Latest "Identity Theft Prevention" Posts

5th Day: Don’t Tell Facebook You Won’t Be Home for the Holidays

Holiday Security Tips: On the fifth day of Christmas, the experts gave to me, 5 Facebook fixes

In general, we share too much information on social media sites. During the holidays, we are positively intoxicated with the giving spirit! Without thinking, we share our holiday travel plans, click on seemingly charitable links or post pictures of a fun night out. And when you share with friends on Facebook, you are sharing with their friends and ultimately, most of the literate world. The problem is, some of those people aren’t really friends and only want to separate you from your holiday dollars.

Solution:  Apply these five fixes to ALL of your social sharing (not just Facebook)

  1. Customize your privacy settings. Sixty percent of social network users are unaware that their default privacy settings let others into most of their personal information. Facebook does a decent job of explaining how to lock your privacy down(https://www.facebook.com/help/privacy) but you must spend at least 90 minutes going over the settings to properly protect yourself.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , ,

4th Day: Holiday Shopping Quiz – Is Credit or Debit Smarter?

Holiday Security Tips: On the fourth day of Christmas, the experts gave to me, 4 pay solutions!

True or False?

When you use a debit card, funds are more secure because they are drawn directly from your bank.

False.  While it’s true that funds are drawn directly from your bank, it actually makes it harder to get the money reimbursed while the issue is being resolved if fraud does occur.

 You can receive a reimbursement for debit card fraud up to a year later.

False.  Debit cards generally only reimburse fraudulent purchases if you catch them within 60 days.

 It is safer to use a credit card than a debit card.

True.  When you use a credit card, nothing is withdrawn from your bank account immediately. Pending transactions can take several days to clear. In addition, credit cards uniformly give you more protection than debit cards and your maximum liability is capped at $50.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , ,

3rd Day: Stopping Hackers When You’re Shopping on Wi-Fi

Holiday Security Tips: On the third day of Christmas, the experts gave to me, 3 stymied hackers!

Although you may trust the baristas at your local coffee shop to make that perfect Gingerbread Latte, you can’t always trust the person sitting next to you. Hackers can easily tap into Wi-Fi connections at public hot spots to steal your identity information, including credit card and bank account numbers. This can be especially dangerous during the holiday season when “hotspot sniffers” come out of the woodwork using free monitoring apps like Firesheep.

Solution: Stop shopping online using free Wi-Fi hotspots.

If you must shop online while out in public, take the following precautions:

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , ,

2nd Day: It’s Beginning to Look a Lot Like Christmas- at the Mall!

Two Turtle DovesHoliday Security Tips: On the second day of Christmas, the experts gave to me, 2 shopping tips…

Black Friday  and Cyber Monday will be here before you can say “Man, I ate a lot of turkey!”  Malls, stores, restaurants and cafés are exceptionally busy places during the holidays. This breeds a perfect environment for data thieves to make off with your identity goodies while you shop, dine or relax. It only takes a second to steal a purse from a shopping cart, a briefcase from your car or a smartphone, iPad or laptop from an unattended café table. Solution: Lighten your load and leave excess identity at home. 

  • Consider taking only your mobile phone, driver’s license and one or two credit cards with you shopping to minimize the number of identity storage devices you might misplace. If you can fit the items in your pockets, your security increases. If you must have a purse, use one that zips and hangs in front of you, or consider using a backpack that stays on you at all times.

Posted in Identity Theft Prevention, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , , , , ,

12 Days to a Safe Christmas: Prevent Holiday Identity Theft

Holiday Security Tips: On the first day of Christmas, my expert gave to me, the keys to secure my privacy.  

If I could give the world a gift this holiday season, it would be to make the world a safer place to trust. You deserve to know whether or not you can trust the politicians you elect, the advice you receive from your doctor and whether or not you can entrust your privacy to the websites and businesses you use every day.

Identity theft, cyber stalking, and “big data” surveillance—these byproducts of the information economy make it hard to rest easy. Every day in the news we hear about another scam, another breach of corporate data that victimizes more than 11 million Americans a year. But you don’t  have to be a statistic!

 Solution: Give yourself a gift by paying attention to prevention.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , ,

Android Flashlight App Shines Light on Your Data

Android flashlight app

Android flashlight apps harvesting your data for marketing & cyber crime.

You LOVE that flashlight app you have on your smartphone, right?  Whether you’re in that dark restaurant with a size 2.5 font or wanting to share your love at a concert or finding your keys in your purse…you wonder, how did you ever live without it?

Well, it turns out the creators of that wonderful app love it, too, because it has become a way for them to get ahold of your personal data to use or sell.

Android devices seem to be especially vulnerable.  Snoopbit studied the top ten Android flashlight apps and discovered that every one of them collects unnecessary user data and accesses areas of the device completely unrelated to the purpose of the app.  This includes having the ability to read phone status and identity, view Wi-Fi connections, modify system settings, obtain full network access, and determine your precise location via your phone’s GPS, among other permissions.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: ,

GameOver Zeus Virus Test

gameover zeus

The original notice on GameOver Zeus appeared on the US-CERT site. If you’d like to go directly to the tests for the GameOver Zeus virus, scroll down.

Overview of GameOver Zeus

GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware identified in September 2011, [1] uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and the Department of Justice (DOJ), is releasing this Technical Alert to provide further information about the GameOver Zeus botnet.

Systems Affected by GameOver Zeus Virus

  • Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
  • Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012

Impact of GameOver Zeus

A system infected with GOZ may be employed to send spam, participate in DDoS attacks, and harvest users’ credentials for online services, including banking services.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

Apple Pay Makes Mobile Payments Sexy; But Secure?

Is Apple Pay going to be secure?

Apple has us ooing and ahhing about the iPhone 6, it’s big brother the 6+ and finally the Apple Watch. But the biggest announcement of all didn’t even have to do with gadgets. The most significant announcement was about a new service that will be built into those devices…

It is Apple Pay, Apple’s own version of a “mobile wallet” that will allow Apple users to pay for items with just a tap or wave of their device. That is if those items happen to be in stores that have agreed to install the technology necessary to allow near-field communication (NFC – no not the football conference, the radio-wave technology) to work. Of course, Apple has done the background work to ensure a lot of big names (MC, Visa, AMEX and retailers such as Target, Macy’s and McDonald’s to name a few) are already on board, which is a significant mark in their favor.  And with the upcoming mandatory implementation of EMV technology, Apple may have just timed this perfectly.

Posted in Cyber Data Security, Identity Theft Prevention, Sileo In the News by Identity Theft Speaker .
Tags: , , , , , ,

3 Steps to Stop Wallet / Purse Identity Theft

One of the quickest identity theft prevention tips is to protect your purse or wallet from being stolen. Here are three tips from ID theft expert John Sileo on protecting wallet identity.

IDT Recovery Guide

John Sileo is an an award-winning author and keynote speaker on identity theft, internet privacy, fraud training & technology defense. John specializes in making security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includes appearances on 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.

 

 

 

Screen Shot 2014-08-22 at 8.06.57 AM

Posted in Burning Questions (Video), Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,