Planning To Travel Safely And Securely

Whenever you travel, “know before you go”.

“When you travel abroad, the odds are you will have a safe and incident-free trip. Travelers can, however, become victims of crime and violence, or experience unexpected difficulties. No one is better able to tell you this than the U.S. consular officers who work in more than 250 U.S. embassies and consulates around the globe. Every day of the year, U.S. embassies and consulates receive calls from American citizens in distress.”

I like Mexico. But Mexico has made the news over and over due to their “Narco Wars”. 10’s of thousands have been murdered and kidnapped in many of the border towns all the way down to Acapulco. So where do I vacation? Mexico. It’s an easy trip, its economically smart, it’s usually warm and sunny, the food’s good, the people are great, and there’s always a good story to tell. I do my homework and understand where the risks are and aren’t.

Despite the Travel Warning from U.S. DEPARTMENT OF STATE Bureau of Consular Affairs, I recently planned a trip to Acapulco. Specifically, Acapulco isn’t considered a high risk destination for Americans; the issues are primarily with Mexican on Mexican violence. And then an email alert came in “27 deaths, including 14 decapitated, rock Acapulco” “The image of this beach mecca has taken a new hit from Mexico’s drug violence, with 27 people killed in less than a day, including 14 men whose bodies were found with their heads chopped off at a shopping center.”

In a panic, I canceled that trip. Thank you for being so cool Delta Airlines! I didn’t cancel because of the threat of being decapitated; I canceled because the “energy” and thought of pure evil within an eyeshot would simply take the fun out of a vacation.

#1 Always visit Bureau of Consular Affairs at Travel.State.Gov. This is one of the best sites on the Internet for travel security awareness.

#2 Register with the US Embassy or Consulate and inform them and relatives of your exact travel plans. If your destination becomes unstable, the embassy will make you aware of the current climate. Know your options for medical care.

#3 Get your shots, including Hepatitis A and B and Tetanus/diphtheria vaccinations. Malaria and other intestinal virus can ruin a trip or even kill you.

#4 Get medical travel insurance. This doesn’t need to be complicated. Call your existing insurance company and see what your options are.

#5 Get trip insurance. With travel being so crazy hectic, manmade and natural disasters and people lives so complicated, there is a good chance you will need to cancel your trip.

#6 Ensure peace of mind when you travel with a home security system that you can monitor remotely.

Video is available through ADT Pulse which provides customers with anywhere, anytime access to their home via smart phones or personal computers, including an iPhone application to:

• Arm and disarm their home security system.

• Get notified of alarms and selected events via email and text messages as well as video clips.

• View their home through cameras and watch secure real-time video or stored video clips of events from monitored areas of the home.

• Access lights and appliances or set schedules to automate them.

Robert Siciliano personal and home security specialist to Home Security Source discussing  Home Security on NBC Boston.

McAfees 10 Tips To Secure New Devices and Guard Against Cybercrime in 2011

Here are some practical tips from McAfee to ensure optimal Internet safety and security in 2011:

Be aware that threats aimed at mobile phones are growing – Use software that backs up smart devices and use strong discretion when storing, saving or editing personal information on your smartphone or device. Don’t keep all of your personal passwords on your device, and avoid using it to store financial information like credit card and bank account numbers.

Keep in mind that gaming and entertainment devices are now Internet-connected – Many people don’t realize that their new gaming console may represent another port of entry for cybercrooks into their household. Some Internet TV applications can expose personal information, so be sure to install anti-virus software, two-way firewalls, anti-spyware, anti-phishing, and safe search capabilities, just as you would on a PC. Block free browser access via these devices and use parental controls wherever possible to ensure the safety of children who play interactive games.

Use technologies to protect information on USBs – Secure USB sticks by encrypting information, making it unreadable to someone who has taken or found it. In addition, install security software to protect portable hard drive devices and never leave such devices unattended.

Make sure that you are using a comprehensive security software platform for your PC– Free point solutions may work well for specific concerns and known threats, but it won’t protect you against emerging threats and is usually only being offered to get you to buy more comprehensive software. Ensure that it is comprehensive – meaning it has anti-virus with cloud computing, a two-way firewall, anti-spyware, anti-phishing and safe search capabilities.

Invest in identity theft protectionYour identity is you’re your most valuable asset. And with all your information contained and transmitted on your devices you need comprehensive coverage to protect you from identity thieves.

Make sure to transfer your PC best practices to all of your Internet-connected devices If you have an Apple device, Apple’s MobileMe service is available, providing tools for synching, backing up and securing data. Consider installing security software for new Internet connected devices such as smartphones, and make sure the device’s Wi-Fi is connected to a secure network.

Pay attention to your children’s online activities Communicate with children about cybercrimes, monitor their web activity and consider keeping the family computer in a common space to minimize their exposure to inappropriate content. For additional advice on child safety, visit the McAfee Family Internet Safety Center at www.mcafee.com/family and 10-Step Internet Safety Plan For Your Family.

Search and shop safely Before submitting credit card numbers or other personal information, always read the online vendor’s privacy and security policy. Consider using a trusted website safety advisor, such as McAfee® SiteAdvisor® software, included in all of McAfee consumer security suites, to determine which ecommerce sites are safe. Also, look for the McAfee SECURE™ trustmark before heading to the check-out counter.

Back up critical information Guard against data loss by utilizing a regular back-up software program to ensure that all critical information and personal files are safe in case of emergency.

STOP. THINK. CONNECT. is the first-ever coordinated message to help all digital citizens stay safer and more secure online. The message was created by an unprecedented coalition of private companies, nonprofits and government organizations

Robert Siciliano is a McAfee Consultant and Identity Theft Expert. See him discussing how a person becomes an identity theft victim on CounterIdentityTheft.com (Disclosures)

Craigslist Scams Are A Persistent Threat

Craigslist is a staple of my internet experience, even though I have a love/hate relationship with it. I love it because lots of people use it faithfully and the deals and the ability to recycle opposed to buy new or throw away. I hate it because people who use it are often unreliable and the persistent security issues.

There are no shortage of scammers and low life thugs who use Craigslist as a platform to dupe and hurt people. Just this week in Boston, Fox News reports “Mother and son used Craigslist to scam people into renting fake apartment”

“Police say a mother and son scammed people out of $4,000 by trying to rent out an apartment that was not theirs. Police believe they took out a Craigslist ad and took deposits for an apartment they were living in for a short time.  Medford police say they have received at least 4 reports from people saying they fell for the scam.  It was not until the first victim’s moving truck arrived that the scam was realized.”

In the same week Bob Sullivan from MSNBC reports “Craigslist ‘robberies by appointment’ turn violent”

“The sleepy suburban neighborhood in Bogota, N.J., looked safe when Michael pulled up to meet the man who had offered to buy his MacBook after seeing an ad on Craigslist. And everything seemed perfectly normal when the buyer walked up to his car and began counting out cash. But then a second man appeared seemingly out of nowhere and shoved a shotgun in Michael’s face.”

Craigslist should be used with caution. People have been robbed, burglarized, scammed and in some cases their homes were invaded and some people have been killed. With Craigslist, be very careful who you contact and who contacts you. You never know who the person is or what their motivation may be.

ID pre meeting. Get their name and cell phone number ahead of time. And call them back to verify. Tell them your brother the cop will be there so they shouldn’t be alarmed when they pull up and see a police cruiser.

Never meet in private. Meet at a public location that involves lots of other people. The more eyeballs the better.

Trust your gut, and don’t discount any troubling feelings you might have about your meeting. If anything seems wrong, then it IS wrong. Cancel if necessary.

Enlist a friend whenever possible. There is strength in numbers. Predators thrive on isolation. By paring up, you reduce the chances of being attacked.

Look street smart. Don’t wear expensive jewelry or provocative clothes. Scarves and loose fitting clothing give attackers something to grab. Wear shoes you can run and kick in

Unaware creates risk. Unfortunately there is risk in meeting someone you don’t know.  Being guarded can keep you from getting into a vulnerable situation.

Stay in communication. Make it known to your spouse or a friend where you are going and when you will be back. Have them on your cell phone while you are meeting.

Robert Siciliano personal and home security specialist to Home Security Source discussing  scammers and thieves on The Big Idea with Donnie Deutsch

The Decades Top 6 Stupid Criminals

The decade was filled with stupid criminals.  Here is a list of the top six stupid criminals.

Lawn Mower Getaway: AOL reports Sheriff’s deputies in Florida were searching a house for stolen property when they got a tip that one of the suspects was trying to make his escape nearby, according to TampaBay.com. Officers reportedly found him not far from his home attempting to flee on a ride-on mower.

Black Marker Burglars: The key to a successful robbery is not getting caught. These two clowns decided to use permanent marker as makeup.

I’ve Been Looking For That! Guy gets pulled over for a minor traffic violation and cops find pot in the car. Also in the trunk, cops discovered a bong inside a plastic shopping bag. Excited, the criminal thanked law enforcement officials for finding the water pipe, which he purchased for $150 and assumed a roommate, had stolen when he couldn’t find it.

MySpace Burglar: Kid breaks into a home and logs into the family’s home PC to his MySpace page. When he realized he was seen in the home he fled, forgetting to LOG OUT!!!!!!!!!

Stupid Facebook Status: Thief siphons $200,000 from a bank. Lives it up in Mexico, brags all day on Facebook, friends a Department of Justice Official, now he is rotting in a Mexican jail That’s dumb.

Robert Siciliano personal and home security specialist to Home Security Source discussing burglar proofing your home on Fox Boston.

Montana Town Sees Significant Rise in Identity Theft

Montana is “Big Sky Country.”  With guns, beer, fishing rods, and meat are sold at gas stations, some argue that it should be called the “Don’t Mess With Me” state.  Butte, MT had Evel Knievel, and he was one tough cookie.

And Butte, like many cities and towns across the country, is facing an identity theft epidemic. The Butte police recently received a staggering 135 identity theft reports in one week!

The Montana Standard reports, “Sheriff John Walsh said the Secret Service suspects the identity thefts may have occurred earlier this year and that the charges are just starting to be made. The unauthorized purchases are common this time of year because it’s the holiday season and clerks are often too busy to check for proper identification, authorities said.”

Walsh has been a victim of credit card fraud himself, with his debit card being used to run up about $900 in fraudulent charges at grocery stores, restaurants, and other businesses.

This type of fraud generally occurs when a bank or retailer’s server is breached. Customer accounts stored on the server are then taken over and used for unauthorized transactions. Your information could be compromised today, but the identity thief might wait months before using it to make the first fraudulent charge.

It’s very important to pay attention to your statements and refute any unauthorized charges immediately. Legally, you are only protected for up to 60 days after an unauthorized charge on your credit card, and an even shorter length of time for unauthorized debit card transactions. Reconcile your online statements weekly, and shred paper statements before discarding.

McAfee Identity Protection includes proactive identity surveillance, which monitors for subscribers’ credit and personal information in online black market forums. Subscribers have access to live fraud resolution agents who can help subscribers work through the process of resolving identity theft issues. For additional tips, please visit CounterIdentityTheft.com.

Robert Siciliano is a McAfee consultant and identity theft expert. See him explain how a person becomes an identity theft victim on CounterIdentityTheft.com (Disclosures)

Data Leakage is a Correctable and Solvable Problem

WNYT.com reports “the Social Security Administration in New York City says that 15,000 Social Security numbers were stolen by a subcontractor who was working in Office of Temporary Disability Assistance making computer infrastructure upgrades.”

In this case the culprit is a subcontractor and succeeded either because he had the contractor’s credentials/passwords and/or the files containing the SSN info weren’t encrypted.

The problem with protecting only with userid/passwords is well understood. Passwords are generally 123456 or otherwise easily cracked. Even if the password is a good one, chances are it is used on dozens of other sites that don’t do a good job of protecting it.

In this case the password gave a “good guy” access and he went rougue.

Some organizations think that deploying Full Disk Encryption (FDE) or File and Folder Encryption (FFE) provides them the desired security level. The point often missed is that even with Full Disk Encryption or File and Folder Encryption in place, users with correct credentials can access, copy, transfer/download to USB sensitive data without any problem.

I’ve said this before and I’ll say it again: Zafesoft can prevent such incidents from both of the above. Company administrators can remove access for a suspected malicious insider at any time and even if they have the physical file with them, it’ll be in encrypted format which they won’t be able to open.

Secondly, the Zafe technology travels with the information so they wouldn’t have been able to open the files even they were a legitimate user unless they were also using an approved laptop that has been registered and authorized with the company.

Moreover the moment they copied the data and tried to open it on a non-authorized laptop an alert would have gone to Company administrators alerting them of a possible theft and they could have prevented the incident from happening.

Robert Siciliano is a Personal Security and Identity Theft Expert. See him discussing another databreach on Good Morning America. (Disclosures)

5 Ways to Update Your PC for the New Year

Out with the old and in with the new. In my household, closets, cabinets, and drawers are purged and reorganized during the last two weeks of December. Anything that hasn’t been used in the past year, is tossed, donated, or recycled. I rarely put anything into storage, since that generally means I’ll never use it again. This process makes room for new Christmas gifts, and clearing out stuff clutter also helps disperse mental clutter.

During the first two weeks of January I do the same thing with gadgets and technology. To get your PC organized and efficient, follow this process:

1. Go through your files, deleting and organizing as necessary.

2. Back up your data. McAfee offers unlimited online backup for $5 a month. For local backup, the 2TB Western Digital MyBook for $99 can’t be beat.  I use both, plus redundant local drives, and I keep them in sync with GoodSync. Including online backup, I have three to four versions of every file.

3. Organize your software. Gather all the disks and serial numbers and back them up in two or three locations. I have all my software on CDs or DVDs, and I’ve also ripped (ripping is the process of copying audio/video/software to a hard disk) into organized folders on external drives. This includes all your drivers, recent versions of browsers, antivirus and anti-spyware software, and any free applications you use.

4. Download and run Belarc Advisor, a free utility that takes a snapshot of your entire system and tells you everything that’s installed, including serial numbers, and helps you identify bloat (bloat is when computer programs have many unnecessary features that are not used by end users). Print it out or turn into a PDF with free PDFCreator.

5. Reinstall your operating system. (This is easier than it sounds.) Reinstalling your operating system every year or two eliminates bloat and malware and speeds up your PC. Once you’ve followed the first four steps, the reinstall process is easy and efficient. It sometimes takes a second try to get it right, but once it’s done it’s done. Just search online for your operating system’s reinstall requirements. It is always best to have a second Internet-connected PC at your disposal, so if you do run into problems you can search for help online. Once the reinstall is complete, go to “Windows Update” in your control panel or programs menu to update your operating system’s critical security patches.

If you elect not to reinstall your operating system, at least complete the first four steps, and then proceed to “Windows Update.”

Robert Siciliano, personal security expert contributor to Just Ask Gemalto, discusses hackers hacking hotels on CNBC. Disclosures

Home Invasion Victim Shot With His Own Gun

Years ago, I appeared on the Maury Povich show to discuss weaponry. The producers called me to discuss a show they had in mind where the shows subjects were those facing jail time or in jail because they killed their attackers.

In each case, it was their word against a dead mans. Some of the subjects were victims of domestic violence where others were victims of home invasions or stalking. The producers asked me what the subjects could have done differently so they wouldn’t be facing jail time. My response was “use non-lethal weapons” opposed to lethal such as guns or knives.

While I believed this was (and still is) a sensible alternative, I was booed and ridiculed. Even Maury thought my suggestion was poor. I further suggested placing non-lethal weapons like pepper spray strategically throughout the home as a layer of defense. Again, I was ridiculed. It’s not that I’m anti-gun, it was, and is an alternative. Another option.

I know that you don’t bring a knife to a gunfight. I understand non-lethal doesn’t always work. I get that people love their guns. I also know that when you kill someone it’s your word against a dead mans and facing life in prison is an option even when you shoot and kill an intruder in your own home.

Plus, there is always the chance that the same weapon can be used against you.

The New York Times reports that a “New York man suffered a bullet wound to his leg after being shot with his own gun during a struggle with an intruder when a man entered his home through an unlocked door around 9:30 a.m. The homeowner grabbed a .22-caliber rifle and confronted the intruder. Police say the two men got into a struggle, during which the gun went off, striking the homeowner in the lower leg. The intruder stole property from the home and fled.”

Call me crazy, but first, have a home security system that helps prevent the home invader from getting in. And while I’m sure there are plenty of stories that involve the homeowner shooting a killing the home invader, there are as many where the homeowner was shot with his own gun. What do you think?

Robert Siciliano personal and home security specialist to Home Security Source discussing Home Invasions on Maury Povich.

10 Tips to Post Holiday Home Security

For Christmas, one of my neighbors got a 60 inch LCD screen TV. I saw the same TV at Costco for $2000.00. Another neighbor got a Mac Book Pro. I saw this online for $2000.00. Another neighbor got a Nikon Digital SLR camera, and I saw this at Amazon for almost $900.00. These are neighbors I’ve never spoken to, ever. I know this because the boxes were prominently displayed in their trash like trophies one would put on a mantel in their living room.

Trash day is coming and burglars may case your neighborhood looking for boxes where electronics such as computers, flat panel TVs, game consoles and other re-saleable items are. Then, while you are at work, they just break into your home and take it.

It’s pretty obvious whose home and who is not when the lights are off or there is no car in the driveway. All a burglar has to do is ring a door bell to see of you are actually home. If no one answers they jiggle the door knob to see if it’s locked or not.  If it’s locked they will head to the back door and jiggle that.

Many times they will walk right in because people are often irresponsible and leave the doors unlocked because they believe “it can’t happen to me”. If the doors are locked they may try a few street level or basement windows. Brazen burglars will not waste any time and may break glass or use a crowbar and forcibly enter the residence.

For post holiday security, use these home security suggestions:

  1. Lock your doors and windows
  2. Install a monitored alarm system. Consider ADT Pulse.
  3. Give your home that lived in look
  4. Leave the TV on LOUD while you are gone
  5. Install timers on your lights both indoor and outdoor
  6. Close the shades to prevent peeping inside
  7. Use defensive signage
  8. Store item boxes for at least 90 days because if you have a defective product you will need the box for a return
  9. After 90 days tear up the box so it’s undistinguishable then recycle or put it in a black trash bag
  10. Update your home inventory. This is a good time to catalog/document/video tape what you own. Contact your insurer to discuss what they need to properly insure your new gifts.

Robert Siciliano personal and home security specialist to Home Security Source discussing burglar proofing your home on Fox Boston.

10 Considerations When Choosing a Home Security System

1.    Do some research. What is the installer’s reputation and history?  How large is the company?  How many current customers?  Is it local or nationwide?  Is their primary business security?

2.    How “new” is the home security product? Today’s home security systems are far more superior than those available in past years.

3.    Does the home security company offer monitoring? A reputable home security company should provide its own central station monitoring instead of having another company monitor for them.

4.   Does the home security company have redundant monitoring facilities? Make sure they have backup monitoring centers throughout the country in case of natural or manmade disaster.

5.   Does the home security company’s monitoring facility have back-up power? Find out if the monitoring facility has gas or electric-powered generators – as well as battery back-up to ensure that monitoring continues despite power failures.

6.    Spend time thinking about the “amount” of security you need. The basic elements of a standard system include a key pad, a control panel, a siren, an inside motion detector, at least two door contacts, as well as connection to a central monitoring station for around the clock coverage. I’d recommend cameras too.

7.    Secure your home from “hidden” household dangers. Equip your home with effective smoke, fire, carbon monoxide and flood detection systems.

8.    Ease-of-use and convenience to ensure a high level of usage. Be sure to choose something that can be armed and disarmed easily by all family members.

9.    Make sure the system you install has a battery back-up. If the power goes out, you want the monitoring and protection continuous.

1.    What other benefits does the company offer?

# A money-back service guarantee?

# Guarantee against theft?

# A relocation package so a new security system is installed in case you move?

# Is there a Web site that provides customer service?

# Is there a website that you can access your system and control it remotely?

Be sure to spend time with your security specialist to develop a security plan and system that meets you and your family’s specific needs.

Robert Siciliano personal and home security specialist to Home Security Source discussing Home Security on NBC Boston.