Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO, CEO of www.IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Social Media Identity Theft

Stop being a blabber on Social Media

…ew thing she’s bragging about, then getting worked up with anger that you can’t match this, such as a new sports car. Solutions Set a timer out for, say, 30 minutes a day, and that’s your limit on Facebook and Twitter. Avoid social media for one week to kill your hunger for obsessing over a family member’s bigger house, fancier car and more prestigious job. Set your privacy settings on high. Stop making inane posts about everything that happens…

Facebook Photos bust Bank Robber

Do these bank robbers have bricks for brains? They actually posted photos of themselves with wads of the stolen cash on Facebook, says a story on thesmokinggun.com. The alleged bank robers are John Mogan, 28 and Ashley Duboe, 24, and they’ve been charged with robbing a bank in Ohio. Mogan has already served time for a previous bank robbery conviction and was out on parole. It all started when Mogan apparently sauntered into the bank and…

LinkedIn targeted by Scammers

LinkedIn is a free service that allows professional people to network with each other. Often, a LinkedIn member will receive an e-mail from another LinkedIn member “inviting” them to join their network. Sometimes, the inviter is someone the recipient doesn’t know, but the recipient will link up anyways. And that’s the problem. A report at www.secureworks.com says that Dell SecureWorks Counter Threat Unit™ (CTU) researchers discovered 25 phony…

Burglars Use Social to target Victims

…ink it’s really a far-out left-field idea: a burglar studying Facebook and other social media to select homes to rob. Well think again. A survey, conducted by home security expert Friedland, found: 78 percent of burglars use social media to select targets. 74 percent touted the virtues of Google Street View. 54 percent pointed out how risky it is for social media users to reveal their whereabouts and status. 80 percent said a home alarm system…

Stay Safe While Traveling this Summer

…visor is a tool you can use that will help to warn you of most unsafe web pages. Make sure to check reviews of any private lodgings and use legitimate, well-known travel review sites. We all love to share what we’re doing on social media, especially kids, but avoid using location services when possible. According to the recent Intel Security study : Realities of Cyber Parenting , one in three children who are active on social media turn on…

Social Media Scams on the rise

…hough many people are concerned their personal information will get in the wrong hands, the funny thing is that they continue posting personal information—way too personal. The FBI’s Internet Crime Complaint Center says that social media is a fertile area for criminals to scam people. Phishing You are lured to a phony website that masquerades as your bank or some other important account. The lure might be a warning that you’ll lose your account…

Catphishing is a Heartless Scam

…but “Jaycina McArthur” just might. What comes up? See if they have social media accounts, as these suggest they’re a real person. But the absence doesn’t prove they’re a phony, either. Not every legitimate person is into the social media thing. Here are warning signs: More than one profile on a social media site. Few friends or followers on social media (but then again…this doesn’t prove they’re a catphisher. Remember, Hitler had a million…

Question: Should You worry about Kids on Social Media?

…ctronic communications or electronic media that makes it bad for kids. There will always be bad people out there—online and offline. An article on commonsensemedia.org lists multiple ways good things can come to kids who use social media. Makes friendships stronger. The site did a study called Social Media, Social Life: How Teens View Their Digital Lives. More than half the participants said that social media has benefited their friendships….

3 Ways We are Tricked into Cyber Attacks

…innocuous information, such as referring to a company big wig by their nickname, could lead to social engineering (tricking users into believing the request is legitimate so the user gives up sensitive information). Between social media and the golden nuggets of information on Facebook, Twitter, LinkedIn and other platforms, hackers have a goldmine right under their nose—and they know it. 3 Key Pathways to Getting Hacked Ignorance. This word…

6 Tips for Protecting Your Social Media Accounts

10 years ago, many of us were hearing about social media for the first time. Now, social media plays a giant role in our lives, allowing us to share pictures, connect with family and friends, and get updated news. Through social media, we can express ourselves to our inner circle and the world. So how devastating would it be if someone got a hold of your social media accounts? They could really wreak some havoc, like sending dirty links to all…

Stolen Social Security number? Don’t Worry!

Just when you think it was safe to believe your Social Security number can’t get stolen…news breaks of the Anthem data breach. Over 80,000,000 patient records were compromised, including SSNs and home addresses. Like a meteor striking the earth, a disastrous ripple effect is underway, with patients getting hit up with phishing e-mails. If you ever suspect your SSN has been stolen, some suggest contacting the IRS and Social Security…

The Security Costs of being too Social

…are letting burglars know they’re away from home and not returning too soon. Why You Should Curb Cyber Socializing It’s true: People have been burglarized because the thieves found out they were on vacation or away via their social media posts. Because posting your whereabouts in social media could lead to a burglary, you’ll have to pay for the natural fallout of the crimes, such as a homeowner’s insurance deductible and a higher premium rate…

SSN and Its Afterlife

…id identity theft of the deceased: Report the death yourself by calling the Social Security Administration at 1-800-772-1213. Contact the credit bureaus directly to report a death and request the information to be recorded immediately. Right now, before anyone perishes, get the person a credit freeze. Upon death (as in life), the person’s Social Security number will be useless to the thief. Invest in identity theft protection. This is a layer of…

Social Media Identity Theft leads to Arrest

…edia world? Nobody thinks this will happen to them, and Stephanie Francis, 24, was no exception to that way of thinking. A report from firstcoastnews.com that the Jacksonville, Florida woman claims her identity was stolen—on social media of all places—and that the thief used it to create a phony Facebook account. This is interesting because there’s probably a ton of Facebook accounts under the name of “Stephanie Francis.” But there’s more to a…

Feds Perp Social Media Identity Theft

…ause apparently, she wasn’t a key player in the ring. Really this shouldn’t matter. It is necessary for law enforcement to use any means necessary and legal to capture bad guys. However there must be a better way to create a social profile, such as using a stock photo or even a computer generated one. The technology is readily available to make this happen. Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com…

6 Ways to prevent Social Engineering Attacks

…tion for different accounts. Keep an eye on your accounts and their activity. Account providers such as Gmail have dashboards that show where you’re logged in and what tools or apps are connected. This includes financial and social media accounts. Beware of emails coming from anyone, for any reason that require you to click links for any reason. Social engineering via email is one of the true successful ways to con someone. Just be ridiculously…

Robert Siciliano Joins Identity Theft Resource Center Board of Directors

…ded in 1999, the Identity Theft Resource Center® (ITRC) is a nationally recognized non-profit organization which provides victim assistance and consumer education through its toll-free call center, website and highly visible social media efforts. It is the mission of the ITRC to: provide best-in-class victim assistance at no charge to consumers throughout the United States; educate consumers, corporations, government agencies, and other…

8 Ways to bullet proof your Social Accounts

…site eliminates the hassle of having to enter your username and password every time you want to visit the site. However, if the wrong person gets ahold of your computer, mobile or tablet, that person can easily get into your social media accounts. Log out. #3 Remove apps you don’t use. If your accounts like Facebook and Twitter are linked to a bunch of third-party apps and services that have accumulated over time, sift through these and knock…

Spring Clean Your Online Reputation

…he results show that 13.7% of people ages 18-24 know someone who was given the pink slip, courtesy of online postings. Job seekers and upcoming college graduates take note: Difficulty getting or keeping a job due to negative social media content is a reality. I assure you anything on your social media profile that makes you look less than desirable as an employee, even an innocuous comment such as, “I always have trouble being on time,” can kill…

10 Tips to Protect Yourself on Social Networks

…ly are. Manage your privacy settings: Make sure that you are only sharing information with friends and family and check them regularly in case there are any changes. Be aware of the fact that the information you share on one social network may be linked to another: For instance, a photo you post to Twitter may automatically post to your Facebook profile. Don’t reveal personal information: Be suspicious of anyone who asks for your personal…

What is Social Engineering?

No, it’s not some new engineering field to develop social media sites. Social engineering has been around as long as the con artist has been around. The terms stems from the social science world where social engineering is deemed as an act of psychological manipulation. In our tech-laden world of today, social engineering still involves deceit but it’s used to deceive you into giving up personal or sensitive information for the bad guys’…

15 Small-Business Social Network Nightmares

…about 10? Well, I can top that, because there are at least 15 social network mishaps that can haunt a business owner. Here’s a closer look at 15 types of trouble you can encounter on Facebook, Twitter and other popular social media platforms. Once you’re aware of all these potential dangers, you should take the necessary steps to prevent them from damaging your company. 1. Posting about illegal or questionable activities. Can you…

Dear Colleagues, Clients, Friends, Family, Media and all others

…ife and kids were at the finish line, saw more than they should, while waiting for me. My experience wasn’t as harrowing as others, but it wasn’t a good one either. I spent that evening and the next 3 weeks doing media, communicating my perspective of the event. Click or copy/paste my account here: http://robertsiciliano.com/blog/2013/04/19/2013-boston-marathon-my-best-worst-day-ever/ GRATITUDE AND GRACE: Gratitude and Grace:…

7 Social Media Security Tips To Protect Your Business

…life could open your business to some serious dangers. Many small businesses recognize the benefits of having a social media presence for customer service and long-term marketing purposes. However, many are slow to recognize social media’s security issues and how employees’ own social presence can add to the company’s security issues. Some companies restrict internal access. Others may prevent employees from having any corporate…

The Definitive Guide to Facebook Security

…ry facet of our lives. It is extremely important to understand security and privacy settings with so much personal information becoming so accessible. Here is the definitive guide to security on Facebook: Step One Logging In Social Authentication: Facebook uses social authentication to verify your account. This system asks you to identify your friends based on pictures. This is information that makes it incredibly hard for a hacker to hack and…

7 Small Business Social Media Risks

Many executives are concerned about social media related risks (e.g., data security and ID theft), but far fewer actually have any social media training. A recent survey of executives puts the concerns into four categories: disclosure of confidential information; damaged brand reputation; ID theft; and legal and compliance violations. Another feature that the survey unveiled was that 71 percent of the participants believed that their company…

IT Guys get duped Pretty Girl on Social Media

…rk till it enabled the attack team to suck in security personnel and executives. Most of the people who assisted Emily were men. A similar experiment using a fake male profile had no success. Preventing getting suckered into Social Media Scams For agencies and other organizations, social engineering awareness training is crucial, and must be done constantly, not the typical annually. Suspicious behavior should always be questioned. Suspicious…

Oversharing on Social Media Common Amongst 50+

…k about some hard consequences of sharing too much personal information. Thinks about it…is that friend really a friend if you haven’t seen them in 25 years? McAfee’s Fifty Plus Booms Online study found despite the fact that social networks have a reputation among the younger generation as a hub for drama among friends, this is also the case among other demographics—even in the 50-and-over age group. According to respondents, 16% of those who…

7 Tips to avoid ‘deadly’ social media

The vacant 5,000 square foot house next door to this kicking victim was on sale, and he had agreed with the realtor to keep an eye on it. Some kids got wind of this vacancy and put out a Facebook invitation to a Halloween rave party there. He called 9-1-1 and the police broke up the party. However, kids kept arriving because the Facebook notice was still up. A mob of perhaps 60 kids was brewing at the end of the street. The victim-to-be began…

Socint: disseminating cybercrime through social intelligence

…“I need a spliff”—slang for marijuana—and the Toronto police respond, “Awesome, can we come too?” But it goes much deeper than that. NextGov.com reports, “Criminals, organized crime syndicates, gangs and terrorists also use social media. They post information and share photos and videos, and terrorist groups use the tools to recruit new members, disseminate propaganda and solicit funds.” It seems the next stage to investigate and prevent crime…

Identity Thieves Go After the Deceased

…n from falling between the cracks. Report the death yourself by calling the Social Security Administration at 1-800-772-1213. Contact the credit bureaus directly to report a death and request the information to be recorded immediately. Right now, before anyone perishes, get the person a credit freeze. Upon death (as in life), the person’s Social Security number will be useless to the thief. Invest in identity theft protection. This is a layer of…

Social Media A Big Risk To Banks

…nloading a virus or social engineering tricks like clicking an infected link and alert us to a phish email. But no technology or even security or privacy policy can prevent someone from exposing all their life’s details on a social media site. When criminals target an organization like a bank they start by looking for vulnerabilities in the network infrastructure. Beyond that they target the employees of a bank and their customers using the…

Why Your Employer Needs Social in the Workplace

Social media is the fifth form of mainstream media. It encompasses all media, making it the king of all media. At this point, most people know how to use social media and how to navigate the various websites. But many employers are still on the fence. Hootsuites’ CEO says, “The world’s top brands—like Pepsi, Virgin, NHL and American Express—[are] now embracing [social media] company-wide.” MarketingDonut reports, “One of the simplest ways to…

2013 Boston Marathon: My Best Worst Day Ever

…ton Globe, Dr Drew, Extra, Current TV, Canadian TV, again and again, Fox Boston and some radio. In early May after the blasts I was asked to speak to the North Eastern Massachusetts Law Enforcement Council on the benefits of social media to law enforcement and how social can help get the word out in a tragedy. When I walked into the room to speak, everyone was in uniform. What I didn’t know was many of the men and women attending were the…

The Social Media Identity Theft of a School Director Via Twitter

…esulting in an identity theft charge for Ira Trey Quesenberry III, an 18-year-old student at Sullivan Central High School. A few years ago this would have been looked upon as a victimless prank. But times have changed and as social media sites like Twitter, Facebook, LinkedIn and others have morphed into much more than just recreational websites, it’s not just unacceptable; it’s a crime. The Twitter account was created with the name…

Social Media Security in the Workplace

…hnique commonly linked to cyber spies operating from China.” One highly publicized cyber-attack was on Supreme Allied Commander Europe (SACEUR) Admiral James Stavridis NATO’s most senior military official. It is believed the social media account in his name was “attempt to trick colleagues, friends and family into giving away his personal secrets on the social network” These cyber-attacks on social media are often used to gather intelligence to…

Social Media Security Risks for Small Business

…king infected links, by warning users about potentially dangerous webpages and phishing emails. But no computer security technology or privacy policy can prevent people and employees from exposing all their lives’ details on social media websites. When internet criminals target an organization, they start by looking for vulnerabilities in the network’s infrastructure. Beyond that, they target a business’s employees and customers by using…

How safe is my identity? What are the latest threats? How do I protect myself?

…nd 15 percent of Americans, or about 36 million people, were notified of a data breach in 2011. Consumers receiving a data breach notification were 9.5 times more likely to become a victim of identify fraud. Javelin examined social media and mobile phone behaviors and identified certain social and mobile behaviors that had higher incidence rates of fraud than all consumers. LinkedIn, Google+, Twitter and Facebook users had the highest incidence…

Social Media Security Tips for Small Business

…arketing benefits of social media and they also know the security issues with employees continue to be a problem. Many companies restrict internal access. Others prevent employees from discussing or mentioning the company in social media during private time. Follow these social media security tips for small business to prevent security issues: #1 Implement policies. Social media is a great platform for connecting with existing and potential…

Ghosting Identity Theft Scams

…redit may unknowingly facilitate these scams if they have employees on the inside who manipulate the system. Never leave employees unsupervised without some form of redundant checks and balances system in place. At least run Social Security numbers through the Social Security Administrations Verification Service to prevent Identity theft. Business scams like these eat at the foundation of credit and cost companies and consumers billions a year….

Holiday Phishers Use Social Media

…some extent. Criminals exploit this by mimicking these familiar platforms when sending millions of phishing emails designed to entice users into clicking malicious links or visiting spoofed websites that resemble legitimate social media. They also create pages within popular social media that are infected with malware, or malicious links designed to infect the PCs of anyone who clicks. McAfee has exposed numerous Christmas-related scams. To…

Social Security Number: All-Purpose Identifier

…e. The IRS adopted our Social Security numbers as identifiers for our tax files about 50 years or so ago. Around the same time, banks began using Social Security numbers to report interest payments, and so on. All the while, Social Security numbers were required for all workers, so their Social Security benefits could be paid. Most people were assigned a number when they applied, sometime around the age of 16. This was until the 1980s, when the…

Social Web Loaded With Profile Misrepresentation

Social fakes” are invented profiles on social media (often referred to as profile misrepresentation), which can be used to harass or mock victims anonymously. But the more lucrative fake profile is one that imitates a legitimate business, damaging that business’s online reputation. The imposters’ ultimate goal? Spam leading to scams. Social-web security provider Impermium published the results of their recent analysis of the cost of social

Bill Would Remove Social Security Numbers From Medicare Cards

…ibiting Social Security numbers from appearing on Medicare cards or on any communications to Medicare beneficiaries, as well as requiring the Department of Health and Human Services to eliminate the unnecessary collection of Social Security numbers. Social security numbers should certainly be removed from Medicare cards and any other cards, for that matter. But while this bill is a step in the right direction, it cannot protect any of those 40…

Device Intelligence Helps Stop Scammers Targeting Social Media Sites

…bogus charge, and requested that the woman bail him out to the tune of $4,000, which she most likely paid via money wire transfer (red flag). All told, she sent the scammer at least $15,000 during their relationship. Sadly, social media sites can do more to protect their users, and should take advantage of information that readily exists for them to use — the known reputations on over 650 million devices in iovation’s device reputation…

15 Social Media Security Tips

…and a website safety advisor. 15. Invest in identity theft protection. Regardless of how careful you may be or any security systems you put in place, there is always a chance that you can be compromised in some way. It’s nice to have identity theft protection watching your back. Robert Siciliano is a McAfee consultant and identity theft expert. See him discuss social media scammers on CNN. (Disclosures)  …

Social Networking Security Awareness

…rom online threats, viruses, spyware, other malware, and includes the award-winning SiteAdvisor website rating technology. After the six-month McAfee AntiVirus Plus subscription period, Facebook users may be eligible for special discount subscription pricing. Robert Siciliano is a McAfee consultant and identity theft expert. See him discuss hackers hacking social media on Fox Boston. (Disclosures)…

Your “Status” is Important to Others

…aper. Once you are on that list, it is known you are away. The best case scenario for both issues is to have a trusted friend, family member or neighbor grab your mail and newspaper for you. Never list your vacation plans on social media. The last thing you need to be doing on Facebook is telling the world you are 2000 miles away. In Houston, two dumb criminals, one a teller at a bank that was just robbed and her boyfriend posted their status as…

Judge Says Its OK to Post Social Security Numbers Online

…llection, maintenance, use, and dissemination of personally identifiable information maintained in systems of records by federal agencies. Over the years, many have interpreted this law to allow public information, including Social Security numbers, to be posted online. I’ve seen Social Security numbers for Jeb Bush, Colin Powell, former CIA Director Porter Goss, Troy Aiken, and Donald Trump, all published on the Internet. Ostergren so…

Prankster Creates and Kills Fake Social Media Profiles

…suicide attempt. The woman committing these acts is either extremely disturbed or extremely intelligent. Either way, it’s very creative and probably prone to copycats. This woman should be banned from the Internet entirely. Social media sites could go a long way in terms of protecting their users by incorporating device reputation management. Once a user has been banned, device reputation allows websites to analyze the history of that user’s…

Teacher Bit by Social Media Identity Theft on Twitter

…s the only crime I can think of where you are guilty until proven innocent. Once something like this happens it can quickly and easily damage your reputation. Online Security Tips: Right now grab your name on all the popular social media sites. Sign up for every one of them even if you don’t intend on using them. If your name is gone use a hyphen or a dash. For free search over 500 popular social networks and over 200 domain names to instantly…

Predators Using Social Media to Stalk Kids

…” said Ernie Allen, President & CEO of NCMEC. “The child pornography images we are receiving are becoming more violent and the victims much younger. We are even seeing infants being sexually abused.” With the openness of social media, predators know what a kid likes, doesn’t like, who their friends are, and often their phone numbers, where they live, go to school, sports teams they play on etc. The list goes on and on. Many of today’s social

Phishers Using Holidays and Social Media to Target

Recent reports of “The Oak Ridge National Laboratory, home to one of the world’s most powerful supercomputers, has been forced to shut down its email systems and all Internet access for employees since late last Friday, following a sophisticated cyberattack.” The sophisticated cyber attack was reported to be the lowly unsophisticated phishing email. Phishing is emerging as sophisticated due to ways in which the phish emails are disguised to…

Lawmakers Push To Shield Last 4 Social Security Numbers

…s are responding by pushing legislation to stop businesses from asking for the last four digits of customers’ Social Security numbers. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, including the first five digits, using information from social networking sites, data brokers, voter registration lists, online white pages, and the publicly available Social Security…

Twitter Scam Hooks Thousands

…witter accounts have been hacked, including those of President Obama and, recently, Ashton Kutcher. Kutcher’s account was most likely “Firesheeped,” which can occur when a wireless device is used to access an unsecured site. Social Media Identity Theft: Hundreds of imposter accounts are set up every day. Sarah Palin, St. Louis Cardinals coach Tony LaRussa, Kanye West, The Huffington Post, and many others have been impersonated by fake Twitter…

Search Engine Doesn’t Need Kids SSN

…four digits of children’s Social Security numbers is probably someone who readily shares his or her own number, which is not a good idea. Researchers at Carnegie Mellon University have developed a reliable method to predict Social Security numbers using information from social networking sites, data brokers, voter registration lists, online white pages, and the publicly available Social Security Administration’s Death Master File. The New York…

5 Gotta Have Social Media Apps

Applications on mobile phones are all the rage. I spend more time on my apps than I do making calls. That time spent is often with those I connect with on social media. Twitter and Facebook are the major players in social media and applications for them are a plenty. TweetDeck FREE. TweetDeck is your mobile browser for staying in touch with what’s happening now on Twitter from your iPhone or iPod Touch. TweetDeck shows you everything you want…

10 Social Media Security Considerations

Social media security issues involve identity theft, brand hijacking, privacy issues, online reputation management, and users’ physical security. Social media provides opportunities for criminals to “friend” their potential victims, creating a false sense of trust they can use against their victims through phishing or other scams. Register your full name on the most trafficked social media sites, and do the same for your spouse and kids. If…

Social Security Numbers Easily Cracked

…s easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, using information from social networking sites, data brokers, voter registration lists, online white pages, and the publicly available Social Security Administration’s Death Master File. Originally,…

10 Types of Criminal Social Media Impersonators

Social media is the fifth form of mainstream media. At this point, most people know how to use social media, and how to navigate the various websites. But what most users don’t yet realize is how social media can be used against them. Social media identity theft occurs for a number of reasons. 1. An online impersonator may attempt to steal your clients or potential clients. 2. Impersonators may squat on your name or brand, hoping to profit by…

Cool Tools To Access Files Remotely

…cted device with a streaming media player (mobile phone, PDA, laptop) to log into mycast.orb.com and access all your digital media, anywhere, anytime. Orb is also compatible with the Wii, PS3, and Xbox, so you can enjoy your media on your television screen as well! While Orb is heavily focused on delivering digital media, it works with documents as well. If you’re a Mac guy, then you’re all about Me.com. For $99 a year, Me.com gives you easy…

Man Arrested For Stealing 15,000 Social Security Numbers

…the hands of identity thieves have even had their mortgages refinanced and their equity stripped. WTEN.com reports an arrest has been made of an individual alleged to have illegally downloaded personal information, including Social Security numbers of about 15,000 people. Police arrested a man “for stealing the collection of Social Security numbers from computers belonging to contractors working for the Office of Disability and Temporary…

Using Social Media Passwords With Critical Accounts

For some social networking sites, security is not a top priority. Some do not protect your data with the same vigilance you could expect from your bank, for example. Nor do social media require strong passwords. And if you use the same passwords for more critical sites, like webmail or online banking, having your social networking account compromised can make those other accounts vulnerable as well. Last year, 32 million passwords were posted…

Americans Waking Up to Social Media Privacy

…to affect ones security position. Now as a result of all this attention to privacy, in a recent study published in the Wall Street Journal, about 36% of American adults said they were “very concerned” about their privacy on social-networking sites in 2010, compared with 30% who felt that way last year. The shift was particularly noticeable among people over age 44; 50% of people age 54 to 64 described themselves as “very concerned,” compared…

Colorado Supreme Court: Using a Stolen Social Security Number is Not Identity Theft

…ode. The Colorado Supreme Court has ruled “that using someone else’s Social Security number is not identity theft as long as you use your own name with it.” The defendant in this particular case had admitted to using a false Social Security number on an application for a car loan, and to find employment. The court ruled that since he had used his real name, and the Social Security number was only one of many pieces of identifying information, he…

15 Facebook Fiascos to Watch Out For

…students, officials, police, and others from just about every walk of life get fired because of words or pictures they posted on Facebook. Remember, if what you post wouldn’t pass the potential employer test, don’t do it. 5. Social media identity theft. When someone snags your name, posts a photo as you, and begins to communicate while impersonating you, the effects can be devastating. Grab your name on as many sites as possible, including…

Leaked Social Security Numbers Put “Personal Security and Safety at Risk”

…code of fair information practices governing the collection, maintenance, use, and dissemination of personally identifiable information in federal record systems. Back in 1974, identity theft wasn’t an issue, so having your Social Security number on your driver’s license, school ID, and most other documents wasn’t a big deal. Then someone figured out how to use a Social Security number to pose as someone else, and from there, identity theft…

IRS Fully Reliant on Social Security Numbers

…x evader, you don’t have much of a choice about including your Social Security number on checks and money orders. The IRS sent 201 million notices to taxpayers during the fiscal year 2009, and most of those mailings included Social Security numbers. Social Security numbers may also appear in more than 500 computers systems and 6,000 internal and external forms. According to the Treasury Department Inspector General, “this is because Social

McAfee Reveals the Top Ten Most Dangerous Places to Leave Your Social Security Number

…t victims had their social security number compromised according to Javelin’s 2010 Identity Fraud Survey Report. In honor of National Identity Protection week, McAfee set out to reveal the most dangerous places to leave your social security number. When your Social Security number is used to commit fraud, it feels very personal. It can take hundreds of hours and sometimes thousands of dollars to rectify this violation. Criminals find these…

Social Media is a Criminals Playground

…r, if you are like me, a broken collarbone. Twitter and Facebook have become the most popular sites for frolicking, and the most popular sites for identity thieves — the bullies in the playground. These criminal hackers make social media very dangerous. They are attacking these sites to get at you, the end user. Users’ computers can become infected after users click links that appear to be safe, but actually prompt a malicious download or lead…

Women Proved “Securest” in the Defcon Social Engineering Game

…al Engineering Capture The Flag” At Defcon), I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out too much information. All five holdouts were women who gave up zero data to the social engineers. Computerworld reports, “Contestants targeted 17 major corporations over the course…

Police Warn Burglars Are Using Social Networks

…y were successfully burglarized. And once an intruder enters your home and does their dirty deed, your “castle” and how you feel in it is never the same. Protecting yourself is real simple. Be cautious about what you post on social media and consider an investment in a home security system. Robert Siciliano personal security expert to Home Security Source discussing Social Media and giving out to much information on the CBS Early Show….

Seven Social Media Landmines to Watch Out For

…game in getting their domain names. I had a little battle with LedZeppelin.com that I regret, but that’s another story. Today that same battle is being played out in social media. Anyone can register any brand or likeness on social media with very little difficulty, and it’s free. Once the scammer owns your name, they can pose as you, blog as you, and comment as you. The basis of much of this social media identity theft, or “impostering,”…

What is “Social Registration”?

Social media has evolved into the fifth major form of media: print, radio, television, Internet, social. While social media functions on the Internet, there’s no denying that it is its own platform. It encompasses most forms of media in one tight and neat package. Some social networking sites have more users than number of residents in some countries. In the process of this explosive growth, a few social networking websites like Facebook,…

Stealing Secrets: Telling Lies Over the Phone

…on’s computer. Social engineering is a fancier, more technical form of lying. An alternative to traditional hacking, it is the act of manipulating others into performing certain actions or divulging confidential information. Social engineering or “social penetration” techniques are used to bypass sophisticated and expensive hardware and software in a corporate network. Social engineering is all based on telling a lie and getting others to tell…

Researcher Proves Your Friend Isn’t Your Friend

…f his journey and how important it was for him to get a place to check his email and use a restroom. Within in seconds, he was provided a place to sit, connection to the Internet, and a 24×7 card access key to the building.” Social media can and is being used as a smokescreen. The idea behind social media is that we are social creatures that thrive in community and want to connect. The problem is that this ideal is based on the mindset that we…

Social Media Identity Theft

100 Million Facebook Profiles Published via P2P

…vailable in this file. If you lock down your settings today, it’s still in this file. What’s the point? Hackers like to tinker, and some like to make a point. It seems the hacker here wanted to make a point that your data on social media is up for grabs whether you like it or not. What’s the risk? It seems the format and way the data was compiled is now searchable in a way that can benefit advertisers and marketers. Can it be used by thieves?…

10 Ways to Prevent Social Media Scams

The trouble with social media revolves around identity theft, brand hijacking and privacy issues. The opportunity social media creates for criminals is to “friend” their potential victims in order to create a false sense of trust and use that against their victims in phishing or other scams. It was big news when someone had their Facebook account jacked by someone who impersonated the victim, claiming to have lost their wallet in the UK and…

Identity Theft – Common Consumer Errors

…riend traveled the world on stolen credit and destroyed the real estate agent’s ability to buy and sell property. Her real estate license was suspended and her life was turned upside down. Awareness is key: Do you carry your Social Security number or a Social Security card in your wallet? Do you provide this number to anyone who asks for it? The most commonly dispensed advice in response to these questions is: don’t carry the card and don’t give…

Hackers Play "Social Engineering Capture The Flag" At Defcon

Social engineering is a fancier, more technical form of lying. An alternative to traditional hacking, it is the act of manipulating others into performing certain actions or divulging confidential information. Social engineering or “social penetration” techniques are used to bypass sophisticated and expensive hardware and software in a corporate network. Smart organizations train their employees to identify and resist the more common attempts…

Study Shows Tweens and Teens are Clueless About Privacy

…strangers, it should give society pause. Understand that as this trend continues, more and more kids will be blindsided when they are solicited by adults who, with an additional twenty or more years of live experience, know how to con a kid. Robert Siciliano, personal security and identity theft expert adviser to Just Ask Gemalto, discusses hackers hacking social media on Fox Boston. (Disclosures)…

Published Articles

…computing.net.au/News/157537,lost-hard-drive-could-affect-70-million-military-veterans.aspx http://aquilinefocus.blogspot.com/2009/10/psst-70-million-us-vets-are-in-same.html SEPTEMBER http://www.cnn.com/2009/TECH/09/28/dcot.socialmedia.privacy/ (quoted September 2009 Social media an inviting target for cybercriminals) http://www.marketingmagnified.com/#feature2 (quoted September 2009 Q&A Robert Siciliano, Author, Professional Speaker, CEO…

Consulting

…Blogging Today’s consumers are smart, savvy, and resourceful. Capturing their attention and finalizing a sale is more difficult than ever for some, yet easy for those who possess a thorough understanding of the process. Old media is either slowly dying, or adapting to our newly fragmented, information-driven society. New media is better situated to capture and keep the attention of consumers who educate themselves via expert and user reviews,…

Social Media Safety/Security: Online Reputation Management

…g. Protect Yourself and Kids Online. Talk Technology and Be Cyber-Smart. Find Out if Your Kids are at Risk. Manage You and Your Companies Online Reputation. Download PDF version Similar Posts from the Security Blog Feds Perp Social Media Identity Theft A federal agent impersonated a woman without her knowledge; he created a Facebook page in a woman named Sondra, and the Justice Department is defending him. In addition, he posted racy photos of…

Media

…igital New Year’s Resolutions For Parents Updating and Upgrading Your Digital Technology Why the FBI Needs Our Help to Take Down Cyber Fraud Safe Banking On Your Mobile Device Necessary Security Updates for 2012 Phishers Use Social Media 2012 Threats: Are You Ready? Supermarket Skimming Scam Highlights Retailer Risk Securing New Digital Devices The new ATM skimming threats: How gangs skim to finance their activities How your child’s identity…

Your Personal Security and Identity Theft Speaker

…nsumers can set up to monitor their identities and secure their information, no mater whose hands it’s currently in. When you make your data and identity a tougher target to hit, you render it essentially useless to a thief. Social Media Security: In the social media security program, you will recognize what puts you, your business, your data and your reputation at risk. Learn from others’ mistakes and develop policies to prevent employees,…

Reality Actor Jailed Six Months For Burglarizing Orlando Bloom's Home

…llywood’s “Bling Ring,” teenage gang of celebrity-obsessed wannabes who allegedly stole from Paris Hilton, Lindsey Lohan, Megan Fox and others. Their methods were simple. They tracked their victims by using social media, Facebook and Twitter. They knew when they were home and when they were away. They even used Google Earth to scope out their homes. Police estimated that from October 2008 to August 2009, the “Bling…

Parents Navigating the Social Media Mess

…tity. 1. Get a credit freeze and follow the steps for your particular state. This is an absolutely necessary tool to secure your credit. In most cases, it prevents new accounts from being opened in your name. This makes your Social Security number useless to a potential identity thief. 2. Invest in Intelius identity theft protection and prevention . Not all forms of identity theft can be prevented, but identity theft protection services can…

Self-revelation Can Help Assemble a Social Security Number

…e on the west coast had the highest. Before 1986, people were rarely assigned a Social Security number until age 14 or so, since the numbers were used for income tracking purposes. From this point on I’d suggest locking down social media profiles in a way that they are not publicly accessible. Prevent anyone (except those very close to you) from seeing and reading everything about your daily activities, who you associate with and all the names…

Social Media Security: Using Facebook to Steal Company Data

…; Officially sponsor the social networking site and assign an administrator who is responsible for permitting employees to join. This will help control somebody infiltrating the site for devious purposes. — Establish a social networking policy. If your employees are participating in social networking sites (company sponsored or not) make sure company policies dictate what is and is not permissible. For example, divulging your corporate…

Is Your Facebook Friend a Fed, or Sex Offender?

…e into my life as a result of what I do, and I appreciate and accept them for connecting. But I know plenty of other people who don’t write or do media and might be in college, and have 2000 friends! And they know 5 of them! Social media is weird. Employers, potential employers and others will often friend someone for the sole purposes of getting a solid profile of that person to determine if they want to hire them. Now the AP reports “U.S. law…

Social Media Sticky Situations

…ces response world , could be considered threats of violence. Remember, it was her belief that her Facebook page was a private one and she was speaking to her closest friends. What everyone needs to understand is that social media is anything but private. People are watch ing, and waiting and many are hoping and wishing you might say something controversia l which will give them something to talk about and a reason to point the finger. Plain and…

Social Media Security in a Corporate Setting

…figure out the long term marketing benefits of social media, the security issues faced are a right now a problem. Many companies restrict internal access. Others prevent employees from discussing or mentioning the company in social media during private time. All of a sudden we’ve gone from print media, radio, television, Internet and now social media. This isn’t a fad or craze that will go away like Beanie Babies or talking Elmo. Social media is…

Social Media Messages Telling Too Much?

…t tongue and cheek, it borders on “inciting violence . ” And that day may come. For years I’ve been barking about personal security as it relates to social media and the risks involved . I’ve written numerous times about how social media requires a risk vs . reward assessment. P lain and simple, p utting all your life’s details in one place makes it easy for the bad guy to gather intelligence about you. While I believe the site has the right…

Search Engines Link to Malware in Social Media Search

…earch for Twitter and other social networks, consumers must be aware that not all relevant search is a safe click. Scammers and identity thieves see this as real-time free advertising for their malware. When news breaks, the social media is now considered a trusted source for cutting edge information. The search engines trust that data and place those keyword search results on page one. A criminal hacker seeing news break begins to multiply that…

10 Ways to Manage Your Online Social Media Reputation

…, the wild wild web and “search” is a relatively uncontrollable aspect of your reputation, unless of course you make and attempt to control it. Register your full name and those of your spouse and kids on the most trafficked social media sites, blogs, domains or web based email accounts. If your name is already gone, include your middle initial, a period or a hyphen. It’s up to you to decide whether or not to plug in your picture and basic bio,…

Top 8 Worst Twitter Social Media Hacks

…ate. This is an absolutely necessary tool to secure your credit. In most cases, it prevents new accounts from being opened in your name. This makes your Social Security number useless to a potential identity thief. Invest in social media protection @ Knowem.com Go to my website and get my FREE ebook on how to protect yourself from the bad guy. Invest in Intelius identity theft protection and prevention. Not all forms of identity theft can be…

10 Business Identity Theft Risks in 2010

…numerous technologies that will immunize your PC and make whatever virus or spyware impotent, and any data on your machine typed in a browser useless to the thief. Social media identity theft is the act of creating a blog or social media site that models your day to day operations. At any time someone can register domains or social media sites with your brand as the face. They then sell product that they never ship and/or do things to damage…

Secure Your Social Media

…c. Don’t access social media from libraries, internet cafes or any public computers that could have spyware. Make sure your own PC has updated virus definitions and security patches. Be careful with all the 3rd party apps in social media. Many are risky. Don’t click on links in emails from “friends” asking you to download a video or see pictures. This is becoming a common ruse in social media. Monitor who has access to your PC in your own home….

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in