Remove your Home from Google maps

If it unsettles you to see your home displayed on Google Maps, there’s something you can do about this. Why might this be a concern? Information is “intelligence”. Information to some is power. The logistics of your home may empower certain people, like burglars. Example; if you’re in a residentially cluttered area vs. a remote area with nearby woods, these details can mean something to a would-be intruder.

3BIn additional to aerial shots, did you know that Google Maps also shows street level views? Uh ohhh…Ya. That can include cars parked outside, people, etc.

Visit Google Maps and type in your address. In the lower left of the screen you will see a thumbnail image called “Satellite.” Click to reveal the satellite image of your area, and see if your street is in view. Look for your dwelling.

How do these images get into the Google Maps system in the first place? Someone from Google actually drives around in a funky car with a crazy 360’ camera strapped to it taking photos. The camera doesn’t discriminate if your young daughters just happen to be sunbathing in the yard at that time.

Play around with the site’s interactive features to see just how much about your home a snooping stranger could learn. The Google Maps site allows zoom-ins that can pick up pretty clear views of what’s inside your garage (if it was opened the day the Google driver was taking pictures) or inside your home (yes, the images are that close-up).

Note, however, that the license plates of vehicles are blurred out. Google claims they also blur out people, but this tactic doesn’t always work, as at least one person claims he saw his license plate very clearly.

We can’t delete our address from Google Maps. But we can get this behemoth to blur out your house.

  • Locate your property to street view level.
  • In the bottom right-hand corner, click the icon called “Report a problem.”
  • This will take you to “Report inappropriate street view.”
  • Tweak the page to get your home inside the red box and fill out the form.
  • Type the verification code and submit.
  • Wait a few days then check to see if your home is blurred out.

You can even make requests for specific things to be blurred, like the $3,000 water fountain in your front yard.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Never put these Docs in your Wallet

Yes, believe it or not, you CAN get by in life with a wallet that just has a little cash, a store card or two, one to two credit cards and your ID.  Unless you absolutely need your insurance card or Social Security card, leave those items at home.

1DFor years now, wallets have been on the market that you can stuff everything into, save for the kitchen sink. This doesn’t mean you must carry a ridiculous bulging wallet everywhere you go.

Now you may not mind having to dig through your wallet for five minutes to retrieve things because there’s so much stuff in there, but do you know who actually would enjoy this?

A crook who specializes in identity theft. With just your Social Security card (come on already, just memorize the number), a crook could open up credit lines in your name and make your life a nightmare.

Now you may think it doesn’t matter because your wallet will never be lost or stolen. Everyone must lose their wallet at some point in their lives? But what if you’re in an accident? What if you’re jumped on the street? What if someone brazenly approaches you, grabs the wallet out of your hands and runs?

If my wallet is lost or stolen I won’t care because there’s nothing in my wallet that the thief could easily use to steal my identity, nor is there anything I couldn’t easily name or easily replace.

Keep the following items out of your wallet:

  • Anything with your Social Security number; again, just memorize it already.
  • Home address
  • Keys
  • PINs and passwords (if you need an assortment of these to function while away from home, use an encrypted app—assuming you have a smartphone).
  • Checks
  • Credit cards you won’t be using on any given day you’re out in the community (though one emergency credit card at all times is a smart move).
  • Birth certificate
  • Credit card receipts
  • Medical cards unless you are going to the doctor
  • Store cards unless you are going to that store

Make photo copies of all docs in your wallet and upload them to your secure email account. Consider an app like “Key Ring” and enter the cards into your mobile device. Put ALL your loyalty cards there and copies of most cards you might need in a pinch.

Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing  identity theft prevention.

Woman Drives her Sleeping Assailant to Police Station

You don’t always have to outmuscle a assailant to beat him at his game. This is what a New Zealand woman learned after Vipul Romik Sharma abducted her. At first, things seemed fine; she exited a bar in Otahuhu with the 22-year-old and another man. Then they kidnapped and raped her.

Sharma then told her he was going to drive her home. The car began weaving due to Sharma’s sleepiness. The woman told him he was going to kill her first with his driving, and amazingly, Sharma gave control of the car to her.

At first, she intended on driving straight to her home with Sharma as a passenger. This occurred very early in the morning, and she figured that upon entering her driveway and tooting the horn, her roommate—a “big Islander guy”—would come out and take care of Sharma. But she realized he would have already departed for work.

That’s when she decided to drive straight to the Auckland Central police station—with Sharma snoozing and unaware.

But then the slime awakened, realizing where he was and repeatedly said “I’m sorry.” Too late, Tough Guy—you did the crime, you do the time. The woman told him: “You will be sorry; just wait.” Officers quickly placed Sharma on the ground.

During court, he claimed that the victim consented to the sex. This all happened in 2006, reported in the New Zealand Herald online, and Sharma was found guilty. As for the second man, he too was convicted.

Well, is there anything the woman should have done differently? It depends on what point of time in this chain of events. Certainly, she did everything right when Sharma began driving erratically. But what was she doing exiting a bar late at night with two men she didn’t know in the first place?

This is dangerous because once you’re outside late at night, it’s not difficult for a man to whisk an unwilling woman away into a vehicle and drive off with her, no witnesses. Think before you decide the best thing you can do for yourself at 1 a.m. is exit a bar with a man you just met.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Google Alert Scams

If you want to know the latest on “any topic”, just sign up for Google Alerts. Google will e-mail you notifications of new information coming online. I have Google Alerts for “Home Invasion” “Identity Theft” “Burglary” “Computer Security” and many more.

So what could be so harmful about receiving alerts about topics or people who are famous for being famous or your favorite presidential candidate?

  • A scamster creates a website and inserts popular search terms such as “Kate Middleton” or “Donald Trump.”
  • If you signed up for Donald Trump, you’ll not only receive legitimate alerts from Google, but also links originating from the scammer’s site. You won’t know which is which.
  • These fraudsters have figured out a way to circumvent Google’s security.
  • Clicking on these links could download malware into your computer.

In another example Intel Security’s McAfee does the “Most Dangerous Celebrity” survey based on malicious search results. They then determine which searched celebrity sites produce the most malware.

What can you do?

  • A tell-tale clue of a scam is that when you hover over the link inside your e-mail, the URL doesn’t correlate to the alleged source of the news. If it doesn’t match up, skip it. A scammer’s URL isn’t going to have what appears to be a legitimate news outlet address.
  • Narrow your search down. So if you want the latest in Trump’s polls, type “Donald Trump polls” in the Google Alert field. Otherwise, just leaving it as “Donald Trump” will not only flood your in-box, but it will be much more likely that some of those “alerts” will be fraudulent.
  • Another way to narrow the parameters is to set the alerts for “news,” “blogs,” “best results” and “United States.”
  • Be very suspicious of URLs that do not end in a dot-com, net, org or other familiar suffix. Often, scammy URLs come from foreign countries where the suffix is different, such as “fr” for France or .ru for Russia or .cn for China.
  • If a link appears to be fraudulent, report it to Google.com/alerts.

If you’re signed up for Google Alerts for numerous topics, consider cancelling some of these, especially if it’s a hot topic that makes headlines nearly every day, such as the presidential race—which you’re bound to see anyway simply by visiting a reputable news site.

Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing  identity theft prevention.

Beware of the Jury Duty Scam

Imagine getting a call from someone identifying themselves as a federal court official or U.S. Marshal, informing you that your arrest is imminent unless you pay a cost—all because you failed to respond to a jury summons (which you don’t remember getting). I’d like to think that you’d immediately smell the rotten scam here and hang up, but unfortunately, many adults fall for this jury duty scam.

10DFirst off, let me get it off my chest: Who the devil ever heard of being arrested or fined for not responding to a jury summons? This farce isn’t even depicted in any of the slew of crime and law dramas that have been on TV for decades.

But the scammer relies on inducing enough fear in the targeted person to win them over. These scammers are sophisticated and even have call centers, says Melissa Muir, quoted in an article on uscourts.gov. She’s director of Administrative Services for the U.S. District Court of Western Washington. She points out that a federal court will never call someone and make threats or demand payments.

So if you hear what sounds like a bustling call center in the background of the call, assume this is staged to make the call sound official.

So what is the federal court’s response when someone ignores a jury summons?

  • The court clerk’s office will contact you.
  • You may be required to appear in court before a judge.
  • At the court, the judge may order that you pay a fine—but not before you’re given the chance to explain why you failed to appear for your jury summons.

If you get a fraudulent call, do not give out any information; hang up. Call your local court clerk’s office or the U.S. Marshal’s Service office for peace of mind: Check if you really did miss a jury summons, but chances are extremely high, and I mean higher than a kite, that the call was a scam.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

Beware of the CEO E-mail Scam

Beware of the B.E.C. scam, says a report at fbi.gov. The hackers target businesses and are good at getting what they want.

emailThe hackers first learn the name of a company’s CEO or other key figure such as the company’s lawyer or a vendor. They then figure out a way to make an e-mail, coming from them, appear to come from this CEO, and send it to employees.

The recipients aren’t just randomly selected, either. The hackers do their homework to find out which employees handle money. They even learn the company’s particular language, says the fbi.gov article. The company may be a big business, small enterprise and even a non-profit organization.

Once they get it all down, they then request a wire transfer of money. This does not raise red flags in particular if the company normally sends out wire transfer payments.

This CEO impersonation scam is quite pervasive, stinging every state in the U.S. and occurring in at least 79 other nations. The fbi.gov article cites the following findings:

  • Between October 2013 and February 2016, complaints came in from 17,642 victims. This translated to over $2.3 billion lost.
  • Arizona has been hit hard by this scam, with an average loss per scam coming in at between $25,000 and $75,000.

Companies or enterprises that are the victim of this scam should immediately contact their bank, and also request that the bank contact the financial institution where the stolen funds were transferred to.

Next, the victim should file a complaint with the IC3.

How can businesses protect themselves from these scam e-mails?

  • Remember, the hacker’s e-mail is designed to look like it came from a key figure with the organization. This may include the type of font that the key figure normally uses in their e-mails; how they sign off (e.g., “Best,” “Thanks a bunch,”), and any nicknames, such as “Libbie” for Elizabeth. Therefore, contact that person with a separate e-mail (not a reply to the one you received) to get verification, or call that individual.
  • Be suspicious if the e-mail’s content focuses on a wire transfer request, especially if it’s urgent.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

Craigslist Rental Scams in Your Town

Craigslist is one of my favorite sites on the Internet, though I admittedly have a love/hate relationship with it. One reason I love it is because of the deals and variety of items and services available, but I hate it because some of the people who use it are scammers and the site has some major security issues.

9DOnce, I listed a property on on Craigslist for rent. Scammers relisted the property for a third of the asking price. People came to my home and would knock on my door to see the property, even after the listing had expired.

Here’s how scammers work on Craigslist:

The scammer will copy and paste the ad and then pose as the homeowner who is overseas on business. To generate traffic, the scammer will list the ad for less than it is being asked. When a person responds to the ad, the scammer then tells them they can rent the property out, they simply need to forward the first month’s rent overseas. More people fall for this than you would believe.

How did I thwart this crime? I continuously scanned Craigslist for my ad to see if it was being posted. When I found any similar ads, I would email the information to abuse@craigslist.com, and the company would take the post down. However, the scammer also was on top of it, and kept posting the ad again.

So how can you protect yourself from these scams?

  • Use common sense, pay attention and be smart.
  • Be careful about who you are contacting and who contacts you.
  • Try to deal locally when possible and always meet in person in a safe location.
  • Do not engage in any online monetary transaction that requires you to send money to a stranger after they send money to you. This is a scam.
  • Do not disclose financial information, Social Security numbers or any account information.

Personal Security Tips:

Always Use Craigslist With Caution – People have been robbed, scammed, burglarized and even killed by using Craigslist. You must be careful about who you contact as you don’t know what everyone’s true motivation is.

Work With a Friend – If possible, meet the person with a friend or family member. There is strength in numbers.

Get ID Info Before Meeting – You also want to make sure that you get the person’s name and phone number before meeting them. Call them to verify the number, and tell them that your brother, who is a cop, will have his cruiser there when you meet, so they should not be alarmed.

Stay As Aware As Possible – There is always risk when meeting a stranger, but staying aware can help to keep you from getting into a bad situation.

Trust Your Instincts – Do not discount any negative feelings you may have about the meeting, and cancel it if necessary.

Wear the Right Things – Do not wear anything provocative or expensive, nor should you wear loose fitting clothing or scarves, as attackers can grab onto them easily. Wear good shoes that you can run in.

Stay in Communication – Make sure someone you know, such as a spouse or family member, knows where you are and when you will be back. Try to have them on the phone during the meeting.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Before you die, do This

“Nobody likes to do it, but it has to be done.” You’ve heard that before. This time, it applies to 26 documents that you should have all bundled up in a folder that trusted family members have access to (someplace where fire and water won’t damage them). But first let’s go over some details about what should be in that bundle.

1PEssential Documents

  • Your will: Some say not a copy, but the original, accompanied by instructions. Supplying everyone in your will a copy is also advised by others.
  • A completed power of attorney form that your benefactors have access to, should you become rendered impaired.
  • Complete list of loans you’ve made to others, and debts.
  • Proof of ownership of the following if you have them: owned property/housing, vehicles, cemetery plots, savings bonds, stock certificates, brokerage/escrow mortgage accounts and partnership/corporate operating agreements.
  • Last three years’ of tax returns might seem excessive, but if you can, do it.

Bank Accounts

  • Name of bank and phone number, account numbers, online login information
  • Register a family member or spouse’s name with the bank; have them sign the registration document to allow them access to your accounts.
  • A list of safe deposit boxes if you have them

Retirement List

  • Pensions
  • Annuities
  • IRAs
  • 401ks

Medical

  • Power of attorney form. If you become incapacited, who will make medical care decisions for you? This should also be IN your will.
  • Choose your POA attorney while you’re of sound mind.
  • Have it spelled out how you’d like to be treated in the event of incapacitation (and this includes what should be done if you end up in a persistent vegetative state). Who pulls the plug?

Marriage & Divorce

  • Does your spouse know where your marriage license is?
  • If you’re divorced, make sure there are documents spelling out child support, alimony and any property settlements and financial divisions. To avoid disputes, include bank account numbers for the appropriate settlements.
  • Keep copies of life insurance documents.
  • Last but not least is the qualified domestic-relations order, that can prove your spouse got a share of your retirement accounts.

Life Insurance

  • Family members should have copies of life insurance documents and contact information for the carrier.

In a Nutshell, the Top 26

  1. Marriage license
  2. Divorce papers
  3. Living will (what should be done if you’re alive but incapacitated)
  4. Personal/family medical history
  5. Authorization to release medical care information
  6. Durable healthcare POA
  7. Do-not-resuscitate (DNR) order
  8. Tax returns
  9. Housing, land and cemetery deeds
  10. Escrow mortgage accounts
  11. Proof of loans made and owed debts
  12. Titles for vehicles
  13. Stock certificates, savings bonds and brokerage accounts
  14. Partnerships and corporate operating agreements
  15. Life insurance policies
  16. IRAs
  17. 401ks
  18. Pension documents
  19. Annuity contracts
  20. Bank account list
  21. List of bank usernames and passwords
  22. Safe-deposit box list
  23. Will
  24. Letter of instruction for the will
  25. Trust documents
  26. Updated passwords document for all your critical accounts.

Do you have docs you think should be on this list? Please provide in the comments.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

You need a Home Security Safe

You don’t have to be wealthy or live in a big house to need a home security safe. If you don’t think you need one, ask yourself why. Ask yourself if you don’t have any valuables—not necessarily something that would be valuable to a burglar, but something very dear and special to you, such as a vintage photo of your great-grandfather.

5HA crook will grab a small safe, not knowing that it contains sentimental items to the owner, and hoping it contains jewelry items he could resell.

So the ideal home safe should be large enough to deter a burglar from grabbing. It should also be fireproof: You wouldn’t want your sentimental belongings to go up in smoke, would you? A safe is also a good place for emergency cash.

An article on community.homeclick.com provides information on choosing a home safe, beginning with the three kinds of locking mechanisms: keypad combination, cylinder dial and keyed lock.

Keypad Combination

This type, which uses batteries, provides fast access and can be customized. The downside, other than having to replace the batteries, is that it’s small enough for a burglar to grab. But if you prefer this system, then bolt this little safe to the floor.

Manual Dial

The manufacturer of this type of lock provides a preset combination, but if you have skill with tools, you can change the combination.

Keyed Lock

The downfall is that these can be picked with a paperclip. Thieves know how easy this is, so if this is your preferred lock, then bolt this safe to the floor—but that won’t stop the burglar from picking the lock. However, it’s fireproof and waterproof, so once the thief sees it’s filled with your children’s birthday cards to you of years ago and old photos of your great aunt Mollie, he’ll leave it alone, I’m sure.

The best safe is a big heavy one. A burglar doesn’t want to hassle with the chore of lifting it and carrying it out of the house. At the same time, it should have a locking mechanism that will stump a burglar. A large, heavy safe is ideal even if you have only a small quantity of valuables; you don’t have to fill it up.

The third feature is the ability to withstand heat. Safes are rated, such as being able to tolerate 350 degrees for one hour. This will surely protect photos, keepsakes and the like, but probably not sensitive electronic equipment. The safe should also have a good rating for resistance to water damage.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Celebrate World Password Day in 2016 With These Tips

Each year, researchers in security take the time to rate some of the worst passwords found on the Internet. While popular pop culture events have caused waves with the list of the worst passwords of 2015 – think “solo,” “starwars,” and “princess” – the worst passwords of last year were still the usual suspects, “password,” “123456,” and “qwerty.”

5DIt shouldn’t be a surprise to anyone that researchers estimate as many as 90 percent of all user-generated passwords are subject to hacking. However, it might surprise you to know that even passwords that you believe to be secure will give little protection if it gets leaked.

On May 5th, the 4th World Password Day will commence, and Intel Security is, for the first time, departing from its usual stance of asking users to change their passwords to something stronger. Instead, they are asking users to add multi-factor authentication, or MFA.

MFA is an extremely powerful security feature that is available on most major websites for free, and this helps to stop any unauthorized person from accessing the account, even if this person knows your password. This feature combines the login with other identification factors such as face recognition, fingerprints or a code that you can use, which is delivered by text message.

Even the President is getting into the password game. That’s how important it is to have a strong password. President Obama recently suggested that Americans should start to protect themselves online by turning on this multi-factor authentication. Additionally, when you supplement passwords with MFA, you will greatly decrease the chance that you become a victim of fraud or identity theft.

Here are some of the best ways to protect and strengthen your password:

  • Create passwords that are strong by using symbols and a mixture of upper and lower case letters
  • Use a different password for every account you have
  • Utilize a password manager to keep track of all of your passwords
  • Turn on the multi-factor authentication feature when possible.

You can find out how well your passwords stack up by testing them online at Passwordday.org, by taking a pledge to add MFA, or even watch some videos about computer security.

You can also join in on a Twitter chat on May 5 at 3 pm Eastern/Noon Pacific. Stop.Think.Connect is hosting the chat and will be joined by @Telesign, @IntelSecurity and @StaySafeOnline. When you pledge to turn on MFA, which is free on most web services, you will be entered in a drawing to win a prize. Make the pledge today to turn on the MFA feature on May 5th, which is World Password Day.

Robert Siciliano is an Online Safety Expert to Intel Security. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! See him knock’em dead in this identity theft prevention video. Disclosures.