10 Skeevy Scams to watch

You may think you’re not dumb enough to fall for scams, but consider that someone you care deeply about is naïve enough to be conned. Besides, some scams are so clever that even those who think they’re scam-proof have actually been taken for a ride.

http://www.dreamstime.com/stock-images-online-risks-sign-road-banner-image34668294Sometimes fraudsters pose as an authority figure. Some claim you won a prize, while others claim you’re in trouble. Some even claim they’re a family member (needing money) and have figured out a way to convince you of this.

Some scams are done via e-mail, while others involve a phone call or snail mail. One common ploy is for the crook to pose as a rep from the electric company and threaten to shut off your electricity unless you pay a delinquent bill. Of course, the payment must be in the form of a reloadable debit card. People will actually give these cards to the “rep,” without calling the company to confirm the situation.

A big tip-off to a scam is that you’re told you won a prize or have been hired for employment—but must send money to get the prize or be trained for the employment.

Some scams are so very obvious, but still, people get taken, like those ridiculous e-mails claiming you inherited a windfall from some deceased prince named Gharbakhaji Naoombuule. But people actually fall for these, not considering that this same e-mail was sent to 10,000 others.

Top 10 Scams

  • Caller ID spoofing. Has your phone ever rung and you saw your phone number and name in the caller ID screen? How can your own phone be calling you? It’s a scam. Ignore it. If you pick up you’ll hear an offer for lower credit card rates. You’ll be told to press 1 to opt out—but you should not even be on that long to hear this option; you should have hung up the second you heard the credit card offer. Anyways, pressing 1 indicates your number is legitimate; it’s then sold to scammers. Caller ID spoofing is also perfect for scammers posing as the police, government agency, corporations etc all with the intention to get you to part with your money.
  • Mystery shopping. Though mystery shopping is a legitimate enterprise, scammers take advantage of this and mail out checks (phony) before the “shopping” is done. A legitimate company will never do this. They also get victims to give up credit card data to pay for getting a job!
  • Calls about unpaid taxes. Always hang up, regardless of threatening nature to pay up or else. The IRS always uses snail mail to notify people of unpaid taxes.
  • Puppy scam. You find a website offering purebred puppies at very low prices or even for free, but you’re told you must pay for shipping or transfer fees (wire transfer) to get your puppy. The money is gone and you never get your puppy.
  • You get a call from someone claiming to have found buyers for your timeshare. You receive a contract, but are told you must pay funds to cover some fees. The contract is phony.
  • Tech support. Someone calls you claiming your computer needs servicing. They’ll fix it after you give them your credit card information. Legitimate geeks don’t call people; you must call them.
  • Postcard survey. Out of the blue you’re told you’ve won a gift card, or, just take a brief survey to get one. Go along with this and soon you’ll be asked to provide your credit card number. Don’t bother. You’ll get no gift card while the crook gets your credit card information.
  • A notice says you’ve won a big fat prize. To claim it, just pay some fees. Yeah, right. Never pay fees to collect a prize!
  • You’re told you’re eligible for a grant or have been awarded one, but must first pay processing fees. Federal grants don’t require fees.
  • Subscription renewal notice. The notice says you can renew for a lower rate. Check to see if the notice was sent by the publication itself or some third party (the crook).

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing  identity theft prevention.

Small Town investigates String of Burglaries

Home burglaries don’t just happen in the big cities that everyone’s heard of. They can also occur in small towns—simply because the burglar lives in them or in neighboring areas. Such is the case with Kirksville, Missouri.

2BA recent report from heartlandconnection.com tells of multiple burglaries. They have elements in common: The thief enters overnight while the occupants are asleep and takes cash.

Are the homes’ occupants very hard of hearing and can’t hear the window smashing or the door being kicked down? Did they all take a few sleeping pills and were thus in a very heavy sleep and that’s why they didn’t hear the windows smashing or the door being busted through?

Or…do you suppose that a DOOR or WINDOW WAS UNLOCKED and that’s how the burglar got in?

Don’t be a victim!

  • Before going to bed at night, what do you always do without fail? Brush your teeth. Let the dog out for one last “business.” Set the clock alarm. Lay out your clothes for next day. Is something missing here? Yes! LOCK ALL DOORS AND WINDOWS.
  • Have a deadbolt installed and other protective devices for doors.
  • Keep doors and windows locked during the day, too—even when you’re home.
  • Have a motion detection light installed.
  • Put away the purse, wallet, credit cards, checkbook and loose money…just in case someone does get in. The last place burglars usually check is the kids’ bedrooms. Consider stashing your purse and wallet in a shoebox in the toy box.
  • You can also put these items in a fire-proof safe that’s bolted to the floor.
  • Never keep the spare key “hidden” outside anywhere. Leave it with a neighbor or go keyless entry.
  • Before going away on trips, arrange with someone to check your home periodically.
  • Don’t leave any light on continuously; this looks like you’re away. Used timed lighting devices.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Online Data less safe than ever

It’ll get worse before it gets better: online data safety. It’s amazing how many people think they’re “safe” online, while one huge business or entity after another keeps getting hacked to the bone.

1DAnd “safety” doesn’t necessarily mean the prevention of your computer getting infected with a virus, or falling for an online scam that results in someone getting your credit card information. It’s also a matter of privacy. While targeted advertising (based on websites you’ve visited) may seem harmless, it’s the benign end of the continuum—that someone out there is tracking you.

So, do you still think you’re hack-proof?

That you can’t be fooled or lured? That your devices’ security is impenetrable? That you know how to use your device so that nobody can get ahold of your sensitive information?

Consider the following entities that got hacked. They have cyber security teams, yet still fell victim:

  • LinkedIn
  • Yahoo! Mail
  • Adobe
  • Dropbox
  • Sony
  • Target

You may think the hacking is their problem, but what makes you believe that the service you use is immune? Are you even familiar with its security measures? That aside, consider this: You can bet that some of your personal information is obtainable by the wrong hands—if it already isn’t in the wrong hands.

Are you absolutely sure this can’t possibly be? After all, you’re just a third-year med student or recent college grad looking for work, or housewife with a few kids…just an average Joe or Jane…and you use the Internet strictly for keeping up with the news, keeping up with friends and family on social media, using e-mail…innocent stuff, right?

You’ve never even posted so much as a picture online and say you don’t use a credit card online either.

  • But hey, if your passwords aren’t strong, this ALONE qualifies you as a potential hacking victim.
  • So, what is your password? Is it something like Bunny123? Does it contain your name or the name of a sport? Keyboard sequences? The name of a well-known place? The name of a rock band?
  • Do you use this password for more than one account? That gets tacked onto your risks of getting hacked.
  • You need not be someone famous to get hacked; just someone who gets lured into filling out a form that wants your bank account number, credit card number, birthdate or some other vital data.
  • If you just ordered something from Amazon, and the next day you receive a message from Amazon with a subject line relating to your order…did you know that this could be from a scammer who sent out 10,000 of these same e-mails (via automated software), and by chance, one of them reached someone at just the right time to trick you into thinking it’s authentic?
  • People who know you may want your information to get revenge, perhaps a spurned girlfriend. Don’t disqualify yourself; nobody is ever unimportant enough to be below the scammer’s radar.
  • Did you know that photos you post in social media have a GPS tag? Scammers could figure out where the photo was taken. Are you announcing to all your FB friends about when your next vacation is? Did you know a burglar might read your post, then plan his robbery? Between the GPS tags and your vacation dates…you’re screwed.

Well, you can’t live in a bubble and be antisocial, right? Well, it’s like driving a car. You know there are tons of accidents every day, but you still drive. Yet at the same time, if you’re halfway reasonable, you’ll take precautions such as wearing a seatbelt and not driving closely behind someone on the highway.

Most of your fate is in your hands. And this applies to your online safety. You won’t be 100 percent immune from the bad cyber guys, just like you’re not 100 percent immune from a car wreck. But taking precautions and having the right tools really make a tremendous difference.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing  identity theft prevention.

Deadbolt, gotta gotta have It

Deadbolts aren’t hyped up; they really are superior to regular knob locks. Though we keep shaking our head in amazement whenever yet another news story comes out about a burglar or rapist who waltzed through an unlocked door and committed mayhem, it remains a hard fact that many criminals gain entry via physical force.

1BYes, what you see in movies and TV shows is true: People CAN kick open a locked door—that’s either missing a deadbolt, has a faulty one or simply because a door jamb itself is just half inch pine. In that case, door reinforcement technologies are needed. Read on.

Nearly 60 percent of burglaries are forced-entry. Many occur during the day. Face it; at a minimum, you need a deadbolt. It can be either single-cylinder or double-cylinder (check the legality regarding doubles).

The door jamb will have a hole for the bolt to extend fully into—partially isn’t good enough. A metal strike plate should reinforce the hole. If both of these factors are not in place, an intruder can force open the door.

In addition, the strike plate should be fastened into the studs of the door frame with three-inch screws.

Finally…the deadbolt needs to be USED. It’s easier to always ensure this if you have a single-cylinder because it requires just a turn of its knob (from the inside). The double-cylinder requires a key from the inside—in place of that little knob. So every time you come home and lock the deadbolt, you’ll need a key. Every time you want to step outside…you’ll need a key to unlock it. Double deadbolts are a little dangerous too due to fires as well. So not recommended.

However, if you have the single-cylinder, and your door is right beside a window, an intruder could smash through the window and reach in and turn the knob of the single-cylinder, unlocking it.

Door Security

  • If you don’t want the hassle of a double-cylinder, consider replacing the door so that windows aren’t close enough to it for an intruder’s arm to reach through.
  • The decision isn’t whether or not to get a deadbolt; it’s what type of deadbolt and door…because it can’t be said enough: A door with only a regular lock can easily be kicked in—by a slight woman—because the standard lock involves a few little screws, one or two little strike plates and a thin pine wood door frame with thin molding.
  • However, this thin wood can be empowered by the Door Devil Anti Kick Door Jam Security Kit. It’s a four-foot-long bar of steel that’s one-sixteenth-inch thick. It gets installed on the center of the door jamb, over the little strike plates. An intruder must get past this; fat chance, because four feet of the door frame will absorb the intruder’s attempted force.
  • The Door Devil’s thick screws are three and a half inches long, and when placed into the 2 x 4 studs (also part of the kit) behind the frame, reinforce the door hinges.
  • You might be thinking, if an intruder is determined enough, he’ll keep kicking till the door busts. What do you think an intruder is, a kickboxing instructor? If he can’t dismantle the door after two, maybe even one, kick, he’ll move on to the next house.
  • Of course, he might not want to even try to kick down your door if he notices a surveillance camera above it—after the motion detector light beams onto him.

Robert Siciliano is a home and personal security expert to DoorDevil.com discussing Anti-Kick door reinforcement on YouTube. Disclosures.

10 Ways to protect Yourself while traveling

Some thieves specialize in hanging around tourist spots to spot the tourists and make them victims of hands-on crime such as purse snatching or a mugging. But don’t wait till you’re aimlessly wandering the piazza with your face buried in a huge map to take precautions against less violent forms of crime.
1S

  1. Before traveling, make copies of your driver’s license, medical insurance card, etc., and give these to a trusted adult. Have another set of copies in your home. Scan them and email to yourself.
  2. Never post your travel plans on social media until you return. You never know who’s reading about you.
  3. Before departing from home, make sure your credit card company and bank know of your travel plans.
  4. Clear your smartphone or other device of personal data that’s not essential for your trip.
  5. Travel on a light wallet. Take two credit cards with you in case one is lost or stolen. Have with you the phone numbers for your bank and credit card company, just in case.
  6. Avoid using Wi-Fi in coffee houses, airports and other public areas other than to just read celebrity gossip or catch the news. Use a VPN. Google it.
  7. When traveling internationally, read up on the safety of food and water and get whatever shots you may need.
  8. Never give your credit card number to the hotel staff (or at least, anyone identifying themselves as hotel staff) over the phone in your hotel room. The call could be coming from a thief posing as hotel staff telling you they need your number again.
  9. Never leave anything out in your hotel room that reveals personal information, such as a credit card receipt, passport, checkbook, medical insurance card, etc. If the room does not have a safe, then have these items on you at all times.
  10. Use only an ATM that’s inside a bank, never a free-standing one outdoors somewhere. Cover the keypad with your other hand as you enter the PIN to thwart ATM skimmers.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Are you Mentally Prepared for a Predator

A bear in the wild that wants to protect its young from another predator isn’t worried about manners. This is how people should feel when in circumstances that don’t feel right. The bear has a gut instinct not to let its young near a predator.

A woman who feels funny about getting into an elevator with a creepy looking man should have this same instinct. But often, she lets analysis take over: She steps inside an enclosed box with a stranger who makes her feel uneasy.

She fears he’ll think she’s rude if she waits for the next elevator. She may have the grandest home security system in the world, but one slip in judgment could cost her her life: Inside that box, the man strangles her.

A predator can sense when a woman is more concerned about his perception of her than of her safety. But men, too, make mistakes, like the man who gives a ride to a man he’s meeting for the first time at a country road gas station late at night. The stranger could be dangerous. And if he’s innocent? Well, so he doesn’t get a ride this time. He’ll live.

But predators are just everywhere. And some are female. It’s amazing that some people will go all out in securing their home and sports car…but when it comes to the safety of their person…they’re incredibly lax.

People need to employ layered security: like going out in the cold; you don’t just wear gloves. You also wear a hat, scarf, wool socks, maybe thermal underwear, a sweater, a coat.

Conversely, there’s the MMA champion who has no home security system. A lot of good his hook kicks will do when he’s not home while the intruder breaks in. A solid home security system has motion detectors, a loud alarm, timed lighting fixtures, an advanced lock system on all the doors and an anti-penetration system on the windows.

As for your person? Are you a good screamer? We are told to scream when attacked. But there’s a difference between hollering “Fire! Fire” when being abducted (“Fire!” is supposed to get everyone’s attention), and screaming “No” or “Stop” or even profanities. These are control words that are far better at getting control.

Many people want to lose weight. Kill two birds with one stone by taking up martial arts: Lose weight, tone up and learn to be productive in a threatening situation.

Put the pink dumbbells down and pick up a heavy barbell—even if you must struggle, because that struggle will prepare you to survive a crisis situation. Men aren’t off the hook from preparing for survival. Put down the cigarette and pick up a barbell to put some muscle on that body. You never know when you’ll one day need it.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

How to build up or rebuild your Credit

After taking all the necessary steps to Fixing a Credit Report after being hacked, it is then tome to rebuild your credit. Bad credit is bad credit no matter how it happens. No matter how responsible you are with your money, you won’t get a loan if there’s no evidence of this. The evidence comes from having credit. You need to show lenders you can be trusted.12D

  • Every time you apply for a credit card, this puts a dent in your credit score. In other words, it can negatively affect your scores especially if there are lots of credit checks in a short period of time. So apply with a lot of discretion; do you really need that extra charge card? Or is it worth it to continually cancel accounts and open new accounts while playing the interest/points game?
  • Get a major credit card. A charge card is an opportunity to show that you will pay back, on time, money that you “borrowed.” A debit card for this purpose is meaningless because it withdraws money from your account on the spot.
  • An option is a type of credit card that requires a security deposit. Payment of your bills will not come from this security deposit. But it looks good to a potential lender, making you seem more trustworthy.
  • Charge things like gas, food and other items, and/or put a monthly bill on the card for automatic payments such as your cable bill, then pay the card on time every single time—ideally the entire balance. This will create a record of your trustworthiness.
  • Charge no more than 50 percent of the card’s limit in any given month, even if you CAN pay the whole thing off every month. Exceeding 50 percent, some say, can adversely affect your credit score.
  • A rule of thumb is to charge only what you’d be able to pay in cold cash every month. Just because your card has a $5,000 limit doesn’t mean you should rack up $4,500 worth of purchases in one billing cycle.
  • Use the card every month; don’t let it go dormant, as this is not impressive to a lender. If you’re having a tough time remembering to charge things like new shoes, food, drug store items, etc., then set it up for automatic draft of a monthly service.
  • Even ONE late payment will screw things up. Remember, charge only what you’d be able to pay for in cash each month. If you can’t, don’t charge it.
  • If YOU check your credit report any time; it won’t dent your credit score. When lots of creditors check your credit, that can affect your scores.

Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing  identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247. Disclosures.

How your Brain is affected by Phishing Scams

A recent study says that people are more mindful of online safety issues than what experts had previously believed. An article on phys.org says that Nitesh Saxena, PhD, wanted to know what goes on in users’ brains when they come upon malicious websites or malware warnings.

13DSaxena points out that past studies indicated that users’ minds are pretty much blank when it comes to malware signs. Saxena and colleagues used brain imaging (functional MRI) for their study.

Study subjects were asked to tell the authentic login pages of popular websites from phony replications. A second task for them was to differentiate between harmless pop-ups while they read some news articles and pop-ups with malware warnings.

The fMRI showed brain activity as it corresponded to the users’ online activity: attention, making decisions, solving problems. The images lit up for both tasks, but of course, fMRI can’t tell if the user is making the right decision.

That aside, the results were that the users were accurate 89 percent of the time with the malware warning task. When users were met with malware warnings, the language comprehension area of the brain lit up. Saxena states in the phys.org article, “Warnings trigger some sort of thought process in people’s brains that there is something unusual going on.”

The accuracy rate of telling an authentic website from a phony one was just 60 percent. Saxena believes this might be because users don’t know what to look for. For instance, they don’t know to look at the URL, which can give away the phoniness.

This study also had the participants complete a personality evaluation to measure impulsiveness. The fMRI images revealed differences based on impulsivity. Saxena says there was a “negative correlation” between brain activity and impulsive behavior. The impulsive user is prone to hastily clicking “yes” to proceed, when a malware warning pops up.

There was less brain activity in the key cerebral areas of decision-making in the users who had greater degrees of impulsivity.

This study has potential applications for the improved design of malware warning systems. These results can also assist company managers by identifying impulsive workers who need stronger online security training.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing  identity theft prevention.

How to Spot a Splog

I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers have tainted this medium with splogs.

7WThe word splog is a combination of the words spam and blog (from my perspective, it could easily be called  blam as well). And that’s exactly what it is, a blog full of spam.  Splogs are blogs that usually have plagiarized content and have a ton of banner ads and hyperlinks. Splogs also can have repetitive content—basically the same article but using different targeted keywords each time since the main goal of a splog is to direct to you sites the scammer wants you to visit

Spammers use search engine optimization (SEO), also known as manipulating a website’s page ranking on a search engine, to attract innocent visitors to the splog. To increase page ranking, splogs will use content filled with phrases or key words that get ranked high in search results.  That way, when you are searching for a particular search term, the splog will appear on the first few pages of search results.

Spammers primarily use splogs for two reasons. First and foremost, they use splogs to make money. The splogs have ads that link to partner websites and when you click on one of those ads, the spammer gets paid by the partner for directing you to the site. The second reason is more malicious. Scammers will use a splog to direct you to their fake site that is used to capture your personal information such as your credit card, email, or phone number or download  Once they have your personal information, they can use sell your information or generate phishing attacks to get money from you. Or if they automatically download malware to your device, they could be using the malware to find out more information or hold your device hostage.

Because blogs are relatively easy to create, it doesn’t take that much time to create hundreds and thousands of splogs, especially since the scammers aren’t creating original content and are often duplicating the same content. These splogs are then crawled by the search engines, thus appearing in search results for you to click on and making it harder for you to find the actual information you are searching for online.

Splogs are annoying and can get in the way of your web experience. Here is how you can spot a splog:

  • Splog posts are usually 50 to 100 words long and riddled with hyperlinks. Also, there might be hundreds of posts a month; you can check this by looking at the blog archive.
  • The URLs are unusually long and include keywords for SEO purposes.
  • They often use the domain (URL suffix) of .info rather than the widely used .com because those domains are cheaper. So if you see a blog.sample.info you should proceed with caution.

Don’t let a splog fool you. Share these tips with your friends and family. As  less people visit these sites and click on advertisements, spammers will be less likely to use this growing spam technique.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  Disclosures.

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He tiptoes around to hide his sounds so he’s more likely to go undetected as he steals your belongings. But unlike the burglar, who usually takes your stuff and leaves, an efficient rootkit can stick around for years doing its work, robbing your computer or mobile device of data.

http://www.dreamstime.com/stock-photos-identity-theft-red-words-binary-code-computer-monitor-image39907813How do you get a rootkit? One way is via a , or a malicious file that looks benign, like a plug-in that you download or an opening an email attachment. Rootkits can also be spread through infected mobile apps.

Once downloaded, a  rootkit will interfere with your device’s functions, including your security software. If you run a security scan, a rootkit will often prevent your security software from showing you this information so you’ll have no idea that malware is running on your device.

Because of this, it is difficult to detect a rootkit. Detection methods include looking for strange behavior on your device or scanning your device’s memory. If you do believe that you have a rootkit on your computer or mobile device, you can either reinstall your operating system (after backing up your data, of course) or use a rootkit removal tool like

  • Don’t open suspicious links or attachments. Although they might look harmless, they could have malware installed on them.
  • Keep your OS updated. Make sure that you install the latest updates for your operating system and any hardware updates that are available for your device as these often close up security holes.
  • Install comprehensive security software. Security software, like McAfee LiveSafe™ service, can safeguard your computer or mobile device from rootkits. Make sure to keep your software updated against new threats.

For more security tips and news, check out the Intel Security Facebook page or follow them on Twitter at @IntelSec_Home.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  Disclosures.