Military Members Face Identity Theft Threat

Service men and women face an elevated level of identity theft due to the ubiquitous use of the Social Security number (SSN) both here and abroad.

Military personnel use their SSNs for a variety of reasons every day from everything including on various forms, IDs, access to facilities, and in Iraq they have it painted on their laundry bags.

A report published in the New York Times says “Service members and their families are burdened with a work environment that shows little regard for their personal information,” the report says, adding that the service members, “their units, military preparedness and combat effectiveness all will pay a price for decades to come.”

For the past 70 years, the Social Security number has become our de facto national ID. The numbers were first issued in the 1930s to track income for Social Security benefits. But functionality creep, which occurs when an item, process, or procedure ends up serving a purpose that it was never intended to perform, soon took effect.

Here we are, decades later, and the Social Security number has become the key to the kingdom. You’re forced to disclose your Social Security number regularly, and it appears in hundreds or even thousands of files, records, and databases, accessible to an untold number of people.

“Children of military personnel as young as 10 carry ID cards with Social Security numbers, as do their parents.”

Identity theft can happen to anyone. McAfee Identity Protection offers proactive identity surveillance, lost wallet protection, and alerts when suspicious activity is detected on your accounts. McAfee Identity Protection puts victims first and provides live access to fraud resolution agents who work with the victim to help restore their identity. For additional tips, please visit http://www.counteridentitytheft.com.

Robert Siciliano is a McAfee Consultant and Identity Theft Expert. See him discussing Social Security Numbers as National IDs on Fox News. (Disclosures)

Stolen Laptop Contained Prostate Cancer Research Data

News9 in Oklahoma reports “An Oklahoma couple is urging thieves to return a stolen computer they say has the power to save millions of lives. The couple stopped at Panera to grab a meal before heading back to the lab. When they finished, they found their car windows broken and the laptop gone. Unfortunately, most of the data was never backed up, a mistake Shin said could be a major setback in the fight against cancer.”

OMG!!! Frankly, sometimes it is the smartest people that lack the most common sense!!!

In 2003, an estimated 1.5 million laptops were stolen worldwide. Today, that number has climbed to 2.6 million. That’s a 70% increase in just a few years. That’s one stolen laptop every 12 seconds.

Protecting a laptop from theft begins with backup up the data on it. While backing up data isn’t protecting the laptop from theft, but in the end, that is really all that matters. Laptops today are as little as $300.00 and the data on it could be worth millions. And in this case, it is worth lives.

I use a laptop and there isn’t any data on it other than movies. The laptop is used to access my PC where my data is stored and backed up.

Either way for $5.00 a month you can get unlimited backup that syncs your data in the cloud. In addition, backup your data on local drives. I use the Western Digital MyBook drives and have all my data backed up twice and automatically synced with Goodsync.

My data isn’t cancer research, but if I lost all of it, I’d want to die.

Robert Siciliano personal and home security specialist to Home Security Source discussing self defense on Fox Boston.

New Consumer Electronics Security Lacking

Early adopters of new technology often discover bugs, quirks, imperfections, and security issues before a product is widely adopted. That’s why I usually wait six to eight months for companies to fix their flaws.

Researchers discovered they could hack into Internet-ready HDTV’s. One of the top five best-selling TVs left its security process vulnerable to attack, allowing a hacker to compromise the data transmitted between the TV and websites that provide content. The report states that any website could be spoofed, and the spoofed site made to appear onscreen. The fake site could resemble a video download site, for example, and request credit card information for a movie purchase. Researchers also found that they were able to monitor data being sent from the TV to the Internet.

The New York Times reports:

“[This] test also illustrates what security experts have long warned: that the arrival of Internet TVs, smartphones and other popular Web-ready gadgets will usher in a new era of threats by presenting easy targets for hackers. As these devices become more popular, experts say, consumers can expect to run into familiar scams like credit card number thefts as well as new ones that play off features in the products. And because the devices are relatively new, they do not yet have as much protection as more traditional products, like desktop computers, do.”

Proposed solutions include software fixes and biometric authenticators, such as fingerprint readers and facial recognition technologies. Intel, the chip maker, recently bought McAfee a security software company , saying that they plan to incorporate McAfee’s security into gadget hardware.

In the meantime, consider waiting it out before you jump in. If already own this type of TV, be cognizant of the scam and beware of unauthorized charges to your card.

Robert Siciliano, personal security expert contributor to Just Ask Gemalto, discusses another databreach on Fox News. Disclosures



Top Targets for Emerging Threats in 2011

This McAfee Labs list comprises 2010’s most buzzed about platforms and services, all of which are expected to be major targets for cybercriminals in the coming year.

Exploiting Social Media: URL-shortening services
With more than 3,000 shortened URLs being generated per minute, McAfee Labs expects to see a growing number used for spam, scamming, and other malicious purposes.

Exploiting Social Media: Geolocation services
Locative services can easily search, track, and plot the whereabouts of friends and strangers. Cybercriminals can see what users are saying and where they are located in real time, as well as their interests and which operating systems and applications they are using.

Mobile: Usage is rising in the workplace, and so will attacks
2011 will bring a rapid escalation of attacks and threats to mobile devices, putting user and corporate data at very high risk.

Apple: No longer flying under the radar
The popularity of iPads and iPhones in business environments, combined with the lack of user understanding of proper security for these devices, will increase the risk for data and identity exposure.

Applications: Privacy leaks—from your TV
New Internet TV platforms were “rushed to market” by developers, and some lack security. These apps will target or expose privacy and identity data, and will allow cybercriminals to manipulate a variety of physical devices through compromised or controlled apps.

Sophistication Mimics Legitimacy: Your next computer virus could be from a friend
Malicious content disguised as personal or legitimate emails and files to trick unsuspecting victims will increase in sophistication. “Signed” malware that imitates legitimate files will become more prevalent, and “friendly fire,” in which threats appear to come from your friends, will grow.

Botnets: The new face of Mergers & Acquisitions
Botnets continue to use a seemingly infinite supply of stolen computing power and bandwidth. McAfee Labs predicts that the recent merger of Zeus and SpyEye will produce more sophisticated bots.

Hacktivism: Following the WikiLeaks path
Politically motivated hacks will proliferate and new, more sophisticated attacks will occur. More groups, consisting of individuals claiming to be independent of any particular government or movement, will follow WikiLeaks’ lead.

Advanced Persistent Threats: A whole new category
Operation Aurora gave birth to the new category of advanced persistent threat (APT)— a targeted cyber espionage or cyber sabotage attack carried out under the sponsorship or direction of a nation-state for something other than pure financial/criminal gain or political protest.

Robert Siciliano, personal security expert contributor to Just Ask Gemalto, discusses credit and debit card fraud on CNBC. Disclosures


11.7 Million Identity Theft Victims Occur Per Year: Are You Next?

According to Bureau of Justice Statistics, 5% of U.S. residents over the age of 16 fell victim to identity theft within a two-year period. More than half of those affected were victims of credit card fraud.

Identity theft was defined in the survey as the attempted or successful misuse of an existing account, such as a debit or credit account, misuse of personal information to open a new account, or misuse of personal information for other fraudulent purposes, such as obtaining government benefits.

Nationwide 1 out of 4 of those victims faced out of pocket loses of an average $1,870.00. Total losses exceeded $17 billion dollars.

More and more banks and credit card companies are getting better at detecting and preventing fraud in addition to offering zero liability policies. However there is still a significant dollar loss as the public is still being victimized at a staggering rate.

People are victimized in a number of ways including run of the mill scams, advanced fee scams, dumpster diving, mail theft, email phishing and criminal computer hacking.

The study further showed ages 65 and older were least likely to be victimized while those under 35 are much bigger targets. Those with incomes of $75,000.00 are more likely targets.

  1. Invest in a locking mailbox
  2. Shred everything disposable that has personal information
  3. Protect your PC with updated anti-virus and critical operating system security patches
  4. Beware of scams and ruses trying to separate you from your money
  5. Pay close attention to bank and credit card statements and refute unauthorized charges within 60 days.
  6. To ensure peace of mind —subscribe to an identity theft protection service, such as McAfee Identity Protection, which offers proactive identity surveillance and lost wallet protection. Backed by $1 million Guarantee, if your credit or debit cards are ever lost, stolen or misused without your authorization, you can call McAfee Identity Protection and they’ll help you cancel them and order new ones. Please see Guarantee for details.

For additional tips, please visit http://www.counteridentitytheft.com

Robert Siciliano is a McAfee consultant and identity theft expert. See him explain how a person becomes an identity theft victim on CounterIdentityTheft.com (Disclosures).

Is It A Home Invasion Or A Burglary?

There has been lots of media attention on home invasions due to their frequency and the brutality that accompanies them.

A home invasion is much like a bank robbery when the robbers use force to get what they want. Robbery as defined in Wikipedia is the crime of seizing property through violence or intimidation. At common law, robbery is defined as taking the property of another, with the intent to permanently deprive the person of that property, by means of force or fear. Robbery differs from simple theft, a break-in or burglary on its use of violence and intimidation.

Burglary on the other hand generally involves criminals who prefer the home is without occupants. They may impulsively enter a neighborhood and seek out homes that are dark, no car in the driveway, mail piled up and the doors and windows are left unsecured.

Often they will case a certain home and determine the specifics of when the resident is gone. Often they will make an effort to get a phone number of the home by getting the family name from a placard on the side of the house or from information in the mailbox.

In both situations proper security can reduce risk. In my home the home security system is always on. This means whether home or not, any unlawful intrusion is met with a piecing alarm and an automatic call to the police.

Robert Siciliano personal and home security specialist to Home Security Source discussing  home invasions on the Gordon Elliot Show.

Planning To Travel Safely And Securely

Whenever you travel, “know before you go”.

“When you travel abroad, the odds are you will have a safe and incident-free trip. Travelers can, however, become victims of crime and violence, or experience unexpected difficulties. No one is better able to tell you this than the U.S. consular officers who work in more than 250 U.S. embassies and consulates around the globe. Every day of the year, U.S. embassies and consulates receive calls from American citizens in distress.”

I like Mexico. But Mexico has made the news over and over due to their “Narco Wars”. 10’s of thousands have been murdered and kidnapped in many of the border towns all the way down to Acapulco. So where do I vacation? Mexico. It’s an easy trip, its economically smart, it’s usually warm and sunny, the food’s good, the people are great, and there’s always a good story to tell. I do my homework and understand where the risks are and aren’t.

Despite the Travel Warning from U.S. DEPARTMENT OF STATE Bureau of Consular Affairs, I recently planned a trip to Acapulco. Specifically, Acapulco isn’t considered a high risk destination for Americans; the issues are primarily with Mexican on Mexican violence. And then an email alert came in “27 deaths, including 14 decapitated, rock Acapulco” “The image of this beach mecca has taken a new hit from Mexico’s drug violence, with 27 people killed in less than a day, including 14 men whose bodies were found with their heads chopped off at a shopping center.”

In a panic, I canceled that trip. Thank you for being so cool Delta Airlines! I didn’t cancel because of the threat of being decapitated; I canceled because the “energy” and thought of pure evil within an eyeshot would simply take the fun out of a vacation.

#1 Always visit Bureau of Consular Affairs at Travel.State.Gov. This is one of the best sites on the Internet for travel security awareness.

#2 Register with the US Embassy or Consulate and inform them and relatives of your exact travel plans. If your destination becomes unstable, the embassy will make you aware of the current climate. Know your options for medical care.

#3 Get your shots, including Hepatitis A and B and Tetanus/diphtheria vaccinations. Malaria and other intestinal virus can ruin a trip or even kill you.

#4 Get medical travel insurance. This doesn’t need to be complicated. Call your existing insurance company and see what your options are.

#5 Get trip insurance. With travel being so crazy hectic, manmade and natural disasters and people lives so complicated, there is a good chance you will need to cancel your trip.

#6 Ensure peace of mind when you travel with a home security system that you can monitor remotely.

Video is available through ADT Pulse which provides customers with anywhere, anytime access to their home via smart phones or personal computers, including an iPhone application to:

• Arm and disarm their home security system.

• Get notified of alarms and selected events via email and text messages as well as video clips.

• View their home through cameras and watch secure real-time video or stored video clips of events from monitored areas of the home.

• Access lights and appliances or set schedules to automate them.

Robert Siciliano personal and home security specialist to Home Security Source discussing  Home Security on NBC Boston.

McAfees 10 Tips To Secure New Devices and Guard Against Cybercrime in 2011

Here are some practical tips from McAfee to ensure optimal Internet safety and security in 2011:

Be aware that threats aimed at mobile phones are growing – Use software that backs up smart devices and use strong discretion when storing, saving or editing personal information on your smartphone or device. Don’t keep all of your personal passwords on your device, and avoid using it to store financial information like credit card and bank account numbers.

Keep in mind that gaming and entertainment devices are now Internet-connected – Many people don’t realize that their new gaming console may represent another port of entry for cybercrooks into their household. Some Internet TV applications can expose personal information, so be sure to install anti-virus software, two-way firewalls, anti-spyware, anti-phishing, and safe search capabilities, just as you would on a PC. Block free browser access via these devices and use parental controls wherever possible to ensure the safety of children who play interactive games.

Use technologies to protect information on USBs – Secure USB sticks by encrypting information, making it unreadable to someone who has taken or found it. In addition, install security software to protect portable hard drive devices and never leave such devices unattended.

Make sure that you are using a comprehensive security software platform for your PC– Free point solutions may work well for specific concerns and known threats, but it won’t protect you against emerging threats and is usually only being offered to get you to buy more comprehensive software. Ensure that it is comprehensive – meaning it has anti-virus with cloud computing, a two-way firewall, anti-spyware, anti-phishing and safe search capabilities.

Invest in identity theft protectionYour identity is you’re your most valuable asset. And with all your information contained and transmitted on your devices you need comprehensive coverage to protect you from identity thieves.

Make sure to transfer your PC best practices to all of your Internet-connected devices If you have an Apple device, Apple’s MobileMe service is available, providing tools for synching, backing up and securing data. Consider installing security software for new Internet connected devices such as smartphones, and make sure the device’s Wi-Fi is connected to a secure network.

Pay attention to your children’s online activities Communicate with children about cybercrimes, monitor their web activity and consider keeping the family computer in a common space to minimize their exposure to inappropriate content. For additional advice on child safety, visit the McAfee Family Internet Safety Center at www.mcafee.com/family and 10-Step Internet Safety Plan For Your Family.

Search and shop safely Before submitting credit card numbers or other personal information, always read the online vendor’s privacy and security policy. Consider using a trusted website safety advisor, such as McAfee® SiteAdvisor® software, included in all of McAfee consumer security suites, to determine which ecommerce sites are safe. Also, look for the McAfee SECURE™ trustmark before heading to the check-out counter.

Back up critical information Guard against data loss by utilizing a regular back-up software program to ensure that all critical information and personal files are safe in case of emergency.

STOP. THINK. CONNECT. is the first-ever coordinated message to help all digital citizens stay safer and more secure online. The message was created by an unprecedented coalition of private companies, nonprofits and government organizations

Robert Siciliano is a McAfee Consultant and Identity Theft Expert. See him discussing how a person becomes an identity theft victim on CounterIdentityTheft.com (Disclosures)

Craigslist Scams Are A Persistent Threat

Craigslist is a staple of my internet experience, even though I have a love/hate relationship with it. I love it because lots of people use it faithfully and the deals and the ability to recycle opposed to buy new or throw away. I hate it because people who use it are often unreliable and the persistent security issues.

There are no shortage of scammers and low life thugs who use Craigslist as a platform to dupe and hurt people. Just this week in Boston, Fox News reports “Mother and son used Craigslist to scam people into renting fake apartment”

“Police say a mother and son scammed people out of $4,000 by trying to rent out an apartment that was not theirs. Police believe they took out a Craigslist ad and took deposits for an apartment they were living in for a short time.  Medford police say they have received at least 4 reports from people saying they fell for the scam.  It was not until the first victim’s moving truck arrived that the scam was realized.”

In the same week Bob Sullivan from MSNBC reports “Craigslist ‘robberies by appointment’ turn violent”

“The sleepy suburban neighborhood in Bogota, N.J., looked safe when Michael pulled up to meet the man who had offered to buy his MacBook after seeing an ad on Craigslist. And everything seemed perfectly normal when the buyer walked up to his car and began counting out cash. But then a second man appeared seemingly out of nowhere and shoved a shotgun in Michael’s face.”

Craigslist should be used with caution. People have been robbed, burglarized, scammed and in some cases their homes were invaded and some people have been killed. With Craigslist, be very careful who you contact and who contacts you. You never know who the person is or what their motivation may be.

ID pre meeting. Get their name and cell phone number ahead of time. And call them back to verify. Tell them your brother the cop will be there so they shouldn’t be alarmed when they pull up and see a police cruiser.

Never meet in private. Meet at a public location that involves lots of other people. The more eyeballs the better.

Trust your gut, and don’t discount any troubling feelings you might have about your meeting. If anything seems wrong, then it IS wrong. Cancel if necessary.

Enlist a friend whenever possible. There is strength in numbers. Predators thrive on isolation. By paring up, you reduce the chances of being attacked.

Look street smart. Don’t wear expensive jewelry or provocative clothes. Scarves and loose fitting clothing give attackers something to grab. Wear shoes you can run and kick in

Unaware creates risk. Unfortunately there is risk in meeting someone you don’t know.  Being guarded can keep you from getting into a vulnerable situation.

Stay in communication. Make it known to your spouse or a friend where you are going and when you will be back. Have them on your cell phone while you are meeting.

Robert Siciliano personal and home security specialist to Home Security Source discussing  scammers and thieves on The Big Idea with Donnie Deutsch

The Decades Top 6 Stupid Criminals

The decade was filled with stupid criminals.  Here is a list of the top six stupid criminals.

Lawn Mower Getaway: AOL reports Sheriff’s deputies in Florida were searching a house for stolen property when they got a tip that one of the suspects was trying to make his escape nearby, according to TampaBay.com. Officers reportedly found him not far from his home attempting to flee on a ride-on mower.

Black Marker Burglars: The key to a successful robbery is not getting caught. These two clowns decided to use permanent marker as makeup.

I’ve Been Looking For That! Guy gets pulled over for a minor traffic violation and cops find pot in the car. Also in the trunk, cops discovered a bong inside a plastic shopping bag. Excited, the criminal thanked law enforcement officials for finding the water pipe, which he purchased for $150 and assumed a roommate, had stolen when he couldn’t find it.

MySpace Burglar: Kid breaks into a home and logs into the family’s home PC to his MySpace page. When he realized he was seen in the home he fled, forgetting to LOG OUT!!!!!!!!!

Stupid Facebook Status: Thief siphons $200,000 from a bank. Lives it up in Mexico, brags all day on Facebook, friends a Department of Justice Official, now he is rotting in a Mexican jail That’s dumb.

Robert Siciliano personal and home security specialist to Home Security Source discussing burglar proofing your home on Fox Boston.