Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2014 

The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about hackers stealing data from large companies and the government. Hackers are the bad guys. But are ...
09/08/2014
Gee, even the tools that update your smartphone’s operating system over the air have holes that hackers can slip into. It’s estimated that as many as two billion handsets are vulnerable, and in some instances, security patches haven’t even been released. The open mobile alliance device management...
09/07/2014
For some of us, fall is about to begin and the graduates of the class of 2014 are heading off to colleges across the country. It’s an exciting time—there’s a reason so many people call college the best four years of their lives. You learn so much about the world and yourself. You make lifelong fr...
09/07/2014
What are these “botnets” you keep hearing about? Botnets (think roBOT + NETwork—gets you “BOTNET”) are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software—controlled by a solitary hacker or cybercrime ring. Hackers use botnets to execute a var...
09/05/2014
Your child is turning 16! As a parent in the US, your mind is occupied with planning the big sweet 16 party and preparing for a new driver on the road (and the crazy high insurance that goes with it). During this exciting time, there’s something else you should be thinking about—your child’s cred...
09/04/2014
A four-year-old girl witnessed two young men break into her home to commit a robbery. You’d think this would cause some kind of post-traumatic stress disorder, or at least at a minimum, nightmares. But it looks like instead, Abby Dean of Washington, WI, will have dreams of flying around with a ca...
09/03/2014
By now you’ve heard that Jennifer Lawrence’s (and other celebs’) cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the “Find My iPhone” app. Someone anonymously posted nude photos of Jennifer Lawrence and Kate Upton to t...
09/03/2014
Online credit card fraud is flourishing, according to the U.S. Retail Fraud Survey 2014. One of the reasons is because online sales are ever on the increase, currently accounting for 6 percent of total sales, says the report, the most extensive of its kind. The projection is that within three yea...
09/02/2014
If ever there were a heartless robber, it’s the one (or two/three?) who stole a little dog named Pepper, a schnauzer-poodle mix, as part of their burglary in New Jersey. Barbara August, the homeowner, said, “I’m devastated—I keep thinking I’m seeing her.” She wonders why the burglars didn’t just ...
09/01/2014
If you’re wondering if businesses, who’ve been targets of cybercrime, have been properly handling the fallout, you have company: The U.S. Securities and Exchange Commission. The SEC is investigating this very issue. Key Questions Include: Did the businesses adequately protect data? Were investors...
08/31/2014
Rainmaker
1,064,685

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
local_phone(617) 329-1182
Contact The Author