Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2014 

Lock this guy up for good. That’s a most fitting motto for Brandon McIntyre, 22, who pretended he was “Katie Thompson” on Facebook and threatened to kill a girl’s family if she refused to go on trips with him. This New Jersey nutcase made another ridiculous threat (ridiculous, because, how could ...
10/15/2014
The recent celebrity photo hacks are an unfortunate reminder of how devastating or embarrassing it can be to have your data compromised.  But celebrities are not the only ones getting hacked. Cybercriminals aren’t choosy—they’ll send malicious texts, emails, and website links to Jennifer Lawrence...
10/14/2014
Hacking isn’t just about weak passwords and single-factor authentication. A lot of it occurs because people can be so easily tricked into giving up personal information: the craft of social engineering. Example: “Download this video of Kim K fully naked!” How many men would be lured into clicking...
10/13/2014
A chain is only as strong as its weakest link. This common phrase can be applied to almost anything. In the security industry we call this a “vulnerability” or the “path of least resistance”. In your home, in regards to home security, this weak link is often your front or back door. If you take a...
10/12/2014
Imagine being overseas, and in the process of using your credit card to make a purchase—and it’s declined—and you have no currency or checkbook. Nightmare. The decline could be to prevent fraudulent use; perhaps it was recently reported lost, but then found or the country you are in is known for ...
10/10/2014
The threat of data theft follows travelers; there’s never a vacation from hackers. So what should the traveler do? Anticipate snooping by hackers. This way, you can prepare for the worst. If you must bring a laptop, use it as a shell to access data remotely. Leave private information behind. If t...
10/09/2014
If a loved-one has gone missing, the first thing you should do is call the police. That sounds obvious, but how many times have you read about parents or spouses who delayed calling the police (even though they weren’t involved in the abduction)? 1. A myth is that there’s a waiting period before ...
10/08/2014
Don’t be part of the “I’ll never get hacked” camp. Do you really think it won’t happen to you? If so, it’s: Because you think no phishing e-mail could get past your radar. Just because you can spot a Nigerian scam doesn’t mean you can’t be tricked. Phishing campaigns today are ingenious and sophi...
10/07/2014
Keeping your hard drive in tip-top shape is key to a well-running computer. A crashed hard drive means smacking a big wet-one goodbye to all of your data. Eliminate Unnecessary Data De-clutter the drive to make its workload easier. One way of de-cluttering is to uninstall programs you never use (...
10/06/2014
Those cutesy photos in your phone of your puppy can reveal your location because the images leave footprints leading straight to your home. The trace data is called EXIF: exchangeable image file format. It may contain GPS coordinates of where you took the photos. Apple’s and Google’s smartphones ...
10/04/2014
Rainmaker
1,069,535

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
local_phone(617) 329-1182
Contact The Author