around. The terms stems from the social science world where social engineering is deemed as an act of psychological manipulation. In our tech-laden world of today, social engineering still involves deceit but it’s used to deceive you into giving up personal or sensitive information for the bad guys’ financi…

15 Small-Business Social Network Nightmares

You may think you’ve guarded your company, but are your social media outlets unprotected? Look at these 15 potential weaknesses in your defense. Can you think of five social network nightmares you hope never happen to your business? How about 10? Well, I can top that, because there are at least 15 social network mishaps that can haunt a business owner. Here’s a closer look at 15 types of trouble you can encounter on Facebook, Twitter…

Dear Colleagues, Clients, Friends, Family, Media and all others

This week (April 15) marks one year since the rampage in Boston. This Monday April 21st I am running my 3rd Boston Marathon with 38,000 other people and I’m doing it in the spirit of Gratitude and Grace for Boston Childrens Hospital charity. Shortly after the bombings, evacuating the city, carrying my 40lb child after running 26 miles. Hurt, angered, saddened and grateful to get to my family. Many of you have already very generously donat…

7 Social Media Security Tips To Protect Your Business

…life could open your business to some serious dangers. Many small businesses recognize the benefits of having a social media presence for customer service and long-term marketing purposes. However, many are slow to recognize social media’s security issues and how employees’ own social presence can add to the company’s security issues. Some companies restrict internal access. Others may prevent employees from having any corporate asso…

The Definitive Guide to Facebook Security

Social media is permeating every facet of our lives. It is extremely important to understand security and privacy settings with so much personal information becoming so accessible. Here is the definitive guide to security on Facebook: Step One Logging In Social Authentication: Facebook uses social authentication to verify your account. This system asks you to identify your friends based on pictures. This is information that makes it incredibly…

7 Small Business Social Media Risks

Many executives are concerned about social media related risks (e.g., data security and ID theft), but far fewer actually have any social media training. A recent survey of executives puts the concerns into four categories: disclosure of confidential information; damaged brand reputation; ID theft; and legal and compliance violations. Another feature that the survey unveiled was that 71 percent of the participants believed that their company was…

IT Guys get duped Pretty Girl on Social Media

…h them, making the assault more difficult to detect. Recap: The scam began from the ground up, inflating Emily’s social network till it enabled the attack team to suck in security personnel and executives. Most of the people who assisted Emily were men. A similar experiment using a fake male profile had no success. Preventing getting suckered into Social Media Scams For agencies and other organizations, social engineering awareness training is c…

Oversharing on Social Media Common Amongst 50+

Thanks to social media, societal norms have undergone a seismic shift in the past five years. What was once considered private or even taboo is not only fair game, it’s expected. But this can have serious consequences from the ending of friendships to exposure to physical harm. I’ve talked about the concept of TMI or too much information and how social networking and mobile devices have made sharing so much easier and faster than ever before. Bu…

7 Tips to avoid ‘deadly’ social media

The vacant 5,000 square foot house next door to this kicking victim was on sale, and he had agreed with the realtor to keep an eye on it. Some kids got wind of this vacancy and put out a Facebook invitation to a Halloween rave party there. He called 9-1-1 and the police broke up the party. However, kids kept arriving because the Facebook notice was still up. A mob of perhaps 60 kids was brewing at the end of the street. The victim-to-be began ch…

Socint: disseminating cybercrime through social intelligence

…uch deeper than that. NextGov.com reports, “Criminals, organized crime syndicates, gangs and terrorists also use social media. They post information and share photos and videos, and terrorist groups use the tools to recruit new members, disseminate propaganda and solicit funds.” It seems the next stage to investigate and prevent crime is through social intelligence combined with social analytics, hence “Socint”. Continues NextGov.com: “Officials…

Identity Thieves Go After the Deceased

…pens partly because of the availability of public records coupled with the time it takes for credit bureaus, the Social Security Administration, financial institutions and others to process a deceased person’s Social Security number (SSN) in their systems and close all current and future lines of credit. Many states’ vital statistics registries include Social Security numbers in their records and on their certified death certificates. Because the…

Social Media A Big Risk To Banks

…e existing security technologies help protect the consumer and bank from human error like downloading a virus or social engineering tricks like clicking an infected link and alert us to a phish email. But no technology or even security or privacy policy can prevent someone from exposing all their life’s details on a social media site. When criminals target an organization like a bank they start by looking for vulnerabilities in the network infras…

Why Your Employer Needs Social in the Workplace

Social media is the fifth form of mainstream media. It encompasses all media, making it the king of all media. At this point, most people know how to use social media and how to navigate the various websites. But many employers are still on the fence. Hootsuites’ CEO says, “The world’s top brands—like Pepsi, Virgin, NHL and American Express—[are] now embracing [social media] company-wide.” MarketingDonut reports, “One of the simplest ways to con…

2013 Boston Marathon: My Best Worst Day Ever

…essional, but she was real. She put me at ease and we got through the interview. Since then I’ve done more media on this than I wished, including the Boston Globe,  Dr Drew, Extra, Current TV, Canadian TV, again and again, Fox Boston and some radio. In early May after the blasts I was asked to speak to the North Eastern Massachusetts  Law Enforcement Council on the benefits of social media to law enforcement and how social can help get the…

The Social Media Identity Theft of a School Director Via Twitter

…gh School. A few years ago this would have been looked upon as a victimless prank. But times have changed and as social media sites like Twitter, Facebook, LinkedIn and others have morphed into much more than just recreational websites, it’s not just unacceptable; it’s a crime. The Twitter account was created with the name and photo of Dr. Jubal Yennie, director of the Sullivan County school district. The account has since been delete…

Social Media Security in the Workplace

…llied Commander Europe (SACEUR) Admiral James Stavridis NATO’s most senior military official. It is believed the social media account in his name was “attempt to trick colleagues, friends and family into giving away his personal secrets on the social network” These cyber-attacks on social media are often used to gather intelligence to crack a password or to gain insight to knowledge based questions or challenge questions. For example: What’s you…

Social Media Security Risks for Small Business

…s help protect consumers, banks and small businesses from human errors like accidentally downloading a virus, or social engineering tricks designed to fool targets into clicking infected links, by warning users about potentially dangerous webpages and phishing emails. But no computer security technology or privacy policy can prevent people and employees from exposing all their lives’ details on social media websites. When internet criminals targe…

70% of Teens Hide Online Activities from Parents—Why We Should be Concerned

…10% of 13-17 year olds are meeting strangers online then actually meeting them in the real world. I doubt before social media there were as many teenage girls meeting 30-year old men on the street and then getting in his car. But with the Internet these “friends” can seduce teens girls via text or social networking sites and fill her emotional needs until he’s “got her.” Are you really aware what this hidden behavior and lying is concealing? From…

50 Million Fake Facebook Accounts

Just about anyone can set up a fake account on just about any website. Facebook and other social media sites are popular targets due to the amount of traffic they get and the variety of scams that can be perpetrated against legitimate users. Facebook estimates that as of December 31, 2011, false or duplicate accounts represented approximately 5-6% of monthly active users, but also stated, “This estimate is based on an internal review of a limite…

I’m Running the Boston Marathon Monday April 16th

Hello Friends, Colleagues, Clients, Media, Readers and all those who we’ve ever come in contact with: The following is one sentence of business updates AND THEN more importantly, Robert’s running the Boston Marathon next week, Monday April 16th for Children’s Hospital Boston. Sick kids need your help. Quick Biz: Robert was in Time Magazine http://ow.ly/adxbp in March, VERY FUNNY. Also, his YouTube page http://ow.ly/adx0t has ov…

What Happens to Your Profile After You Die?

…t your Facebook page? Probably not. But your loved ones more than likely would. Things like email, websites, and social media profiles are considered “digital assets,” which may have some monetary value, but for the most part offer sentimental value to the family of the deceased. I went to high school with a darling young woman who passed away at far too young an age. Her Facebook page sees a lot of activity. Not a day goes by that someone doesn’…

How safe is my identity? What are the latest threats? How do I protect myself?

…ing a data breach notification were 9.5 times more likely to become a victim of identify fraud. Javelin examined social media and mobile phone behaviors and identified certain social and mobile behaviors that had higher incidence rates of fraud than all consumers. LinkedIn, Google+, Twitter and Facebook users had the highest incidence of fraud. Consumers are still sharing a significant amount of personal information frequently used to authenticat…

Social Media Security Tips for Small Business

Corporations know there are long-term marketing benefits of social media and they also know the security issues with employees continue to be a problem. Many companies restrict internal access. Others prevent employees from discussing or mentioning the company in social media during private time. Follow these social media security tips for small business to prevent security issues: #1 Implement policies. Social media is a great platform for conn…

Ghosting Identity Theft Scams

…ccounts are opened under names and identities that have been entirely fabricated when thieves easily create fake Social Security numbers. Here’s how it works. Our system of credit requires a Social Security number as the first and foremost identifier. Lenders issue credit based entirely or almost entirely on the history associated with an applicant’s Social Security number. When a creditor issues credit based on these invented numbers and reports…

Holiday Phishers Use Social Media

Every social media website in existence depends on advertising for its survival, to some extent. Criminals exploit this by mimicking these familiar platforms when sending millions of phishing emails designed to entice users into clicking malicious links or visiting spoofed websites that resemble legitimate social media. They also create pages within popular social media that are infected with malware, or malicious links designed to infect the PC…

Social Security Number: All-Purpose Identifier

Your Social Security number was never meant to serve the various functions it is used for today. Over the past 70 years, the Social Security number has become our de facto national ID. The numbers were originally issued in the 1930s, to track income for Social Security benefits. But “functionality creep,” which occurs when an item, process, or procedure ends up serving a purpose it was never intended to perform, soon took effect. Banks, motor ve…

Social Web Loaded With Profile Misrepresentation

Social fakes” are invented profiles on social media (often referred to as profile misrepresentation), which can be used to harass or mock victims anonymously. But the more lucrative fake profile is one that imitates a legitimate business, damaging that business’s online reputation. The imposters’ ultimate goal? Spam leading to scams. Social-web security provider Impermium published the results of their recent analysis of the cost of social spa…

Bill Would Remove Social Security Numbers From Medicare Cards

The most basic advice for protecting your own identity is to protect your Social Security number. The obvious solution is simply never to disclose your number, but this is silly, since, depending on your age, you have probably provided it to hundreds of people, on hundreds of forms. It now sits in hundreds of databases, accessible to thousands, and possibly even available for sale. 40 million Medicare subscribers currently have their Social Secu…

Device Intelligence Helps Stop Scammers Targeting Social Media Sites

…oney wire transfer (red flag). All told, she sent the scammer at least $15,000 during their relationship. Sadly, social media sites can do more to protect their users, and should take advantage of information that readily exists for them to use — the known reputations on over 650 million devices in iovation’s device reputation knowledge base. Computers that are new to these social networks dealing with scammers and spammers are rarely new t…

15 Social Media Security Tips

1. Realize that you can become a victim at any time. Not a day goes by when we don’t hear about a new hack. With 55,000 new pieces of malware a day, security never sleeps. 2. Think before you post. Status updates, photos, and comments can reveal more about you than you intended to disclose. You could end up feeling like some silly politician as you struggle to explain yourself. 3. Nothing good comes from filling out a “25 Most Amazing Things Abo…

Social Networking Security Awareness

One in five online consumers has been a victim of cybercrime in the past two years. Social networking is a direct link to the problem. While social networks allow you to keep in touch with family and friends, there are issues to be concerned about. Most concerns revolve around online reputation management, identity theft, or physical security issues. Social networking creates a risk of posting content that will be damaging to yourself, your prof…

Your “Status” is Important to Others

People have always paid attention to your status. Now they do it on social media. Status is your “standing” in society. It could mean whether you are married, employed, rich, poor, saving the world, up to no good, home or not. Status in terms of home security begins with your whereabouts. By now we should all know posting your whereabouts (or where you aren’t) can be an invitation for criminals to break into your home while you are gone. It’s si…

Judge Says Its OK to Post Social Security Numbers Online

…cords by federal agencies. Over the years, many have interpreted this law to allow public information, including Social Security numbers, to be posted online. I’ve seen Social Security numbers for Jeb Bush, Colin Powell, former CIA Director Porter Goss, Troy Aiken, and Donald Trump, all published on the Internet. Ostergren so embarrassed the Virginia lawmakers that they passed a law known by some as the “anti-B.J. law,” prohibiting her from doing…

Prankster Creates and Kills Fake Social Media Profiles

This is just weird, but what about social media isn’t weird? We “friend” people we’ve never met. We share our plans, location, and mother’s maiden name with the world. In New Zealand, weird can be defined as a 28-year-old Auckland woman who created and used several fake online profiles depicting young, pretty women to befriend unsuspecting high school boys. I can definitely see my 16-year-old self falling for this. Sometimes, after creating a…

Teacher Bit by Social Media Identity Theft on Twitter

…can quickly and easily damage your reputation. Online Security Tips: Right now grab your name on all the popular social media sites. Sign up for every one of them even if you don’t intend on using them. If your name is gone use a hyphen or a dash. For free search over 500 popular social networks and over 200 domain names to instantly secure your brand across the social web at Knowem.com. Set up Google Alerts to determine of your name is being use…

Predators Using Social Media to Stalk Kids

…violent and the victims much younger.  We are even seeing infants being sexually abused.” With the openness of social media, predators know what a kid likes, doesn’t like, who their friends are, and often their phone numbers, where they live, go to school, sports teams they play on etc. The list goes on and on. Many of today’s social media sites are also incorporating location based services which allow the user to broadcast their location via…

Phishers Using Holidays and Social Media to Target

Recent reports of “The Oak Ridge National Laboratory, home to one of the world’s most powerful supercomputers, has been forced to shut down its email systems and all Internet access for employees since late last Friday, following a sophisticated cyberattack.” The sophisticated cyber attack was reported to be the lowly unsophisticated phishing email. Phishing is emerging as sophisticated due to ways in which the phish emails are disguised to look…

Lawmakers Push To Shield Last 4 Social Security Numbers

Most of us have become accustomed to giving out the last four digits of our Social Security numbers. But this customary request is becoming increasingly problematic, and two Rhode Island lawmakers are responding by pushing legislation to stop businesses from asking for the last four digits of customers’ Social Security numbers. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, incl…

Twitter Scam Hooks Thousands

…ed sites, where users will be prompted to enter login credentials, putting themselves at risk of identity theft. Social media sites could go a long way in protecting their users by incorporating device reputation management. Rather than accepting information provided by an anonymous user, device reputation allows social sites to leverage knowledge about a device’s history—which could include spam, phishing attempts, predatory behavior, prof…

Search Engine Doesn’t Need Kids SSN

…hed Doodle-4-Google, in which children can compete to design Google’s homepage logo, they requested contestants’ Social Security numbers in an effort to prevent duplicate entries. Americans have become accustomed to handing over the last four digits of their Social Security number as a password or identifier for various accounts and applications. But with the development of new technologies that have cracked the code for the distribution of Socia…

5 Gotta Have Social Media Apps

…rage. I spend more time on my apps than I do making calls. That time spent is often with those I connect with on social media. Twitter and Facebook are the major players in social media and applications for them are a plenty. TweetDeck FREE. TweetDeck is your mobile browser for staying in touch with what’s happening now on Twitter from your iPhone or iPod Touch. TweetDeck shows you everything you want to see at once, so you can stay organized and…

10 Social Media Security Considerations

Social media security issues involve identity theft, brand hijacking, privacy issues, online reputation management, and users’ physical security. Social media provides opportunities for criminals to “friend” their potential victims, creating a false sense of trust they can use against their victims through phishing or other scams. Register your full name on the most trafficked social media sites, and do the same for your spouse and kids. If your…

Social Security Numbers Easily Cracked

It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, using information from social networking sites, data brokers, voter registration lists, online white pages, and the publicly available Social Security Administration’s Death Master File. Original…

10 Types of Criminal Social Media Impersonators

Social media is the fifth form of mainstream media. At this point, most people know how to use social media, and how to navigate the various websites. But what most users don’t yet realize is how social media can be used against them. Social media identity theft occurs for a number of reasons. 1.    An online impersonator may attempt to steal your clients or potential clients. 2.    Impersonators may squat on your name or brand, hoping to profit…

Cool Tools To Access Files Remotely

…o a server. Once you’ve downloaded and installed Orb, you can use any Internet-connected device with a streaming media player (mobile phone, PDA, laptop) to log into mycast.orb.com and access all your digital media, anywhere, anytime. Orb is also compatible with the Wii, PS3, and Xbox, so you can enjoy your media on your television screen as well! While Orb is heavily focused on delivering digital media, it works with documents as well. If you’re…

Managing A Digital Life: Teachers Friending Kids

…nvolving reading, writing, arithmetic, and so on. This is and has always been a professional relationship, not a social one. Social media facilitates a social relationship. Call me “old school,” but it doesn’t seem right for students and teachers to connect in this way. Robert Siciliano, personal security expert contributor to Just Ask Gemalto, discusses child predators online on Fox News. Disclosures…

Man Arrested For Stealing 15,000 Social Security Numbers

Now more than ever, criminal hackers are hacking into databases that contain Social Security numbers and using the numbers to open new financial accounts. Criminals use stolen Social Security numbers to obtain mobile phones, credit cards, and even bank loans. Some victims whose Social Security numbers fell into the hands of identity thieves have even had their mortgages refinanced and their equity stripped. WTEN.com reports an arrest has been ma…

Typosquatting Scams in Social Media

Typosquatting, or URL hijacking, is a form of cybersquatting that targets Internet users who accidentally type a website address into their web browser incorrectly. When users make a typographical error while entering the website address, they may be led to an alternative website owned by a cybersquatter or criminal hacker. In a new twist, some typosquatters have begun using these domains to advertise deceptive promotions, offering gift cards or…

Twitter Crime on the Rise

…t Obama, Britney Spears, Fox News and others have been taken over and used to ridicule, harass, or commit fraud. Social Media Identity Theft: Hundreds of imposter accounts are set up every day. Sarah Palin, St. Louis Cardinals Coach Tony LaRussa, Kanye West, The Huffington Post, and many others have been impersonated by fake Twitter accounts opened in their names. Worms: Twitter is sometimes plagued by worms, which spread messages encouraging use…

Using Social Media Passwords With Critical Accounts

For some social networking sites, security is not a top priority. Some do not protect your data with the same vigilance you could expect from your bank, for example. Nor do social media require strong passwords. And if you use the same passwords for more critical sites, like webmail or online banking, having your social networking account compromised can make those other accounts vulnerable as well. Last year, 32 million passwords were posted on…

Americans Waking Up to Social Media Privacy

There have been thousands of privacy related news reports over the past year depicting social networks, Google, marketers and advertisers as evil privacy violators who are slowly sucking dry whatever privacy we have left. Facebook has been raked over the coals by advocates and watchdogs who say their tactics violate their own policies. In response, numerous lawsuits have been filed and government agencies have put the pressure on everyone involv…

Google Assembles “Best Of” Family Safety Center

…the Web for parents, teens, educators – everyone engaged and interested in youth safety on the fixed and mobile social Web. In addition to safety tips, advice, and youth-tech news, ConnectSafely provides a discussion forum for all stakeholders on safe, active engagement in participatory media and culture. Common Sense Media is a favorite of mine and is an independent nonprofit organization committed to providing kids and families with the trustw…

Colorado Supreme Court: Using a Stolen Social Security Number is Not Identity Theft

I feel like my head is going to explode. The Colorado Supreme Court has ruled “that using someone else’s Social Security number is not identity theft as long as you use your own name with it.” The defendant in this particular case had admitted to using a false Social Security number on an application for a car loan, and to find employment. The court ruled that since he had used his real name, and the Social Security number was only one of many p…

15 Facebook Fiascos to Watch Out For

The following 15 activities, all of which are facilitated by Facebook and other social networking websites, are causing lots of heartache and headaches: 1. Posting illegal activities. In the little town where I grew up, 30 kids recently faced the wrath of their parents, school officials, law enforcement, and the Boston media, all because someone posted their party pictures, which depicted underage drinking, on Facebook. It’s never okay to show i…

Leaked Social Security Numbers Put “Personal Security and Safety at Risk”

…ing, but West says he will not accept their money. Meanwhile, in Virginia, a judge has ruled it is legal to post Social Security numbers on websites. Every city, state, and town has its own set of regulations determining the collection and management of public records, including birth, death, marriage, court, property, and business filings. Many of these documents include Social Security numbers. And many are posted on the Internet. The Privacy A…

IRS Fully Reliant on Social Security Numbers

…On the Policy, Practice & Procedures page of their website, the IRS addresses the public’s concern regarding Social Security numbers on checks: “Complete Social Security Numbers (SSN) on Checks or Money Orders Remitted to IRS Issue: Tax Professionals and clients have concerns about taxpayers putting their full SSN on checks remitted to IRS in payment of a balance due. Page 74 of the Form 1040 instructions directs taxpayers to put their full S…

McAfee Reveals the Top Ten Most Dangerous Places to Leave Your Social Security Number

…expert, on behalf of McAfee Cases of identity theft are skyrocketing, and 32% of all ID theft victims had their social security number compromised according to Javelin’s 2010 Identity Fraud Survey Report.  In honor of National Identity Protection week, McAfee set out to reveal the most dangerous places to leave your social security number. When your Social Security number is used to commit fraud, it feels very personal. It can take hundreds of h…

Social Media is a Criminals Playground

Social media has become a playground for adults, teens, and tweens. And like on any playground, when you hit the jungle gym or horseplay on the seesaw, there is always a chance that you may go home with an egg on your forehead. Or, if you are like me, a broken collarbone. Twitter and Facebook have become the most popular sites for frolicking, and the most popular sites for identity thieves — the bullies in the playground. These criminal hackers…

Women Proved “Securest” in the Defcon Social Engineering Game

…ince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out too much information. All five holdouts were women who gave up zero data to the social engineers. Computerworld reports, “Contestants targeted 17 major corporations over the course of the two-day event, including Google, Wal-Mart, Symantec, Cisco Systems, Microsoft, Pepsi, Ford and Coca-Cola….

Police Warn Burglars Are Using Social Networks

The sage advice used to be “don’t tell the world you are on vacation via your outgoing answering machine.” Then we pretty much eliminated answering machines and the advice pertained to voicemail. As we got more technology, the same message was don’t tell the world you are on vacation via your emails auto responder. For a few years now I’ve been warning people about how vulnerable they are when they post their whereabouts in social media. And it…

Seven Social Media Landmines to Watch Out For

…ttle with LedZeppelin.com that I regret, but that’s another story. Today that same battle is being played out in social media. Anyone can register any brand or likeness on social media with very little difficulty, and it’s free. Once the scammer owns your name, they can pose as you, blog as you, and comment as you. The basis of much of this social media identity theft, or “impostering,” revolves around social engineering. When a profile claims to…

What is “Social Registration”?

Social media has evolved into the fifth major form of media: print, radio, television, Internet, social. While social media functions on the Internet, there’s no denying that it is its own platform. It encompasses most forms of media in one tight and neat package. Some social networking sites have more users than number of residents in some countries. In the process of this explosive growth, a few social networking websites like Facebook, Twitt…

Stealing Secrets: Telling Lies Over the Phone

…company employees to voluntarily cough up information they probably shouldn’t have. At the recent Defcon event, social engineers proved that it doesn’t take much more than asking to get the necessary information that may lead to penetrating a person’s computer. Social engineering is a fancier, more technical form of lying. An alternative to traditional hacking, it is the act of manipulating others into performing certain actions or divulging con…

Researcher Proves Your Friend Isn’t Your Friend

…econds, he was provided a place to sit, connection to the Internet, and a 24×7 card access key to the building.” Social media can and is being used as a smokescreen. The idea behind social media is that we are social creatures that thrive in community and want to connect. The problem is that this ideal is based on the mindset that we are all sheep and there are no wolves. When mama told you to not talk to strangers, there was wisdom in that advic…

Social Media Identity Theft

100 Million Facebook Profiles Published via P2P

…reputation down the road. This incident should highlight the lack of privacy and lack of security that exists in social media. Recognize that whatever information you share online, can ultimately end up in anyone’s hands, whether you like it or not. Lock down your privacy settings and be very conscious of what you share. It may bite you someday. Robert Siciliano personal and home security expert to Home Security Source discussing social media Fac…

10 Ways to Prevent Social Media Scams

The trouble with social media revolves around identity theft, brand hijacking and privacy issues.  The opportunity social media creates for criminals is to “friend” their potential victims in order to create a false sense of trust and use that against their victims in phishing or other scams. It was big news when someone had their Facebook account jacked by someone who impersonated the victim, claiming to have lost their wallet in the UK and beg…

Identity Theft – Common Consumer Errors

…. Her real estate license was suspended and her life was turned upside down. Awareness is key: Do you carry your Social Security number or a Social Security card in your wallet? Do you provide this number to anyone who asks for it? The most commonly dispensed advice in response to these questions is: don’t carry the card and don’t give out the number. But in reality, there are many times when you have to use your Social Security number. Because t…

Hackers Play "Social Engineering Capture The Flag" At Defcon

Social engineering is a fancier, more technical form of lying. An alternative to traditional hacking, it is the act of manipulating others into performing certain actions or divulging confidential information. Social engineering or “social penetration” techniques are used to bypass sophisticated and expensive hardware and software in a corporate network. Smart organizations train their employees to identify and resist the more common attempts to…

Study Shows Tweens and Teens are Clueless About Privacy

…bviously reckless, but what she and many don’t understand is that anything digital is repeatable. Many now blame social networks for the erosion of whatever privacy we once had. Social networking sites aren’t inherently bad, but they are self serving entities, promoting transparency that ultimately leads to marketing and advertising dollars. For them it’s all about profit, and it’s to their advantage to gather as much information about you as pos…

Published Articles

…site PleaseRobMe.com re-posts messages, gives location of users; expert says public “in dark” about social media networks) http://www.cbsnews.com/stories/2010/02/26/earlyshow/leisure/gamesgadgetsgizmos/main6246127.shtml (quoted February 2010 Social Media Messages Telling Too Much?) http://sondraroberts.wordpress.com/2010/02/24/excuse-me-can-you-respect-my-privacy/#comment-12 (quoted February 2010 Excuse me, can you respect my priva…

Consulting

…ping strategies to launch new products or sell an existing offering, via targeted messaging in multiple forms of media, as well as search engine optimization. Blogging Today’s consumers are smart, savvy, and resourceful. Capturing their attention and finalizing a sale is more difficult than ever for some, yet easy for those who possess a thorough understanding of the process. Old media is either slowly dying, or adapting to our newly fragmented,…

Social Media Safety/Security: Online Reputation Management

…and Your Companies Online Reputation. Download PDF version Similar Posts from the Security Blog How to prevent social media identity theft Robert Siciliano Identity Theft Expert Two words: you can’t. However, there are several things you can and should do in order to manage your social media identity, which may prevent social media identity theft. What exactly is social media identity theft? It’s a form of cybersquatting using social med…

Media

…ur kids may be responsible for compromising your online security The top 8 twitter hacking techniques The top 10 social media scams The 10 most dangerous celebrities on the internet The top 10 most dangerous places to give put your social security number Robert Siciliano will give your listeners the tools they need to protect themselves and their loved ones against identity theft. Don’t miss out on the opportunity to book this Personal Security…

Your Identity Theft Speaker

…in. When you make your data and identity a tougher target to hit, you render it essentially useless to a thief. Social Media Security: In the social media security program, you will recognize what puts you, your business, your data and your reputation at risk. Learn from others’ mistakes and develop policies to prevent employees, families and even you from saying, doing or posting things that you’ll regret later. Robert will answer all your ques…

Watching Out For Criminal Hacks

…e message. Then your followers and their follower would get it, causing more grief than anything else. Invest in social media protection @ Knowem.com Invest in Intelius identity theft protection and prevention . Not all forms of identity theft can be prevented, but identity theft protection services can dramatically reduce your risk. (Disclosures) Robert Siciliano identity theft speaker discussing social media identity theft on CNN…

Reality Actor Jailed Six Months For Burglarizing Orlando Bloom's Home

…ris Hilton, Lindsey Lohan, Megan Fox and others. Their methods were simple. They tracked their victims by using social media, Facebook and Twitter. They knew when they were home and when they were away. They even used Google Earth to scope out their homes. Police estimated that from October 2008 to August 2009, the “Bling Ring” stole more than $3 million in jewelry and high-end designer brands. A star of the E! show “Pretty Wil…

Want Privacy? On Facebook? Shut Up!

…are or software, anti-virus or critical security patches, make sure you are up to date. Lock down settings. Most social networks have privacy settings that need to be administered to the highest level. Default settings generally leave your networks wide open for attack. Register company name and all your officers at every social media site. You can do this manually or by using a very cost effective service called Knowem.com . Protect your identi…

A Great Way to Ruin an Online Reputation

…commentary. Another tool for managing online reputation management is to go to Knowem.com and grab up all the social media sites and get your name. And protect your identity. 1. Get a credit freeze and follow the steps for your particular state. This is an absolutely necessary tool to secure your credit. In most cases, it prevents new accounts from being opened in your name. This makes your Social Security number useless to a potential…

Stealing Identities of the Dead

…federal law that reformed welfare in the 1990’s also created a loophole that could allow swindlers to obtain the Social Security numbers of the recently deceased. In some state’s, Registry of Vital Records and Statistics include Social Security numbers on all certified death certificates. And anyone can obtain a death certificate from the registry for $18. Wired reports Identity thieves filed for $4 Million in tax refunds using names of living an…

Parents Navigating the Social Media Mess

Robert Siciliano Identity Theft Expert Children say and do things that make them vulnerable to dangers in the outside world. A parent can parent all day long and do everything possible to protect their kids from themselves, but a child’s persistence to have their way can wear a parent down. It’s a constant fight that makes a parent adopt a philosophy where they “pick their battles . ” Growing up, it wasn’t all that uncommon for a parent to…

Self-revelation Can Help Assemble a Social Security Number

…t had the lowest numbers and those on the west coast had the highest. Before 1986, people were rarely assigned a Social Security number until age 14 or so, since the numbers were used for income tracking purposes. From this point on I’d suggest locking down social media profiles in a way that they are not publicly accessible. Prevent anyone (except those very close to you) from seeing and reading everything about your daily activities, who you as…

Social Media Security: Using Facebook to Steal Company Data

….com. He has been able to accumulate significant numbers of emails for phishing targets from Facebook and other social networking sites. When he launched his companie’s Facebook spear-phishing attack, he usually got an average response rate of 45 to 50 percent. So nearly half of the employees responded to an email with the logins and passwords they use on their employers’ network. Steve says: – Officially sponsor the social net…

Is Your Facebook Friend a Fed, or Sex Offender?

…over the world in big cities and little towns and never have to watch your back. Reports of sex offenders on social media abound. Do you know who your child is befriending? Many of the “strangers” came into my life as a result of what I do, and I appreciate and accept them for connecting. But I know plenty of other people who don’t write or do media and might be in college, and have 2000 friends! And they know 5 of them! Social media is…

If You Want To Be an Identity Thief, Go To Jail

…prisoners to work while incarcerated, we question whether prisoners have a need to know other individuals’ Social Security numbers,” the audit says. “Allowing prisoners access to Social Security numbers increases the risk that individuals may improperly obtain and misuse (the data).” State s where prisoners have direct access to Social Security numbers : Alabama , Arkansas , Kansas , Nebraska , Oklahoma , South Dakot…

National Identity Card Focuses on US Workers & Immigrants

…too many forms of identification floati ng around right now that lack standards an d overall security. The Social Security card is currently our national identification card that’s not supposed to be used for identification. From a NY Times article from 1998 it states: WASHINGTON — FOR many years, Social Security cards carried an admonition that they were to be used ”for Social Security and tax purposes — not for identificati…

Social Media Sticky Situations

…k page was a private one and she was speaking to her closest friends. What everyone needs to understand is that social media is anything but private. People are watch ing, and waiting and many are hoping and wishing you might say something controversia l which will give them something to talk about and a reason to point the finger. Plain and simple: Don’t give anyone any ammunition to be used against you. Don’t do or say or post any…

Social Media Security in a Corporate Setting

…hter for the IT manager.  While corporations are still trying to figure out the  long term marketing benefits of social media, the security issues faced are a right now a problem. Many companies restrict internal access. Others prevent employees from discussing or mentioning the company in social media during private time. All of a sudden we’ve gone from print media, radio, television, Internet and now social media. This isn’t a fad or craze t…

Hacking Humans Naiveté

…l and money top the list of motivations. In the world of Information Security the “how” is “social engineering”. Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical hacking techniques (essentially a fancier, more technical way of lying). Social engineering or “social penetration” techniques are used to bypass sophisticated and expensive h…

Social Media Messages Telling Too Much?

…ing violence . ”  And that day may come. For years I’ve been barking about personal security as it relates to social media and the risks involved . I’ve written numerous times about how social media requires a risk vs . reward assessment.  P lain and simple, p utting all your life’s details in one place makes it easy for the bad guy to gather intelligence about you. While I believe the site has the right intentions to bring awareness to the…

Search Engines Link to Malware in Social Media Search

…t Expert Now that the 3 major search engines Google, Bing and Yahoo index real-time search for Twitter and other social networks, consumers must be aware that not all relevant search is a safe click. Scammers and identity thieves see this as real-time free advertising for their malware. When news breaks, the social media is now considered a trusted source for cutting edge information. The search engines trust that data and place those keyword sea…

10 Ways to Manage Your Online Social Media Reputation

…and attempt to control it. Register your full name and those of your spouse and kids on the most trafficked social media sites, blogs, domains or web based email accounts. If your name is already gone, include your middle initial, a period or a hyphen. It’s up to you to decide whether or not to plug in your picture and basic bio, but consider leaving out your age or birthday. Set up a free Google Alerts for your name and get an email every…

Top 8 Worst Twitter Social Media Hacks

…l to secure your credit. In most cases, it prevents new accounts from being opened in your name. This makes your Social Security number useless to a potential identity thief. Invest in social media protection @ Knowem.com Go to my website and get my FREE ebook on how to protect yourself from the bad guy. Invest in Intelius identity theft protection and prevention. Not all forms of identity theft can be prevented, but identity theft prot…

10 Business Identity Theft Risks in 2010

…d make whatever virus or spyware impotent, and any data on your machine typed in a browser useless to the thief. Social media identity theft is the act of creating a blog or social media site that models your day to day operations. At any time someone can register domains or social media sites with your brand as the face. They then sell product that they never ship and/or do things to damage your brand. Scoop up your social media identities with…

Secure Your Social Media

…s. Don’t use easily guessed words from the dictionary or pets names and kid’s birthdates, etc. Don’t access social media from libraries, internet cafes or any public computers that could have spyware. Make sure your own PC has updated virus definitions and security patches. Be careful with all the 3rd party apps in social media. Many are risky. Don’t click on links in emails from “friends” asking you to download a video o…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in