Police Officer’s Home Burglarized; Learn How Not to Become a Victim Too

Nobody is immune to burglaries. I’ve seen celebrities, priests, politicians and even police officers become victims of burglary.

SFGate.com reports that two people were arrested and charged in the burglary of a central Iowa police officer’s home in which the officer’s gun was stolen.

Not at all cool. Not cool because the cop is just like us and doesn’t deserve his home broken into. Not cool because his gun was stolen and could be used by the whack-job burglar to kill someone. And not cool, frankly, because he is an officer of the law and really should, at a minimum, have a home security system protecting his home and a safe protecting that gun.

Meanwhile, police in Seattle and the West Seattle Herald provided some insight into how burglars operate: “The general profile of our burglars are juveniles in groups of two to three (there are, of course, adults as well), often times [breaking into homes] while people are at work and kids are at school. The modus operandi is to have one person knock on the door (while in communication with the others, usually by cell phone). Meanwhile, the other two are working their way into the backyard where they will break into a window or door once the coast is known to be clear. Once inside, they generally focus on high-end electronics (Apple products are a favorite), gold and silver jewelry, cash and guns.”

Don’t want to end up in the paper? Memorize these prevention tips:

  • Stay safe at home: If someone’s breaking in while you are home, yell out, “Hey, what are you doing!” or “Honey, can you get that?” to make it clear someone (or more than one) is home. Leave, or get to a safe, locked room and call 911.
  • Watch your perimeter: Keep your yard and home easily visible to neighbors so they can see mischievous burglar behavior.
  • Home alarms: Home alarm systems and posted signs letting everyone know they are in place can also act as a deterrent.
  • Summertime security: Don’t leave windows slightly ajar to keep the house cool when you are gone.
  • Neighborhood watch: Start up a block watch with your neighbors. This means folks watching out for folks and their property—and for people on the block who don’t belong.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

EMV Will Help Retailers Prevent Credit Card Fraud

EMV, which stands for Europay, MasterCard, and Visa, refers to the chip and PIN credit card technology commonly used in Europe and elsewhere around the world. Credit cards that incorporate an embedded microprocessor chip are far more secure than any other form of credit card currently available, including the standard magnetic striped cards that are all too easy to skim at ATMs and point of sale terminals.

Major banks and retailers are now pushing very hard to make EMV the new standard in the United States. Implementation should occur in 2015, Visa announced plans to expand their Technology Innovation Program to the U.S., which will encourage retailers to support cards with microchips by “[eliminating] the requirement for eligible merchants to annually validate their compliance with the PCI Data Security Standard for any year in which at least 75% of the merchant’s Visa transactions originate from chip-enabled terminals.” This will go into effect October 1, 2012 for merchants whose point-of-sale terminals accept both contact and contactless chips.

PCMag reported MasterCard followed Visa’s lead stating that it too intends to move U.S. consumers onto so-called chip-and-PIN technology. MasterCard, like Visa, also said that it is preparing for a world where consumers will pay in stores, online, and via mobile devices.

Another method of credit card fraud prevention is device reputation technology. It works to prevent all types of fraud and abuse on the Internet, including account takeovers, which occurs when your existing bank or credit card accounts are infiltrated and money is siphoned out. Iovation the leader in device reputation helps prevent new account fraud, which refers to financial identity theft in which the victim’s personal identifying information and good credit standing are used to create new accounts, which are then used to obtain products and services. Stolen Social Security numbers are often used to commit new account fraud.

Robert Siciliano, personal security and identity theft expert contributor to iovation. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! See him knock’em dead in this identity theft prevention video. Disclosures.

Teen Dies Fighting Off iPad Thief

There is nothing that I have, other than family members that I would risk my life for. Whether it is jewelry, money, a wallet, bag or expensive electronic item, I’m simply not going to offer resistance if some whacked-out mentally ill person wants to take it from me. The fact is, I’m too pretty to have a box cutter slashed across my face in exchange for any material item.

Although it’s a normal reaction to fight for what’s right (and what’s yours), it’s not necessarily the right decision when you fight over material items. I think we learn this as kids when we tussle with a sibling over toys. As we grow older, we become territorial when it comes to things like standing in line, driving and even land disputes.

But dying over a $400iPad simply ain’t worth it.

The Las Vegas Sun reports, “A teenager died after a man grabbed an iPad out of his hands and fled in an SUV that ran over the boy as he struggled to hold onto the tablet.”

Investigators determined the boy was walking with the iPad when a white vehicle stopped and a man exited the passenger side of the vehicle. The man attempted to steal the iPad and started to drag the teen, who was trying to hold onto the device, to the vehicle. Facing resistance, the suspect got back into the SUV with the teen still grasping at the tablet, but the vehicle then fled and the boy fell and was struck by the SUV.

Think about it like this:

About 12,000 laptops are lost each week in US airports alone, and 113 cell phones are lost or stolen every minute in the U.S. Now imagine if everyone was fighting over every device. Mind blowing, isn’t it? Instead of fighting over this replaceable item, simply:

#1 Let it go. It’s not worth fighting over.

#2 Activate a lost/locate/lock/wipe software that helps you recover, lock or wipe the data.

#3 Call the police and be happy you are OK.

#4 See if your homeowners insurance will cover lost or stolen devices.

#5 Make sure all your devices are password protected. Do it today. This way, the chances of your data being exposed are reduced.

Better to lose your device—even lose your data—than your life.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

Connecting the Dots–How Your Digital Life Affects Identity Theft and Financial Loss

You’re on Facebook, LinkedIn and Twitter. You use Gmail, Yahoo! and bank online. You might buy stuff on sites like Amazon and occasionally make purchases from eBay. Sometimes you apply for a loan online and maybe open up a credit card account too. This is all commonplace in today’s digital world.

So how does all this lead to identity theft and financial loss?

With the convenience of the Internet and all the digital devices available to use today—laptops, smartphones, and tablets—we unknowingly provide a lot of information online that could expose us to identity theft. Access to your personal information is what gives hackers the power to tap into your accounts and steal your money or your identity.

Here are some of the ways that hackers use our information against us:

Social media: These sites continue to grow in popularity and you may be putting more information on these sites than you should. Even though you may assume that only people in your personal network can access this information, that’s not always the case.

Email: It’s been said that if you own a person’s email, you own the person. This means that once your email account is hacked, pretty much your entire digital life is up for grabs. So even if you’ve done your due diligence to have all your passwords be different, if your email is hacked and it is associated with your other online accounts, the hacker could simply use a reset password and get access to all your other accounts.

Online shopping: This is another activity where you need to be cautious since hackers can potentially steal your information from an unsecured or phony site. If you’re on a phony site, you are giving your information directly to the hacker or you could be on a site that is automatically downloading malware to your device that could do things like track every site you visit and everything you type on your keyboard and send that to a hacker.

Wireless networking—Even if you are being cautious with our online activities, hackers can still grab your information if you aren’t smart when using Wi-Fi connections. That’s why when you’re using those free hotspot connections in cafes or airports, it’s important for you not to access your banking or personal sites as the transmission of data is not secure.

There are many ways to skin a cat, as they say (a rather morbid expression), but having your identity stolen and losing money is unfortunately too easy when your information is spread so thin. So it’s not enough to just sit back and hope you aren’t hacked. The fact is you need to up your security intelligence and invest in additional layers of security.

All of these scams prey on your trust and on your personal information, so follow these basic steps to protect yourself:

Click with caution: Be careful when clicking on links in emails, texts, social media posts, and instant messages, especially if they are from people you don’t know.

Be careful what you share: Think about what you post online—is that thing you so badly you want to share something you’re ok with your grandmother or an employer seeing? If not, then don’t post it. In fact, you should consider anything posted on the Internet as something written in permanent pen, not pencil—as in, it’s there forever.

Use common sense: Follow the old caveats about not clicking on links in emails, texts, social media posts, and instant messages from people you don’t know, and always exercise caution when it comes to sharing any sensitive information.

Educate yourself: Keep up to date about the latest scams and tricks hackers use to grab your information so you can avoid potential attacks.

Use comprehensive protection: Because there are a variety of ways in which hackers can access your information, you need to make sure that you employ a comprehensive security solution like McAfee LiveSafe™ service that protects all your devices, your identity and your data.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

5 Ways to Protect Your Credit Card

Credit card fraud happens in a number of ways. Sometimes your bank or credit card company will notify you of fraud and other times they won’t. So it’s up to you protect yourself. Smart retailers on the other hand are already protecting consumers behind the scenes by implementing multiple layers of fraud protection.  

1. Whenever you hand over your credit card to anyone — a waiter, gas station attendant, store clerk, etc. — keep a close eye on them as long as they are in possession of the card, or at least watch the card as it is being processed. You want to see where your card is going, and how it’s being used. The idea is to make sure the card isn’t being “skimmed” with a device designed to collect card data. This is good advice when it’s possible, but since waiters typically take the card out of sight to process, it really only works in scenarios where the clerk never leaves the terminal.

2. Cover your PIN. This is absolutely necessary at any point-of-sale terminal or ATM. The public nature of these devices makes it very easy for someone to “shoulder surf” and see your PIN. A cell phone video camera over your shoulder, a video camera 50 feet away, binoculars, or even a hidden camera attached the to face of the ATM can all compromise your PIN.

3. Change your card number. With millions of card numbers hacked over the last few years, chances are yours has been compromised at some point. I have had three changes of credit cards due to proactive card issuers sending me a new card whether I liked it or not.

4. Check your credit card statements every day. This is an extra layer of protection that requires savant-like attention. You check your email every day, so checking your credit card statements every day is manageable, right? Even once a week is sufficient, and every two weeks is okay. Just be sure to confirm your bank’s cut-off date to refute unauthorized withdrawals. For most credit cards, it’s 60 days.

5. Protect your PC. Viruses on your computer will almost certainly result in account takeover. Install antivirus, anti-phishing, anti-spyware, and a firewall.

One very effective fraud detection technique smart retailers are using is to implement device identification and device reputation, which alert businesses to known fraudsters on their websites. iovation Inc. takes this service to another level by analyzing the device’s reputation to assess the potential risk of every transaction.

Robert Siciliano, personal security and identity theft expert contributor to iovation. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! See him knock’em dead in this identity theft prevention video. Disclosures.

6 More Tips for Apartment Security

Did you know that 1 of every 5 homes will experience a break-in or violent home invasion? And that 80 percent of break-ins occur forcibly through a locked door—and, even scarier, that a burglary occurs every 15 seconds in the United States? And if you live in an apartment, the National Crime Prevention Council says you will have an 85 percent greater chance of being burglarized than a single-family dwelling.

When looking into apartment living, consider my first six tips on apartment security, as well as the following:

  1. Gated access: Keypad, remote controlled and including an emergency firebox.
  2. Key building access: Look for a schedule that involves locking exterior doors and making sure the property is secured.
  3. Neighborhood watch-type programs: If a stranger is in the area or paying unwanted attention to us or the property, we call one another to decide what we may do in response. There’s always strength in numbers.
  4. Background checks: Does the landlord do anything in regard to background checks?
  5. Neighborhood crime: What is the immediate neighborhood like? Are there drug houses, etc., nearby? Contact local law enforcement and ask for a record of recent crimes committed. Get some statistics. Some law enforcement agencies will be more or less cooperative. You want to know about the prevalence of violent crimes, sex offenders and theft. One of the most effective ways to get the pulse of the community is by buying the local newspaper. Reading the police blotter over a one-month period is telling.
  6. Interview the landlord: While the landlord may interview you, you should interview the landlord. Find out what his/her processes are for security. What is the annual investment? What is the landlord’s philosophy regarding apartment security? Does the landlord even have one? What is the existing security at the property? Ask about lighting, cameras, locks on doors and windows, and whether the keys have been changed since the last tenant left.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Secure Your Identity When Traveling

As summer travel starts to pick up, consumers need to be aware when they’re preparing for, or going on, summer vacations.

Stealing your mail. While you’re on vacation, your mailbox fills up with credit card offers and bank statements. The bad guy can steal this mail and use it to open new credit cards in your name, or to take over existing accounts. Get a mailbox that locks to prevent thieves from stealing your mail. Have a trusted friend retrieve your mail while you’re away. Opt out of prescreened credit card offers.

Credit card fraud. When you are out and about, anyone who handles your credit card can steal your digits and make unauthorized charges, as can anyone on the other end of an online purchase. Check your credit card statements as frequently as possible. Review them weekly, at a minimum. Federal law requires that credit card companies allow you to refute unauthorized charges for up to 60 days. Keep your receipts and scrutinize those statements.

Internet cafe spyware. Anytime you use any PC other than your own, your identity is at risk. Spyware is software installed on a computer that records every keystroke, username, password, and website visited. Autocomplete is a browser function that remembers your passwords. Autocomplete on a public computer means potential identity theft. If at all possible, avoid business center or Internet cafe PCs. Many mobile phones can function as a temporary replacement for a PC.

Online dating scams. Millions of people use online dating sites to broaden their networks and meet potential mates, but not every person on these sites is sincere—some are scammers hoping to lure you in with false affection, with the goal of gaining your trust and, eventually, your money. Only use reputable sites. The minute anyone asks you to forward them money via wire transfer, delete the message.

WiFi insecurity. Whether you travel for business, or simply need Internet access while out and about, your options are plentiful. You can sign on at airports, hotels, coffee shops, fast food restaurants, and now, airplanes. Wireless networks broadcast messages using radio, and are thus more susceptible to eavesdropping than wired networks. Use Hotspot Shield VPN to protect your data by tunneling through an encrypted wireless network.

Overseas skimming. Card skimming is the act of copying credit card data off a magnetic stripe card, whether on an ATM or in person. US-based cards are more vulnerable because they are mostly magnetic. Overseas, particularly in Europe, EMV or “chip and PIN” cards are standard. Chip and PIN cards are much harder to hack. Many merchants will not, or cannot, accept US cards with magnetic stripes, which could put you in a difficult position when you need gas or have to buy a train ticket.

Check with your bank to see if they offer EMV. JPMorgan Chase began issuing cards with embedded microprocessor chips last year, and more major card issuers have followed suit by incorporating EMV technology. American Express have also announced plans to release chip-based cards in the United States.

Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures

Drug-addicted Teen Burglar Sentenced to Prison

Burglars aren’t the people you see in the movies driving expensive cars, living lavish lifestyles and vacationing in the Caribbean. Burglars are usually addicted to drugs, unemployed because of their habit, and have sucked the lives and savings out of their families and so must turn to crime to get their fix.

You’ve heard “desperate people do desperate things,” and that statement can be directly equated to the mindset of a drug addict. People under the influence are sick and irrational and will stop at nothing to get what they need. Often, their illness has such a grip on them that in their minds, scenarios that actually result in violence leading to murder begin to seem normal. To them, it makes perfect sense that such things are what they need to do to get high.

People often ask, “Why?” “Why would anyone do that?” Because drugs have such a grip on them that the ability to make sound, rational decisions is no longer a part of their psyche.

It’s even worse when a teenager is the addict and perpetrator. At a young age, his reality isn’t quite developed. Leo Ray and his wife were victims of an invasion at their Idaho home. Ray told the Times-News in an interview that he answered the door at about 6 a.m. the day of the robbery to three guns in his face, then two men held guns to his head while another—whom he later identified as a 16-year-old boy—stood across the room with a rope and another gun. The men tied up the Rays and ransacked their home, stealing guns, computers and other valuables.

The prosecutor stated, “The teen has had significant substance abuse treatment and significant opportunities for counseling in the juvenile justice system.” But he obviously was beyond repair.

Bad, sick, dysfunctional people are everywhere. This doesn’t mean you should hide under your bed and worry; it means you need to keep your head up, be aware, know your options, live your life and invest in your personal and home security.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

A Brief History of Home Security Locks

Have you ever actually read the name stamped on your door locks or key? I always have – and I’ve equipped every home I’ve ever bought with Schlage. You can check out my favorite locks at Schlage.com.

Locks keep families and businesses safe and secure from predators. Door knob jiggling is the most effective way to break into a home. All the badguy needs to do is see if the doorknob is locked and if not he simply opens the door and makes his way in. The first step in home security is to lock your doors with quality locks. Locks have had a significant place in the history of security as an effective layer of protection and I thought it would be interesting to share a brief history of the home door lock:

  • 2000 BC—Locks appear in ancient Egypt. Records show wooden locks in use some 4,000 years ago.
  • 445 BC—Locks appear in the Old Testament. In the book of Nehemiah, Chapter 3, it is stated they “set up the doors thereof, and the locks thereof, and the bars thereof.”
  • 870-890—All-metal locks begin to appear
  • 1774-1920—Lock-making begins to take off. Between these years, there were 3,000 varieties of lock devices and the level tumbler lock was invented in Europe and improved in 1778 by Robert Barron.
  • 1909Schlage receives its first patenton Walter Schlage’s first invention, a door lock that turned lights on and off.
  • Early 1920’s—Schlage advances cylindrical pin-tumbler locks. Walter Schlage advanced the concept of a cylindrical pin-tumbler lock, with an emphasis on security. Of equal importance to the modern architect and decorator, the lock became an intricate part of the door design. It was now possible to select complimentary styles of locks, metals, and finishes.
  • 1940— Six years before his death, Schlage is named a “Modern Pioneer”. The brand has continued to carry on his legacy for more than 90 years, creating incredibly strongand technologically advanced locks to help consumers secure their homes.
  • 2006 – Schlage introduces keypad lock for exterior doors, eliminating the need for a traditional key to make access convenient for families, etc…
  • 2009 – Schlage introduces line of keypad locks and complementary home automation systems like Nexia Home Intelligence that provide access and control over the home while away.

Robert Siciliano Home Security Expert to Schlage discussing home security and identity theft on TBS Movie and a Makeover. Disclosures.

10 Million Mobile VPN Users Can’t Be Wrong

A virtual private network (VPN) is a network set up to communicate privately over a public network. For example: You occasionally want to or need to work from home and your employer knows that if you do, the data that travels between your PC and an office PC needs to be protected. Another example is when you use public WiFi, knowing your wireless data can be sniffed out by criminals. Using a VPN solves that problem.

Hotspot Shield VPN service is a great option that protects your entire web surfing session, securing your connection on both your home internet network and public internet networks (both wired and wireless). Hotspot Shield’s free proxy protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads, etc.) are secured through HTTPS—the protected internet protocol. Further, Hotspot Shield encrypts all mobile data, protecting the user’s identity. Finally, the mobile version of the app compresses bandwidth, allowing users to download up to twice as much content at the same cost. Since its launch in May 2012, users have saved 102.9 million MB!

While it bears noting that the 10 million downloads milestone was achieved roughly twice as fast on mobile as with the desktop product, which was first released in 2008, Hotspot Shield continues to rack up impressive numbers on non-mobile platforms too. In the past 12 months, the service has protected more than 50 billion pages.

What Hotspot Shield does:

Security: Encrypts users’ entire web sessions, turning all HTTP sites into HTTP(S) and making the entire web as secure as major banking sites—protecting users in unsecured WiFi networks and blocking malware in the cloud.

Privacy: Protects users’ identity from unwanted tracking and masks their IP addresses.

Access: Establishes a secure tunnel between a user’s computer or mobile device and the internet, allowing users to gain secure uncensored access to all internet content.

Bandwidth compression: Compresses all traffic on the server side before sending it to a user’s phone, allowing users to stretch their data plans.

Hotspot Shield is available for PC, Mac, iOS and Android. Once installed, Hotspot Shield will run in the background, protecting all applications, email and web browsing.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.