How to Protect You Frequent Flier Miles NOW

Social Security numbers and credit card numbers are not the only types of data that hackers are after. Now, they are looking at frequent flyer accounts, and they are stealing reward miles, and then selling them online.

How do Hackers Steal Frequent Flyer Miles?

As with other types of ID theft, hackers use info that they have illegally obtained to access frequent flyer accounts. With more data breaches happening than ever before, hundreds of millions of records are exposed, and thus, hackers have great access to the personal info they need to get into these accounts.

What do Hackers Do with Frequent Flyer Miles?

It is hard for hackers to use these miles on their own because often, the travel has to be booked in the name of the owner. However, it is very easy to transfer these miles to other accounts or to use the miles to purchase other rewards. Usually, no ID is needed for a transfer like this. This is also difficult to track because hackers use the dark web and VPNs to remain anonymous.

Hackers also sell these miles, and they catch a pretty penny. For airlines like British Airways, Virgin Atlantic, and Delta, they can get hundreds, or even thousands of dollars for their work.

In addition to transferring these miles from one account to another, hackers are also selling the account’s login information. Once someone buys this, they can now get into the owner’s account and do what they want with the miles.

Protecting Your Frequent Flyer Miles

There are some things that you can do to protect your frequent flyer miles. You should check your frequent flyer accounts regularly using your airlines mobile app. Change all your airline passwords and never re-use passwords and set up a different password for each account.

Other things that you can do include the following:

  • Protect your personal information by making sure every online account has a unique and difficult to guess password.
  • Use a dark web scan. This will show you if any personal information is out on the dark web.
  • If you do find that your miles have been stolen, it also is probable that your personal information has been compromised, too. Monitor your credit report and check it often for anything that looks odd. This is a big sign of an issue.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Genealogy Websites Scare Me, But This is Good

Investigators in Sacramento have arrested Joseph James DeAngelo for rape, but they only found him based on records from a genealogical website.

10 Internet Security Myths that Small Businesses Should Be Aware OfThe effort wasn’t easy, but this guy is now off the streets. The process started with taking a look at DNA that was collected from the crime scene, which happened many years ago. Investigators didn’t have a match. However, recently, they started comparing DNA with genetic profiles that have been collected from ancestry sties. These are companies that collect DNA from people to tell them more about their family backgrounds.

Though DeAngelo’s DNA was not found, investigators were able to match the DNA of his family members with the DNA found at the crime scene. Investigators looked closer and noticed that DeAngelo not only lived in the area where the rape occurred, but also was in the same age range as the suspect. The investigators began watching DeAngelo and picked up a piece of trash that he discarded. They tested it in the lab, and the DNA on it was a perfect match to the DNA at the crime scene.

Once investigators realized they had a match, they knew that they had to spring into action. They were able to quickly make an arrest. DeAngelo was booked into jail and charged with two murders. He is also expected to face an additional 12 homicide charges, which occurred from 1974 to 1986. Because the crimes occurred in several counties, it is likely that county prosecutors will come together as one prosecution team to put DeAngelo on trial. It is also likely that the trial would not be held in Sacramento because the majority of the crimes occurred in Southern California. There is also the question as to if the prosecution team will charge DeAngelo with rape, as the statute of limitations has expired. There is no statute of limitations for murder in the state of California.

Some prosecutors, however, are looking to the FBI to help put DeAngelo behind bars for the alleged rapes, too, including Jeff Reisig from Yolo Country, and the DA from Contra Costa County. They believe that DeAngelo is the so-called East Area Rapist, who has been connected to 12 murders, 51 rapes, and hundreds of burglaries.

There are certainly some issues with these DNA tests, but that can be for another time. For now, it’s pretty important to know that there is some good that can come out of it, especially if it means getting criminals off the street.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

How Your Username Can Be used to Track You

You probably have a few usernames, or you might have just one that you use for every site. Either way, your user names can be used not just to identify you online, but it can also be used to track you and find out information about you. How do people track you based on your user name? They do the following:

They Start with a Google Search

The first thing people do to track your username is do a Google search. You will be amazed by all of the information that is out there. However, Google is not the only game in town, so the best scammers will search on other search engines, too, including Bing,  USA.gov, various information broker sites and within social media.

They Then Move on to Social Networks

With so many people on social networks, it is a good possibility that a scammer can find you there, too, especially if they know the username that you use over and over again. It’s easy to find someone on sites like Facebook, Pinterest, Twitter, and Instagram, and in many cases, this is a gold mine of information for them.  Once they find your account, they can do any number of things like save your profile image, and then do a reverse image source. This often helps them find even more information.

Don’t Forget the Blogs

Savvy searchers will also do searches of a username on blogging sites like Tumblr, Blogger, and LiveJournal. Unless your blog is locked down, and most are not, they can read them.

Do a General Sweep of Username Searches

There are other sites, too, that allow people to search by username. For example, you can search for a username on Spotify. This could tell them what types of music you like. They also might look on a site like Reddit, and they can see any comments you have made. They aren’t done yet, though…you can even search for usernames on sites like Amazon.com and eBay. As you can imagine, once they go through all of these steps, they can know a ton about you.

You might think that this is an invasion of privacy, but all of this information is totally legal, totally available, and totally free.

And many of you are TOTALLY putting it ALL out there!

If you put your information out there, it is there for anyone to look at and use as they will. So, consider changing up your usernames, and while you are at it, take a look at your accounts and content to make sure nothing there’s going to get you in trouble, and beef up the security options.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Beautiful Buxom Brunette Lures Boxer to His Death

Eddie Leal, 23, was an up-and-coming professional boxer who gave free boxing lessons in his garage to down-and-out neighborhood teens. He was a good guy. And like most young men, was looking for a girlfriend.

Phishing is Getting FishierOne day he saw that a young woman, Rebecca Santhiago, was asking for a friend request on his Facebook page.

The brunette bombshell with fashion model looks said she was 21, liked to party and was attending college.

What Eddie did: He accepted the friend request.

What Eddie should have done: right-clicked on the profile image and then selected off the drop-down menu, “Search Google for image.” He would have discovered that the results were suspicious for a stolen image, and that Rebecca Santhiago – at a minimum – did not look like her profile image.

The next move would have been for Eddie to ask Rebecca to post a picture of herself holding up a sign with her name or his name – or a recent newspaper – because “I googled your profile image and it’s on other sites.”

Few young men would have the nerve to do this, fearing it would end the correspondence. But if it ends it, this likely means that the woman was fraudulent. Better to learn this early on, right?

A correspondence – only via Facebook, ensued. Rebecca said she had no phone.

WARNING! A 21-year-old college student with no phone?

What Eddie should have done: Requested she borrow a phone so he could communicate by voice or use Skype to see her as well. This request would have ended the correspondence. And saved Eddie’s life.

One evening he agreed to meet Rebecca at 2:00 in the morning at a nearby park – her idea.

WARNING! What woman in her right mind agrees to meet a man, whom she’s never seen nor heard speaking, at 2 AM at a park? Okay, a few oddballs out there might, but Rebecca’s request should have set off sirens.

What Eddie did: Drove to the park to meet her near a dark street corner, per the plan.

What he should have done: Insist that they meet in the middle of the day for lunch at a café. This request would have ended the correspondence. And kept Eddie breathing.

The meeting took place a few weeks after the Facebook correspondence began. When Eddie arrived and waited in his car, a young man appeared and shot him point-blank in the head.

Who was Rebecca?

She was Manuel Edmundo Guzman, Jr., 19, one of the teens who had once shown up to check out the free boxing lessons.

Extensive forensic investigating revealed that the Facebook messages had come from Manuel’s computer, and that the image belonged to a model unrelated to him. He murdered Eddie for the thrill of it.

Impersonating someone else via cyber communication is called catphishing. Manuel’s fake FB page included friends whom he may have acquired simply by inserting himself into cyber conversations and then making friend requests. Anyone can build a fake Facebook page. Usually it’s done for non-homicidal reasons, but you now know the warning signs of a homicidal catphisher.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Financial Preparedness in a Disaster

You have probably heard that it’s important to be prepared for a disaster. You might have a first aid kit set aside, food and water, or a battery-operated radio. But, are you financially prepared?

Creating an Emergency Fund

It might be tough but try to set aside some money a little at a time. Even if you can put $10 a week in an envelope, it’s better than nothing. Saving change can really add up quickly, too. Keeping a credit card available is also a good idea, but remember…in a disaster situation, it might be very difficult to use a credit card. Here’s a few more ways to save some cash in the event of a disaster:

  • Limit or Quit Habits – If you smoke, drink fancy lattes, or even love your extravagant dinners, consider limiting them or even quitting them. Let’s say the latte you get every day before work is $6 once you pay for the tip. If you stop doing that, or even make them at home, you could save $1000 to $2000 or more over the course of a year.
  • Pay Bills When They are Due – You might not even realize it but paying your bills on time can also help you save money. Each late fee adds up, and so does interest. Most major lenders and utility companies allow you to schedule payments in advance, so if you are sure to have money in the bank, this is a great idea.
  • Get a New Gig – Finally, think of things that you can do to earn more money. Do you have a hobby you like, such as woodworking or knitting, that you could do for profit? Do you write? There are easy to find writing jobs online, too. If you have a skill like that, or something similar, consider looking at freelance sites like Fiverr. Can you cook? Bake and sell your creations to family and friends. All of these things can bring extra cash in; cash that you can use in the case of a disaster.

There is not a solution here that will work for every family, but you should be able to think of some way to help you put away a little money. You also might be able to do two or three things. Some people believe we are close to some type of world disaster, like, I dunno, our government is taking about building short range nukes again. GREAT IDEA! So you might want to be ready just in case.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

It Should Be Illegal for Teen Girls to Give Rides to Strangers

https://safr.me/webinar/  | Robert Siciliano is the #1 Security Expert in the United States with over 25 years of experience! He is here to help you become more aware of the risks and strategies to help protect yourself, your family, your business, and your entire life. Robert brings identity theft, personal security, fraud prevention and cyber security to light so that criminals can no longer hide in the dark. You need to be smarter than criminals yesterday so that they don’t take advantage of you today! If you would like to learn more about Security Awareness, then sign up for Robert’s latest webinar!

_______

If only. But that’ll never be.

Brandi Hicks, 17, and her high school friend, Liz Reiser, exited a video store at 9:30 pm, where they were approached by Matthew Vaca, a creepy acting stranger.

He asked them for a ride to his house. At first they refused, but then he offered $20 for gas. The ID Channel re-enactment portrayed Vaca as stating that his home was “just down the road,” that he had been “walking all day,” and that he wanted to get home before his kids went to bed.

The girls were sold and told him to get into the backseat.

What Brandi, the driver, should have done: Refused, possibly gone back into the store (with Liz) until Matthew left, or possibly asking the store manager to call the police.

The “down the road” seemed nowhere in sight as Matthew told Brandi to keep driving. Then he told her to pull over. He got out, during which the girls really began feeling fearful, discussing whether or not they should just leave him.

What Brandi should have done: Left him.

But Matthew got back into the car, and shortly after, threatened her with a gun, directing her to take the car into a wooded area.

He ordered both out, took Brandi’s shoelaces and bound her to the steering wheel, then ordered Liz to go off with him, eventually stabbing her to death.

He returned for Brandi, untied her and led her away, beating her, then using a shoelace to strangle her (it’s not known why he didn’t have the knife).

What Brandi should have done during the strangulation: Play dead.

What Brandi did: Play dead!

Faking death, she was pushed into a nearby river, and somehow while Matthew loitered nearby for an hour, pretended to be dead while floating in the water.

Once he was gone, she climbed to land and flagged down the first car she saw, which was a police officer’s.

We need to track back to the beginning, because once in the woods, victims don’t have too many options unless they are trained in self-defense tactics.

If you’re ever tempted to give a stranger a ride because he’s giving a story (“I’ve been on my feet all day”), remind yourself of some facts:

  • If he’s able-bodied and lives “down the road,” he doesn’t need ANY ride.
  • If he appears injured or sick, call him a cab, especially if he has $20.
  • If you refuse him a ride, what’s the worst that could happen to him if he’s truly harmless? Aching feet.

Bottom line: Under NO circumstances give a stranger, including a female, a ride. If she looks pregnant, she could be using pillows. Women, too, can be vicious.

Matthew Vaca will die in prison.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

How to be a Grandma Identity Thief Murderer

Lois Riess is a woman from Minnesota who police say shot her husband, went on the run, and then killed a woman in order to take on her identity.  Here are some shocking facts about her:

Riess Looked Like her Victim 

The woman Lois Riess killed, Pamela Hutchinson, looked like her. This is why Pamela lost her life. When the body was found, police said her ID, credit cards, cash, and car was gone. Police put out an arrest warrant for Riess, and then started hunting for her. Police say the women did not know each other.

Lois Riess Allegedly Killed Her Husband, Too

Pamela Hutchinson wasn’t the only one who has allegedly died at Riess’ hand. Lois’ husband, David Riess, is also dead. He was found in the couple’s Minnesota home with several gunshot wounds after two weeks of not showing up at work. David’s car was missing, as was $11,000 out of his business account. It is believed that Lois used the same gun to kill both of her victims. Though Lois originally took the couple’s Cadillac, it was found abandoned in Florida several days later.

Pamela Hutchinson and David Riess

Though she was killed in Fort Myers, Pamela Hutchinson didn’t live there; she lived in Bradenton, FL. She was in Fort Myers to spread the ashes of her husband who had recently passed away.

David, Lois’ husband, owned a commercial worm farm. He was a Navy veteran and loved boating, fishing, hunting, and spending time with his grandkids.

Lois Riess was a Gambler, and She Had an Interesting Nickname

According to reports, Lois Riess was a gambler, and had an addiction to gambling that eventually destroyed her family. It is said that she stole more than $100,000 from her sister, and had the nickname, “Losing Streak Lois.”

Lois Took a Road Trip After the Killings

After killing Pamela, detective believe that Lois left Florida and traveled through Alabama, Mississippi, Louisiana, and Texas. She was driving Pamela’s car, which she took after shooting the woman.

Before Lois was even captured, she was charged with the murder of both her husband, David, and Hutchinson. She is facing a first degree murder charge in Florida along with grand theft auto, grand theft, and criminal use of personal identification. She faces the death penalty if found guilty. As for the alleged murder of her husband, David, in Minnesota, murder charges are pending, so it’s likely that she will face two counts of first degree murder when all is said and done in this case.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Woman Voluntarily Sits in Truck of Man Who Creeped Her Out

Who does this?

Morna Brennen did this when she was 22. She and a few friends went to a bar and stayed there late.

At some point while they were there, a man took an interest in Morna. But she was creeped out by him and pretty much ignored him.

Later when it was time to leave, Morna and one of her friends went out into the biting cold and dark parking lot.

Her friend was going to drive her home. Suddenly, someone from near the bar called out the friend’s name.

The friend told Morna to wait for her, that she’d be right back.

So Morna waited alone in the very cold air.

Then someone appeared before her from the parking lot – the creepy man who had approached her earlier inside the bar.

She told him she was waiting for her ride to rejoin her outside and take her home.

The man suggested that she wait inside his warm truck rather than shiver outside in the cold.

What Morna did: Went inside the man’s truck by her own free will.

What Morna should have done: Gone back inside the bar.

What could have possibly compelled her to sit inside the vehicle of a man who, just a short while earlier, had given her the creeps?

Nobody will ever know, but one theory is that she thought it would have been rude to decline a kind gesture. Women, as children, more so than men, are trained to “always be nice.” Perhaps Morna’s judgement was clouded by being trained since childhood to never appear rude.

Another theory is that despite the way this story is told on Investigation Discovery, Morna was actually forced into the truck.

One might also suppose that had Morna declined the man’s offer and headed back towards the bar, he would have ambushed her from behind and dragged her to the vehicle, forcing her in.

Or perhaps he would have killed her right in the parking lot, then sped off.

So what ultimately could have saved Morna’s life?

When her friend decided to go back into the bar, Morna could have followed as well, if for no other reason than to avoid standing outside in the frosty air.

Nobody knows how much time passed between the time her friend left her and the man approached her.

But if you’re ever standing alone in a dark parking lot in the wee hours of the morning for longer than a few minutes while waiting for your ride to come out of a building, it’s time to go back inside the building.

The man, Rickie Kiger, drove off with Morna in the passenger seat, and soon after butchered her, dismembering her body. This occurred in the mid 1980’s, long before smartphones with emergency apps were invented.

Though it’s possible that Rickie approached her only 20 seconds after her friend left her, it’s easy to believe that had Morna sprinted back into the bar the second she saw him, she would have gotten inside before he had a chance to grab her.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Should You Use Facebook to Login to Websites?

Have you ever used Facebook to sign onto another site? Many of us do this pretty blindly simply because it is very convenient. But, this convenience could come at a cost.

You know the drill. You go to a website and it says “Log In With Facebook.” or Google. Usually, it just takes a couple of clicks and no logging in with other usernames or passwords. However, when you do this, Facebook essentially becomes your online identity. This means that anyone who knows these credentials have access to your preferences, posts, and most importantly, your personal information. What’s more is that you might be unknowingly giving permission to a third party to access your profile, view your online activities, and get information about your friends.

What Can You Do About It?

There are some things that you can do to keep yourself safe. First, of course, you should have a different username and password for all accounts. Make sure your passwords are strong and consider using a password manager. This helps to create strong passwords and keeps them safe for you.

If you play games, do quizzes, or other things on a social media platform, make sure that only necessary apps are connected. Stop connecting other apps.

You should also take some time to look at the settings you have set up for your social media accounts. Adjust them to make sure you are protected. Finally, make sure that you are logging out of your social media account when you are done with it. If you log into your social media account on your tablet or mobile phone, make sure that the lock screen is on before putting it away. Also, of course, make sure that you have a strong passcode on your device.

Control Your Data

Now is the time to take control of your data. When you choose to use a social media site to link with third-party services, apps, and sites, the social sites say that it will enhance your experience for the better. It also can make your online time more productive. At the same time, however, it can open you up to exposure, and even be an open door for hackers. It is important to understand what type of permission you are giving these apps when you click “Log in with Facebook.” Finally, if you are a parent, you should make sure that you understand what your kids are doing on social media, and take a look at what type of permission your kids have given to third-parties.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Does Your Mobile Have Spyware on It?

You have a mobile phone, you might think it’s pretty safe, but what you might not realize is that these devices can have spyware on them. Keep in mind, many of the “signs” listed below are everyday normal phone behaviors. But combined, might mean spyware. Here are some of the signs:

Unusual Background Noise

While common, humming, static, or other weird noises could be a sign that someone is tapping your line. Though all phones might have strange noises from time to time, you should check if there are other signs if you notice them. This is especially the case if you hear them when your phone is not in use.

Short Battery Life

Also common, another sign of a hacked phone is a short battery life. If you notice that your battery is suddenly losing power, it’s possible that there is malicious software running in the background. But don’t panic….yet.

Try Shutting it Down

If something seems weird with your mobile phone, try shutting it down. Watch how it reacts when you shut it down. Phones that have been hacked often won’t shut down correctly or never shut down, even though you tell it to. Still, a common issues with mobiles.

Look for Suspicious Activity

If you notice something suspicious, like your phone turning on or off by itself or apps getting installed or deleted, someone might have hacked it. Other suspicious signs that someone has hacked your phone include strange text messages that contain random letters or numbers. You might see pop-up ads or other issues, too.

Check for any Electronic Interferences

Though it might not be uncommon to get interference from other electronics, such as a computer, another phone, or even a television, it shouldn’t happen if you are not on a call. If it does, it could be a sign of something malicious, for instance, someone listening in on your phone calls.

Look at Your Phone Bill

If your phone bill shows more text or data usage than you typically use, it might be a sign that your mobile phone is hacked. Things like spyware can cause your data to rise, and this could definitely cause your bill to rise. However, keep in mind, if you just downloaded a new app, this could be the cause of your data usage. Also, make sure that no one in your home is using the data, such as your kids, who are notorious for this.

Use Caution when Downloading New Apps

Finally, when you download a new app, make sure they are safe. Most apps from the App Store or Google Play are safe, but occasionally, a malicious app will sneak in. If an app asks for access to your contact list, call history, or address book, use caution.

If you ever suspect spyware, back up your apps and reset the device back to factory then reinstall everything. Keep in mind, unless an iPhone is “jailbroken” spyware is unlikely. But with Androids, spyware is serious. Install antivirus on Androids.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.