Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2010 

I make a portion of my living speaking professionally. That means I get on a platform and present in front of an audience on issues revolving around personal security and identity theft. So when I got this email, I was so happy to see I was being invited to England to speak to the esteemed Middl...
08/16/2010
“Contactless,” in this context, refers to the use of a wireless device. A payment is contactless when, instead of inserting your credit or debit card, you hold your card or keychain device within a few inches of the terminal, and your payment information is sent and processed wirelessly. Contact...
08/16/2010
Spyware is sold legally in the United States. This software records chats, emails, websites visited, usernames and passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file that can then be accessed remotely. This is all perfectly l...
08/14/2010
Traveling for business or pleasure is hectic, unnerving, not at all glamorous and often draining. Often, we say we need a vacation after a vacation. And when traveling, the last thing you need is to be ripped off. Things to consider: Hotel Rooms Hotel rooms are not secure. Just last week I enter...
08/14/2010
Mobile phone GPS (global positioning system) is often accurate in less than 100 feet. Many mobile apps work with GPS to inform you of local restaurants, banks, gas stations and attractions. Mobile phone GPS is also being used for driving navigation too, but I don’t find it as effective. In this ...
08/13/2010
Traveling for business or pleasure is hectic, unnerving, not at all glamorous and often draining. Often, we say we need a vacation after a vacation. And when traveling, the last thing you need is to be ripped off. Things to consider: Hotel Rooms Hotel rooms are not secure. Just last week I enter...
08/12/2010
A confidence trick or confidence game (also known as a bunko, con, flim flam, gaffle, grift, hustle, scam, scheme, swindle or bamboozle) is an attempt to defraud a person or group by gaining their confidence. The victim is known as the mark, the trickster is called a confidence man, con man, con...
08/10/2010
For everything in life, there is a corresponding scam. Scammers spend their energy trying to separate hardworking, law-abiding citizens from their money, and they’ll take advantage of any opportunity to do so. The four seasons provide various opportunities for scams. Summers “hottest” scams incl...
08/10/2010
With 20+ million iPhones on the market there is a good chance you have one. According to San Francisco police, the 31-year-old city resident rode a bicycle up to a woman and snatched an iPhone out of her hands, and then pedaled away. Problem was, the woman was carrying the phone as part of a com...
08/09/2010
Identity cloning generally encompasses all types of identity theft. In most cases, the thief is intentionally living and functioning as the victim. The thief’s motivation may be to hide from the law, evade child support, or skirt immigration. A man lived a quiet life with a steady job. But he wa...
08/09/2010
Rainmaker
1,068,635

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
local_phone(617) 329-1182
Contact The Author