Why Should You be Careful When Using Hotspots or Free Wi-Fi?

These days, it’s not uncommon for us to connect to Wi-Fi wherever we go. In fact, we’ve come to expect there will be a Wi-Fi connection—at hotels, coffee shops, airports, and now even on some flights—pretty much everywhere. While the ability to connect just about anywhere is convenient, it also has opened the door for hackers to gain access to our personal information.

If you are using an unsecured connection—in public, at home or in the office—you run the risk of exposing your sensitive data to hackers. While it may seem strange to worry about bad guys snatching our personal information from what seems to be thin air, unfortunately, it’s more common than we think. If they hack the Wi-Fi connection you are using, they can not only see data stored on your computer, but see data you are typing into online sites.

Some hackers specifically search for unsecured wireless connections driving to different areas to find them and sit quietly across the street while accessing all your info. They also will often set up fake free Wi-Fi connections or hotspots specifically aimed to steal your information.

The good news is there are things you can proactively do to help protect yourself when using Wi-Fi connections:

Basic Connection Tips:

Turn off Wi-Fi. When you’re not using your Wi-Fi connection on any of your devices, it’s good practice to turn it off. That way it won’t automatically connect to any Wi-Fi that is in the area. And for your mobile devices, it will help save your battery life since your mobile will not be constantly searching for an available Wi-Fi connection.

Only connect to secure connections and save your sensitive searching for home. Make sure that any network you connect to away from home, such as those in cafes and hotels, are secure. You can tell when a network is not secured because you will see a message when you connect saying that you are “connecting to an unsecured network.” And if you are using an unsecured network, do not shop online or access any of your personal and financial sites.

Only use HTTPS. HTTPS, or hypertext transfer protocol (HTTP) with secure sockets layer (SSL, hence the S after HTTP), is a more secure option set up by a website owner who knows security is essential. Look for “HTTPS://” in the address bar to signify you are on a secure page. Even on an open, unsecured wireless connection, HTTPS is more secure than HTTP.

Tips to Protecting Your Home Wireless Connection:

Password protect your Wi-Fi connection. You can set your router to allow access only to those users who enter the correct password. These passwords are encrypted (scrambled) when they are transmitted so that hackers who try to intercept your connection can’t read the information.

Change the password on your router. Router manufacturers usually assign a default user name and password allowing you to setup and configure the router. Hackers often know these default logins, so it’s important to change the password to something more difficult to crack so your router settings cannot be changed by a hacker.

Change the identifier on your router. Each router is also assigned a default identifier, or Service Set ID (SSID), by its manufacturer. This ID is usually broadcast by the router to announce its presence to any devices in the area. Once again, hackers have done their homework and use default IDs to try to gain access to your network. Your best bet to keeping the bad guys out is changing the identifier to something only you know. For some routers, you can also turn off the broadcasting of this ID, so it can’t be seem by other devices when trying to connect.

Knowing that you could be vulnerable on Wi-Fi connections is a good first step to taking the proper precautions to protect your data and information.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  Disclosures.

Does Identity Theft Protection Really Work?

Do identity protection service really work? How effective are their scanning/monitoring methods? Can they truly protect consumers? The answers may vary. Identity theft protection is designed to protect you from new lines of credit being opened in your name—and along with the recovery/restoration component, it’s designed to clean up the mess.

It’s safe to say I’m an expert on identity theft protection. But honestly, sometimes I get confused by what different companies offer for identity theft protection. Sometimes their marketing copy is confusing and often misleading. There has always been a lack of transparency when it comes to identity theft protection.

Identity protection should be transparent. If you are spending 10 or more bucks a month, you want to know what you are getting.

  • Monitoring of credit bureaus: Monitoring may consist of one to three credit bureaus. So when a credit check is made, you are notified.
  • Monitoring of Social Security numbers (SSN) via credit applications: Some services have technology that is in place with major creditors and phone companies, and this technology looks for your SSN and alerts you when it’s in use by anyone, including you.
  • Monitoring of the internet: There are chatrooms and forums filled with criminals who broker our stolen data. There are websites that store our information. If your sensitive data shows up, you are notified.
  • Medical identity theft protection: Some companies say they will help protect you from medical identity theft. I’m not sure how, but maybe they have relationships with the Medical Information Bureau.
  • Recovery: When you read the fine print, it usually says the company will only help you recover from identity theft when the service’s product fails to provide the protection you bought. However, most protection services will at least walk you by the hand or point you in a direction to solve your issues. They don’t usually leave you stranded.
  • Lost wallet protection: With this, you can register your credit cards with the service so in the event your wallet goes missing, one call to the service will shut them all down and reorder new cards.
  • Credit card protection: Identity theft protection can’t protect your credit cards. Your bank might offer a service that involves a form of “zero liability” in the event your card is compromised.
  • Bank account protection: Identity theft protection can’t protect your bank account, but their recovery services may help you in the event you are hacked.
  • Service guarantee: Many offer a million-dollar service guarantee or something comparable. The point of this guarantee is to let you know the service will spend up to that dollar amount to fix your problem. In reality, it shouldn’t take more than a few dozen phone calls by a professional and maybe the services of a lawyer to make identity theft go away.

These services know what they are doing. It’s their life. And we at BestIDTheftCompanys.com know what we are doing, so check out how we disseminate what’s what—and decide for yourself.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247. Disclosures.

Location-based GPS Services are Risky

It’s pretty simple: Your mobile’s global positioning system (GPS) functionality allows location-based services to locate and publish information about your whereabouts on various applications and within the code of photos posted online. Various applications allow you to “check in” using your mobile and share your whereabouts with the world. These applications tap into your device’s GPS longitude and latitude data.

GPS certainly can be useful, such as with directions or when trying to find a local restaurant, but letting the world know where you are and where you aren’t every minute of the day is a little insane to me.

For example, when your location is broadcast on social networks, anyone can see it. An example is when you check into a hotel while on vacation. Thieves can see you’re not home, do an online search for your home address and burgle your house. Not cool.

Adults, teens and some kids use these services to meet up, but what could happen if your child’s exact location fell into the wrong hands? Parents now have to be particularly vigilant if their children use location-based services.

Freaky stalkers use GPS to track their victims. A stalker may not necessarily be a stranger but instead a family member, ex-boyfriend or ex-girlfriend using his or her personal access to manually turn on GPS tracking.

Always be aware of an application’s policy and access permissions. GPS data is also used in geotagging, which tracks exactly where photos and videos are taken by including data in the image file that records locations.

Many of us are unaware of this tracking feature, even though sharing images online has become immensely popular. Websites such as Facebook, Instagram, Flickr and YouTube are filled with pictures and videos that include location information. Always keep in mind this is personal information that you may be sharing inadvertently.

By using a VPN (virtual private network) appsuch as Hotspot Shield VPN, your mobile’s IP address is masked; this confuses some of the functionality in geotagging. So if you’re going to go without it, think before you turn on GPS and start snapping pictures to post.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Robert’s FREE ebook text- SECURE Your@emailaddress -to 411247.

Card Issuers Losing $562 in Costs to Grey Charges

Hey merchants, yes you, BillGuard released a report that examined the grey charge problem among US debit and credit cardholders and the service costs impacting card issuers and retailers. The report revealed 11 types of deceptive ‘grey charges’ that retailers use to mislead consumers in their sales and billing practices.

Yaron Samid, founder and CEO of BillGuard stated, “Merchants profit greatly, at the expense of cardholders, when we don’t check our bills. Capitalism drives revenue optimizations and churn reduction techniques, but improper disclosure of sales and billing terms crosses a red line of ethics.”

However, while merchants seem to be profiting, they also have to waste time and money on customer service issues when handling irate callers who are duped. Looking at the entire payments ecosystem, grey charges also impact card-issuing banks, which lose millions of dollars in operating costs servicing grey charge-related calls, as well as merchants, who are crippled by fees, chargebacks, and lost business from disgruntled consumers.

To handle billing inquiries and disputes, BillGuard completely bypasses the costly and inefficient chargeback networks to connect cardholders directly to merchants for free, expedited resolution. Card issuers can and should take a number of steps to protect their cardholders. This will reduce their own servicing costs by:

  • Proactively flagging and alerting cardholders to potential grey charges.
  • Providing cardholders with merchant ratings related to grey charges.
  • Creating a mechanism for cardholders to contact merchants directly to resolve billing disputes and inquiries; this mutually benefits the merchant, allowing them to stay in control of their customer experience.

Reductions in servicing costs are not the only benefit card issuers stand to gain from implementing these recommendations. Improved customer experience and customer loyalty would directly result from helping cardholders protect themselves against grey charges. Credit card providers could stand to increase revenue by $866 million annually just by improving the customer experience. This increased revenue would emerge through a combination of additional purchases, a reduction in customer attrition, and new customers gained through word-of-mouth recommendations.

Robert Siciliano is a personal security expert & and is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video. Disclosures. For Roberts FREE ebook text- SECURE Your@emailadress -to 411247.

Top 10 Components of the Ultimate Home Security System

You’ve been thinking about getting a home security system but haven’t because you want to do it right and not invest in old, outdated technology. Well, you’re in luck, because now’s the time. Home security system technology is as advanced as it’s ever been, and just about anyone can afford a basic system—and, for a few more bucks, the Ultimate Home Security System is available too.

The basics for the Ultimate Home Security System include:

  1. Control panels near every door and in many rooms that can activate the alarm or trigger a panic alarm.
  2. Alarm central monitoring: If it’s not being monitored, what’s the sense in it?
  3. An alarm or siren to freak out the burglar and alert the neighbors.
  4. Motion sensors everywhere—enough motion sensors to detect movement, but not sensitive enough that they will send false alarms all day.
  5. Security cameras in every room, and more surveying every point of the exterior of the home.
  6. Viewing monitors in every room, keeping the homeowner fully aware of any activity. It’s nice to have a monitor wherever you are.
  7. Glass break sensors in every room, alerting the homeowner to smashed doors or windows.
  8. Door and window sensors on every door and every window on every floor.
  9. Mobile applications to control the system from any tablet, mobile phone, computer or laptop.

10. Sensors for light control, fire, carbon monoxide, extreme heat or freezing.

All of this can be had for under $500 if you have a small house or apartment; as you add more rooms, it adds up. I have most of this above, and it was around two grand for my 3000 sq ft home—and it was, and is, worth every dollar.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

15 Tips for Back And Forth To School Security

The security-minded folks at Schlage locks want America’s families to know their options as their kids head back and forth to school. Always keep in mind that security is like the journey to school; it’s an ongoing process that requires you to keep your head up and be aware of your surroundings at all times. Tips for kids and parents:

  1. If your child has a mobile phone, make sure he or she carries it in hand with Mom/Dad and 911 on speed dial. Never hesitate to call 911 in case of emergency.
  2. Use the buddy system: When walking, biking or just standing at the bus stop, arrange to buddy up with a friend or family member.
  3. Always travel along well-lit common paths. Avoid shortcuts that put you into a vulnerable situation, including areas with higher crime rates, drug activity, teens hanging out, or even highways or railroad tracks.
  4. Follow the law and bicycle safety rules and wear a helmet.
  5. If an adult ever approaches a child for directions, to look for a lost puppy or because “Mom (or Dad) is hurt and in the hospital,” the child should know these are lures predators use to abduct a child.
  6. It is never appropriate to accept a ride from a stranger or even a known adult without the absolute permission of the parent.
  7. If the child is ever followed on foot or in a car, he or she should seek help immediately by calling 911 and going into the nearest police station or store.
  8. Trust your gut. When something seems wrong, it is wrong. If your belly feels funny or the hair on the back of your neck or arms stands on end, run to a safe place.
  9. Learn how to resist. Self-defense for kids is a necessary tool for fighting off a predatory adult. Kids should learn to kick and gouge and scream in the event an adult tries to compromise them.

10. Provide your child with your location and emergency contact info, along with a backup of another adult.

11. Never accept money, gifts or food from an adult under any circumstances.

12. Set up GPS tracking on your child’s mobile phone. Check with the phone’s manufacturer for setup instructions.

13. Beware of what’s being posted on social media. Always be aware that anyone, including authorities, predators or school administrators, may be watching. Post appropriately and do not reveal locations.

14. When getting home, make sure the house is locked before walking in. Always look for red flags that might signal an intrusion. If something seems wrong, it is wrong.

15. Consider Schlage’s Touchscreen Deadbolt, which is a keyless lock. Eliminating keys eliminates lost keys and lockouts.

Robert Siciliano home security expert to Schlage discussing home security and identity theft on TBS Movie and a Makeover. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Top 10 Identity Theft Scams

There are no shortage of ways identity thieves have to scam you out of your credit, cash and identity. Here are 10 more ways criminals pounce on their victims:

  1. Mailbox raiding. Moments after the postal carrier drops off your mail, a crackhead comes by and steals it.
  2. Dumpster diving. You know that mortgage company that you did business with before it went out of business? Well, the head idiot tossed all your records and his other clients’ personal information into the dumpster.
  3. Trash collecting. While similar to dumpster diving, it is not—because you are in control. Ask yourself this: “If someone stole my trash, would I be upset because my identity could be stolen?” If you say yes, then you should shred all your discarded papers.
  4. Caller ID spoofing. Phone fraud is a big deal. When scammers call you and pretend to be someone else, they may spoof caller ID to make you believe the source is a legitimate entity like the police, government agency, bank or lottery.
  5. Email phishing. Getting an email from your bank to update your account or simply access your statement is dangerous. Just delete it. Access your account via your browser’s favorites or password manager.
  6. Nigerian 419 scam. When General Motumboo Bumbooby emails you because there’s a trunk of money waiting from a dead relative, delete.
  7. ATM skimming. Anytime you use an ATM, your bank card is at risk. Look for external skimming devices and cover up the keypad with your other hand as you type your PIN.
  8. Credit card skimming. Handing your card over to a store clerk or waiter puts your digits at risk. Don’t worry about it, but diligently check your statements, frequently.
  9. Spyware. Remember that stupid weather toolbar you downloaded that wreaked havoc on your PC with all those popups? There’s a good chance spyware was also installed, letting a bad guy watch your every move.

10. Hacking. Because you don’t update your antivirus, your PC is vulnerable to remote-access Trojans that allow a criminal backdoor access to your My Documents folder.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247. Disclosures.

5 Mobile Internet Security Lessons

Do these things every day religiously and you will be more secure using your mobile devices:

  1. Be careful on social sites: When logging on via mobile, know that among Facebook’s billion users, thousands or hundreds of thousands of criminals are out there too and targeting its users. Hackers are creating viruses that specifically target Android users on Twitter, LinkedIn and YouTube on wired and wireless connections.
  2. Beware of keyloggers that steal online passwords and take over accounts of your friends so they can send out malicious links that will have a good chance of being clicked. Scams like these prompt you to click malicious links. Mobile versions of social sites make it easy to post content and status updates and make it especially easy to click before you think.
  3. Change up your passwords: Don’t use the same password for your accounts. If a criminal gets your Facebook password and email address, he will try it on other sites. Use different user names and passwords on your different accounts, especially on accounts where you keep personal information, credit cards, bank account data and so on. Use a mobile password manager to help yourself out.
  4. Protect yourself wirelessly: Attacks on PCs work the same on mobiles, so if you use a laptop to connect to a free WiFi or a mobile, you are equally vulnerable. Install a virtual private network such as Hotspot Shield VPN that allows you to tunnel in through a protected internet connection.
  5. Keep software up to date. Automatically update programs on every device you own, including your smartphone and tablet. Outdated operating systems, software and antivirus are useless against new attacks.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Robert’s FREE ebook text- SECURE Your@emailaddress -to 411247.

8 Things to Do After a Burglary

You come home and notice your stuff on the floor…then you see broken glass…and next you notice the window on the back door is shattered. Your heart starts to race, you start sweating and you begin to feel like you are going to get sick. You don’t want to believe it, but you’ve been burglarized. And you say to yourself, “This expletive sucks.”

It does suck. And it just might have been prevented if you had a home security system.

Anyway, this is what you do upon discovering a burglary:

Get out: Leave your home immediately. The criminal might still be in the house. Consider him or them armed and dangerous.

Call 911: Use your mobile to get the police on the line, quick. Let them come there and secure your home to make sure it’s safe. But don’t use your landline because in some cases, police may want to dust your home phone. It’s rare, but ask first.

Don’t touch anything: Doorknobs, windowsills, remote controls, toilet handles, refrigerator doors, etc. may have burglars’ fingerprints. You’d think police get all CSI and dust everything, but they often don’t. But if they detect an obvious entry point or a dirty fingerprint, they will.

Seek safety: Go to your car and lock it behind you, or to a neighbor’s, local store, whatever—just get out. But be within eyeshot for the police when they arrive. They will want to talk to you.

Expect to be questioned: Police will ask lots of questions, and you may not understand or appreciate the line of questioning. Just know that they are doing an investigation and have their reasons.

Call your insurance broker: Your insurance broker will have a process you must go through to record what was stolen to determine what’s covered.

Expect to feel violated: In the days and weeks following a break-in, you will notice more things missing or broken. The feelings of violation won’t go away anytime soon. In some cases it might be necessary to move, as burglarized properties develop a black cloud over them in the victims’ minds.

Be proactive: Don’t let this happen again. Invest in better doors, locks, security cameras and home alarm systems. Get a big dog, take a self-defense class, properly insure your goods, live your life and try not to worry about it.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Know the 10 Warning Signs of Identity Theft

As I have witnessed throughout the many years I have worked with victims, each type of identity theft can have a devastating impact. Victims with whom I have worked are taxpaying citizens who do the right thing and work hard to earn honest livings. When their personal information was compromised, thieves opened up financial accounts in their victims’ names, and when these new accounts were opened, it affected the victims’ ability to rent an apartment, buy a car or buy a home. When your good name is stolen and stained, you are thrown into a position where you are responsible for fixing it. This means you are delayed in getting the car, home or apartment you need. For those seeking employment, it also means you could lose the opportunity to get a job, because some employers check credit scores to learn more about prospective hires.

Here are 10 signs that your identity may have been compromised.

  1. You are denied credit for no reason. People often discover that their identity has been stolen when they are denied credit. So when you apply for a loan to purchase a car or a home, and you are denied credit, you may discover that it is a result of your credit being damaged by fraud. Accounts may have been opened without your authorization, and the resulting bills would never have been paid.
  2. You are denied employment as a result of a background check. Some people learn that their identity has been stolen when they are denied employment. An employer may check an applicant’s credit history to determine whether he or she is financially responsible. If the applicant’s identity has been stolen, assuming the thief hasn’t been surreptitiously paying the bills, the employer rejects the applicant based on a credit history tainted by fraud.
  3. You are denied admission to school. Schools may also deny admission after checking a prospective student’s credit history, or the student may be unable to secure a college loan because an identity thief has opened accounts in the student’s name. Parents may also discover their identities have been stolen when they apply for loans to pay for their children’s tuition and are denied.
  4. A collection agency calls you for non-payment. Debt collectors may even call identity theft victims, demanding payment for goods or services that the victims never purchased or received.
  5. Arrests and false convictions. In a worst-case scenario, a victim is arrested for a crime he or she did not commit. The identity thief may have a fake ID with the victim’s information; once the thief is arrested and bail is posted, the thief walks while the victim is pursued.
  6. Wrong information on a credit report. When thieves open new accounts under the victim’s name, it is inevitable that the fraudulent accounts will show on the victim’s credit report.
  7. Mail stops arriving, or certain bills or statements don’t arrive. Identity thieves will steal victims’ mail—and in some cases change their mailing address via the Post Office to the fraudulent address of the identity thieves.
  8. You receive bills from companies you’ve never done business with. When an identity thief poses as you, he may buy products that are invoiced—and you receive the bill. In other situations, the thief might bounce a check or max out a credit card that was opened in your name.
  9. You are denied a tax refund. When an identity thief files taxes under your name before you do, he or she gets your refund. File early and protect your data year ‘round.

10. Psychological trauma. You end up in the loony bin because you have no idea how your life has spiraled out of control. Victims of identity theft often have no idea what is happening to them. At times they think they are going crazy and develop a sense of paranoia because they are the puppets and the thief is the puppeteer, all without them knowing it.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247. Disclosures.