Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2015 

It sounds almost like science fiction, even in this cyber age: A thief hacks into your computer and encrypts your files, meaning, scrambles the information so you can’t make sense of any of it. He demands you pay him a big fat payment to “unlock” the encryption or to give you the “key,” which is ...
09/14/2015
Darkode anyone? Not anymore. This underground bad hackers’ forum was recently demolished by the FBI, says a report on www.justice.gov. The dozen hackers associated with Darkode are facing criminal charges.Though there are about 800 of such forums, Darkode was among the worst (or shall I say “best...
09/10/2015
3 Comments
You take your car to the mechanic; it’s been making a funny grinding noise when you press on the gas pedal. The mechanic tells you what’s wrong and what needs to be fixed, then socks you with the estimate.How can you tell he’s not embellishing a lot of the “diagnosis”? You know nothing about cars...
09/09/2015
It is September and it’s National Preparedness Month—a great time to get involved in the safety of your community. Make plans to stay safe, and this includes maintaining ongoing communications. National Preparedness Month culminates September 30th with National PrepareAthon! Day.I learned in high...
09/08/2015
Some of us remember college dorm days, when students were envied if they had their own typewriter. These days, college students must have a personal laptop computer, and a smartphone, and their lives revolve around these connected devices.  Such dependency should be proactively protected from los...
09/08/2015
Wow, it’s true: The monster under the bed really does exist!Recently in New Jersey a man broke into a home and hid under a bed in a spare room for possibly five days before being arrested. Margaret Adamcewicz reportedly stated that the man, Jason Hubbard, had dated her daughter five years ago, an...
09/07/2015
Hackers with big skills and a big ego will be drawn to Facebook and Twitter as their targets. But they’ll also target dozens of other companies, reports an article on arstechnica.com.One group in particular stands out as the attackers, using zero-day exploits. They are known as Wild Neutron and M...
09/06/2015
About 7 a.m. on a Saturday a burglar entered a home through an unlocked side door (how anyone can sleep overnight while a door stays unlocked is a whole new article).The dumb criminal saw an iPhone and unknowingly triggered a video selfie—showing him standing in the living room during this recent...
09/06/2015
You’re sitting on your front porch. You see a stranger walking towards your property. You have no idea whom he is. But he’s nicely dressed. He asks to come inside your house and look through your bank account records, view your checkbook routing number and account number, and jot down the 16-digi...
09/04/2015
Have you ever seen men getting “attacked” by a police or military dog as part of the dog’s training? The men (I’ve never seen a woman, but I’d like to think there are some strong, feisty women who suit up for this role) wear either just a big padded thing on one of their arms, or they’re engulfed...
09/03/2015
Rainmaker
1,069,335

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
local_phone(617) 329-1182
Contact The Author