Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2010 

Today’s criminal hackers are very different than those who hacked for fun and fame a decade ago. Every week, I see stories about more criminals in faraway lands, making millions from various scams, emptying the bank accounts of small businesses or draining the financial reserves of entire towns....
11/11/2010
Allen West, a Republican Congressional candidate, is speaking out after a mailing from the Florida Democratic Party releases his Social Security number and his wife’s federal employee number. “It’s an attack against me and I think it shows the weakness of the character of Ron Klein and definitel...
11/07/2010
Generally when a burglar or thief sets out to break into a home their motivation is to steal any item they can sell at pawnshops or to those on the “black market”. The phrase “black market” has always intrigued me. It means doing business “in the dark” or out of the view of law enforcement. Any ...
11/07/2010
Every time you use a credit card, you increase the chances of that card number being used fraudulently. Cards can be skimmed and hacked in a number of different ways. #1 Watch your card. Whenever you hand your credit or debit card to a salesperson or waiter, watch to see where your card is taken...
11/07/2010
Most of us tend to trust the person on the other end of the telephone more than we trust an email in our inbox. However telephone scams continue to plague people and successfully empty the victims bank accounts. Caller ID spoofing occurs when your phone rings and your caller ID displays a name a...
11/06/2010
On the Policy, Practice & Procedures page of their website, the IRS addresses the public’s concern regarding Social Security numbers on checks: “Complete Social Security Numbers (SSN) on Checks or Money Orders Remitted to IRS Issue: Tax Professionals and clients have concerns about taxpayers put...
11/05/2010
Stalking is about domination. It is one or more persons continually making efforts to control another person’s life and thoughts by paying unwanted attention. Stalking is when someone contacts you when you repeatedly request that they do not. They watch, follow, call, email, text, fax or continu...
11/05/2010
A botnet is a group of Internet-connected personal computers that have been infected by a malicious application, which allows a hacker to control the infected computers without alerting the computer owners. Since the infected PCs are controlled remotely by a single hacker, they are known as bots...
11/05/2010
ATM skimming, the top ATM-related crime, accounts for about $350,000 in fraud every day in the United States, exceeding a billion dollars a year. An organization called EAST, or European ATM Security Team, posted seized video footage from a compromised ATM, depicting the installation of a camera...
11/04/2010
Crime and violence are generally not fun topics to write about or read about. Discussing a bloody home invasion isn’t exactly inspiring, nor does it make good dinner time chat. Events like these are only “entertaining” when fictionalized in TV and movies and make for a gripping arms length “who ...
11/04/2010