Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2016 

What’s sicker than raping a woman? Ordering her to phone her boyfriend so he could listen to the rape. But that was a good thing for a woman who was kidnapped last year. Her abductor drove her to the parking lot of an adult entertainment store in Georgia with the intent of raping her, reports WSB...
09/27/2016
The iPhone has a vulnerability called the Signaling System 7 (SS7) that allows crooks to hack into the device.This was demonstrated on a recent “60 Minutes” episode in which a U.S. congressman (with his permission) had his iPhone hacked by German cybersecurity experts. The white-hat hackers got h...
09/22/2016
A crook can steal your identity by taking control of your wireless phone account—by pretending to be you in person at the mobile store. The villain can then buy pricey mobiles and sell them—and guess who gets the bill but not the profit.Symptoms of Hijacked Account Suddenly losing service Your ca...
09/20/2016
Many years ago when you were on vacation, before Facebook, Instagram and Twitter were invented (assuming you were an adult then), you had a great time, right? You weren’t “connected,” because there was no social media to be connected with.If today you can’t imagine being disconnected from social ...
09/14/2016
Who’d ever think those silly little yellow circular faces and other such cyber symbols would become such a worldwide smash? I’m talking about emoticons, also known as emojis. Five years ago Apple put an emoji keyboard on its mobile devices. Six billion of these doggone things are sent every day.B...
09/12/2016
Ransomware thieves sure know how to pick their victims—institutions that store loads of highly critical data that they need on a daily basis, that without—even just 24 hours without—can have crippling effects. This form of cybercrime is growing by leaps and bounds.Recently a ransomware attacker s...
09/08/2016
If you have a strong password for your Amazon account, you may still want to consider beefing up the security with two-factor verification (or authentication), which will prevent a thief from accessing your account (which is possible if he gets ahold of your password and username somehow). Log on...
09/06/2016
Let’s cut to the chase: Regularly back up the phone’s data! If this is done every day, you won’t have to worry much about losing important information if something happens to the phone—such as a ransomware attack. Keep the phone’s software and applications updated. Delete apps you no longer use, ...
08/31/2016