Spies Among Us

The term “spy” conjures ideas about “foreign operatives,” “moles” and James Bond. You might envision forged IDs, fake passports and fraudulently issued government sponsored papers. When spies were recently exposed and caught in the United States, it was kind of surreal for me, since some of them lived right here in Boston.

Back in the day, spies used advanced covert technology, was always a hidden or shrunken version of something more common and accessible. Today, the same technology exists, and it’s cheap and mostly manufactured in China. Lighters, pens, just about any small, seemingly benign object you can think of can contain a video or audio recording device. Tiny flash or thumb drives are capable of storing gigabytes of data.

The eleven Russian spies who were recently nabbed used a lot of the same equipment that you and I use today, including laptops, flash memory cards, and cell phones, but with a twist. One of the spies would set up a laptop in a coffee shop on a regular basis, and the FBI noticed that on Wednesdays, a van driven by an official would go by. The FBI determined that when the van passed the coffee shop, there was a direct exchange of data via their wireless laptops. The discovery was made using commercially available WiFi sniffing technology. Apparently, the data was transferred in this way to avoid detection over the Internet.

The phones the spies used were prepaid mobile phones with no contract, which are often paid for with cash so the user can avoid detection. After a few uses they toss the phone and get a new number to avoid detection.

And the availability of fake identification makes it so easy to pose as someone else. Do an online search for “fake ids” and you’ll be amazed to discover how easy it can be to obtain an ID or passport. Or how easy it can be for someone else to obtain an ID that would allow him or her to pose as you. Some websites peddle poor quality cards, others offer excellent quality, and many websites are simply scams.

The fact is, most of our existing identification systems are insufficiently secure, and our identifying documents are easily copied. Anyone with a computer, scanner, and printer can recreate an ID. Outdated systems exasperate the problem by making it too easy to obtain a real ID at the DMV, with either legitimate or falsified information.

In the end, the spies were caught with a combination of high tech surveillance and gumshoe police work. The Boston Globe reports that in 2005, FBI agents found a password written on a piece of paper while searching the home of one of the spies. This allowed agents to decode more than a hundred messages between the spies and their government.

Unless we effectively identify who is who, using secure documentation, it’s spy business as usual.

Robert Siciliano, personal security expert adviser to Just Ask Gemalto, discusses Spies using fraudulent passports on Fox News. Disclosures

10 Ways to Prevent Social Media Scams

The trouble with social media revolves around identity theft, brand hijacking and privacy issues.  The opportunity social media creates for criminals is to “friend” their potential victims in order to create a false sense of trust and use that against their victims in phishing or other scams.

It was big news when someone had their Facebook account jacked by someone who impersonated the victim, claiming to have lost their wallet in the UK and begging for a money wire. Now it’s old news, but it’s still happening.

  • Register your full name and those of your spouse and kids on the most trafficked social media sites. If your name is already gone, include your middle initial, a period or a hyphen. You can do this manually or by using a very cost effective service called Knowem.com
  • Get free alerts. Set up Google alerts for your name and kids names and get an email every time someone’s name name pops up online. You want to see if someone is talking about you or using your name.
  • Discuss social media with your kids. Make sure they aren’t providing their “friends” with personal information that would compromise their security or your families.
  • Monitor what they do online. Don’t sit in the dark hoping they are acting appropriately online. Be prepared to not like what you see.
  • Maintain updated security. Whether hardware or software, anti-virus or critical security patches, make sure you are up to date.
  • Lock down settings. Most social networks have privacy settings that need to be administered to the highest level.
  • Always delete emails you receive in social media from those who you don’t know. I’m messaged all the time by scammers and I’m sure you are too.
  • Don’t enter all the “25 most amazing things about you” or whatever other games that extract your personal information. Nothing good can come from that.
  • Always log off social media sites when you walk away from the PC. If you are ever at someone else’s home or on a public PC, this habit will save lots of aggravation. My sister-in-law, a Boston Bruins fan, left her Facebook open on the family PC. I changed her Facebook picture to the Philly Flyers and wrote Go Phillys! as her status. Bruins lost that night. I blame her.
  • Do not activate geolocation services that tell the world your every move. Nothing good can come out of allowing anyone in the world to stalk your every move.

Robert Siciliano personal security expert to Home Security Source discussing Facebook Jacking on CNN. Disclosures.

MCAFEE, INC. LAUNCHES THE FIRST COMPREHENSIVE PERSONAL IDENTITY PROTECTION PRODUCT FROM A LEADING SECURITY COMPANY

SANTA CLARA, Calif., July 14, 2010 – McAfee, Inc. (NYSE: MFE), the world’s largest dedicated security company, today announced that it has launched McAfee® Identity Protection, one of the most comprehensive and easy to use identity protection services on the market. The product features proactive identity surveillance which keeps consumers’ identities safe by providing multiple layers of protection, including monitoring the major credit reporting agencies and public records as well as Internet scanning for indicators of identity theft.

Javelin Research reports that individuals who took six or more months to detect fraud suffered more than 14 times the cost of those victims who discovered fraud in its early stages.1 McAfee Identity Protection alerts users of potential threats to their identities, ultimately saving them both time and money.

“There have been more victims of identity theft in the last year than any other time in the past six years2 and consumers repeatedly rank identity theft as a top concern because of the substantial remediation costs,” said Todd Gebhart, executive vice president of McAfee consumer, mobile and small business. “To address this market need, McAfee has created a product that is truly customer-focused and proactive. We put victims first, offering a best-in-class fraud resolution service that provides unlimited support, and the strongest collection of identity monitoring and alerting capabilities in the industry. In combination with a McAfee PC security suite, McAfee Identity Protection offers complete personal and online identity protection.”

Industry Statistics

  • 59 percent of identity theft happens through lost or stolen wallets and criminals ‘dumpster diving’ to get financial records and other sensitive personal information3
  • The average fraud amount per victim is $4,8414
  • 50 percent of victims do not discover  that someone has stolen their identity for  several months or years, according to the 2009 ITRC Aftermath Study
  • For as little as $20, criminals can purchase a fake Social Security card at “ID mills” around the country5
  • Every year, the Social Security Administration (SSA) receives eight to nine million earnings reports where the name doesn’t match the Social Security number6

Consumers at Risk:  McAfee Identity Theft Risk Assessment Tool Findings

McAfee also released findings from its Identity Theft Risk Assessment Tool, a free service that can help consumers determine how they are leaving themselves and their identities at risk. McAfee evaluated responses over a nine-month time frame with more than 5,743 participants:

  • 47 percent of respondents carry their Social Security card with them at all times. Experts say this is alarming, as lost/stolen wallets account for a large portion of identity theft
  • 88 percent of consumers have responded to emails and instant messages from people they do not know. McAfee Labs researchers warn against this, as cybercriminals develop elaborate scams to steal consumers’ information through email scams

McAfee Identity Protection Key Benefits

McAfee is the only company to offer a full range of identity protection services including credit and public records monitoring, Internet scanning, alerts, lost wallet protection, identity restoration services, a $1 million product guarantee, and Internet security products to address online identity theft.

Comprehensive Detection: The proactive identity surveillance capability constantly scans multiple sources for indicators of identity theft. This includes millions of Internet black market sites, chat rooms, blogs, and emails where identity thieves obtain stolen personal information. Additional monitoring of public records and change of address databases assists in the early warning of potential identity theft.  McAfee Identity Protection also includes daily monitoring of all three major credit bureaus (Experian, Equifax and TransUnion) to quickly detect and alert consumers to any red flags associated with their credit file such as new account creation or delinquent payments.  

Effortless Protection Against Theft: McAfee Identity Protection is designed to give consumers an effortless way to protect themselves and quickly resolve issues associated with their identity. The product will alert users by email or text when potentially suspicious activity is detected, and lost wallet protection helps users safeguard their credit/debit card accounts by assisting customers in canceling and ordering replacement cards.  McAfee Identity Protection also allows customers to stay on top of their credit reports with unlimited access to Experian credit reports.

Complete Resolution and $1 Million Product Guarantee: Dedicated fraud resolution experts work with consumers beginning to end to help fix identity theft issues. McAfee Identity Protection is designed to provide peace of mind and also includes a $1 million product guarantee if the product fails and a subscriber is ever victimized while his or her membership is active.

Easy to Use: Leveraging McAfee’s expertise in creating consumer-friendly security products, McAfee Identity Protection features an intuitive interface that clearly displays users’ personal identity health as well as actions required. The Web-based McAfee Identity Protection requires no software installation and is available anywhere with an Internet connection.

McAfee Identity Protection is priced at $109.99 for an annual subscription, or $9.99 on a monthly basis for an individual account. Consumers can also select the family option which includes coverage for the subscriber, another adult in the household and children for an annual subscription of $199.99 or $16.99 on a monthly basis. McAfee expects to offer product bundles of McAfee Identity Protection with McAfee core security products in the second half of this year.

McAfee Identity Protection was co-developed with Experian’s ProtectMyID.com, a leading, full-service provider of identity theft detection, protection and fraud resolution. McAfee is not a credit repair organization and McAfee Identity Protection is not a credit repair service. McAfee Identity Protection cannot remove legitimate credit history information from a consumer’s credit report.

McAfee Taps Identity Theft Expert Robert Siciliano

McAfee also announced it has recruited leading identity theft expert and author, Robert Siciliano, as a McAfee consultant and identity protection expert. Mr. Siciliano consulted on the development of McAfee Identity Protection product, and will continue to team with McAfee to drive awareness about identity theft risks. Consumers can read his blog at www.mcafee.com/id-theft-expert.

“I’ve been in the business for more than two decades and I’ve watched identity thieves become increasingly savvy and relentless,” said Siciliano. “The tales I’ve heard would boggle your mind. Most of the time, consumers don’t even know they’ve been victimized, making the damages more devastating and increasing the hours it takes to resolve the issue. In some case, it can take up to three years to clear your name. Consumers have to wake-up to the dangers.”

Identity Theft – Common Consumer Errors

The major problem that consumers face today is a fundamental lack of understanding of what identity theft actually is. Most people think of identity theft as when someone uses your credit card without your permission. Fraudulent credit card use is certainly a multibillion dollar problem, but it’s only one small part of the identity theft threat. A comprehensive understanding of what identity theft and what it is not empowers citizens to make informed decisions about how they should protect themselves.

People who have been victimized by identity theft often have a difficult time functioning as a result of their circumstance. Some deal with minor administrative annoyances whiles others suffer financial devastation and legal nightmares.

No one is immune to identity theft:

A woman contacted me who was previously a very successful real estate agent and the president of her local real estate group. She had climbed the ranks from sales to broker/owner and oversaw dozens of employees. A former boyfriend stole her Social Security number and his new girlfriend used it to assume her identity. Over the course of five years the ex-boyfriend and his new girlfriend traveled the world on stolen credit and destroyed the real estate agent’s ability to buy and sell property. Her real estate license was suspended and her life was turned upside down.

Awareness is key:

Do you carry your Social Security number or a Social Security card in your wallet? Do you provide this number to anyone who asks for it? The most commonly dispensed advice in response to these questions is: don’t carry the card and don’t give out the number. But in reality, there are many times when you have to use your Social Security number. Because this number is our primary identifier, we have to put it at risk constantly. Refusing to disclose your Social Security number under any circumstances is like refusing to eat because the food might be bad for you. There are always risks. The key is managing those risks and making smarter decisions.

Do you know what ATM skimming is? Have you seen a skimmer? Have you been phished? Would you know what a fraudulent auction looks like? Do you put your name on a “stop delivery list” when you travel? Do you know how to update the critical security patches in your computer’s operating system? Do you know if the doctor’s office your child just went to has done background checks on all the employees who handled your and your child’s Social Security number? Most people struggle to answer questions like these.

We live in a technologically dependant time and we rely on all these tools and modes of communication, and most people do not understand the risks. The good news is, I do. And McAfee does. And what we do is keep you informed of your options, so that you know how to protect yourself and your family.

The most important thing you can do right now is not worry about this stuff. But you do need to take some time to educate yourself.

Download McAfee’s eGuide,“What You Need to Know to Avoid Identity Theft.”

Take five minutes to assess your risk of identity theft. Fill out the Identity Theft Risk Assessment Tool to get your “risk profile.”

School volunteers face background checks

All across the country one by one school, administrators are slowly beginning to recognize the need to perform background checks on volunteers.

In Albany County WY, “under the tentative policy, all volunteers would complete an information form when they begin their volunteer work. Additionally, volunteers would undergo screening through the Wyoming Department of Family Services and a to-be-selected national database if they volunteer more than an hour a week on average, accompany students on an overnight trip, spend more than five days working as a volunteer coach or accompany students on any off-campus activity in which they would be alone with students. School principals would also have the authority to request the screening of any volunteer.”

As stated in the article policies like this  are designed to identify the criminal and sexual offense background of potential volunteers.

When a lion is hungry it seeks out a smaller, weaker and slower animals that it feels it has the power to capture and kill. This is a normal and natural evolution of life. Sadly, as with predators in the wild, predators in “civilization” act much the same and seek out their prey in much the same way.

Any time an adult is  positioned to work alongside children in any capacity it is essential that adult is fully checked to determine any prior history of wrong doing that may affect the safety and security of a child.

Robert Siciliano is a Personal Security Expert and Adviser to Intelius.com. For more information see Intelius background checks to learn more. See him discussing Dating Security on E! True Hollywood Stories.  (Disclosures)

Keeping Kids Safe Online

It is no surprise that cybercriminals are taking advantage of the Internet and the people who use it. The Internet is like a bad neighborhood with bad guys around every corner. Any parent with an ounce of sensibility should recognize that when your child is on the wild wild web, they are at the same risk as they would be walking through the red light district in any big city.

I’m not saying this because I want to instill fear and panic, I’m bringing this up because sex offenders, pedophiles, criminal hackers and identity thieves treat the online world as if it was the physical world and use the anonymity of the web and the easiness of approach to seduce your children into doing things they wouldn’t normally do.

The Secret Online Lives of Teens, a survey conducted by McAfee, reveals that tweens and teens are relatively clueless about online privacy. The study sheds light on this generation’s tendency to use the Internet in ways that translate to danger in the real world.

There always has, is, and will be a predatory element out there. Generally, most people don’t want to think about that or even admit that it’s true. Instead of acknowledging the risks, most people completely discount this reality, telling themselves, “It can’t happen to me or my kids.”

The good news is you can do something about it. As soon as a family member becomes active online, it’s time to educate them—no matter what age they are—about cyber safety.

  • Set up the computer in a high-traffic family area and limit the number of hours your children spend on it.
  • Be sure you have computer security software with parental controls.
  • Decide exactly what is okay and what is not okay with regard to the kinds of web sites that are appropriate to visit
  • Use only appropriate monitored chat rooms
  • Never log in with user names that reveal true identity or that are provocative
  • Never reveal your passwords
  • Never reveal phone numbers or addresses
  • Never post information that reveals your identity
  • Never post inappropriate photos or ones that may reveal your identity (for example: city or school names on shirts)
  • Never share any information with strangers met online
  • Never meet face-to-face with strangers met online
  • Never open attachments from strangers

Once you have established the rules, make a poster listing them, and put it next to the computer.

Robert Siciliano personal security expert to ADT Home Security Source discussing Home Security and Identity Theft on TBS Movie and a Makeover. Disclosures.

How Secure Are You And That ATM Transaction?

ATM fraud is more common and likely than a crime committed directly against customers who are in the process of attempting to withdraw cash from the machines, according to NetworkWorld.

When studying “emergency PIN technologies” they state fraud was one of the few concrete conclusions from a report about the use of emergency technology at ATMs issued by the Federal Trade Commission.

Meanwhile reports indicate that thieves used “skimmer” devices to steal $217,000 from Long Island Banks between April and the end of May 2010. Banking information was then re-encoded onto the magnetic strips of blank gift cards. Investigators report that the thefts occurred in Suffolk County, N.Y. They estimate that between 100 and 200 accounts may have been cloned.

The ATM is all about quick easy cash. In the world of technology, when “quick” is paired with “easy” there is a sacrifice made in regards to security. Security is often slow and difficult and most people won’t sacrifice convenience for personal security.

Certainly there is a degree of security in ATMs, but to make them fully secure requires the end user to do more, and unfortunately users often don’t have the ability to jump through all the hoops security requires.

However by understanding some of the risks and incorporating some security tips you can protect yourself.

Always be vigilant when you are at an ATM. Look around the perimeter of the kiosk and beware of anyone paying unwanted attention. If someone is “lurking” they could be waiting to pounce or are shoulder surfing to get your PIN code.

Choose a PIN that’s not easily guessed but can be quickly entered.  Consecutive numbers or the same numbers is never a good idea. Often new ATMs won’t allow you to choose a “soft” PIN anyway.

Don’t ever let anyone help you at an ATM. It’s hard to envision what kind of scenario might involve another person intervening at an ATM. But consider this: Your card gets stuck, someone graciously peeks their head over your shoulder to help. They unstick your card and help you finish the transaction. In the process they got your PIN and swapped your card with another.

In another example two women picked up drunk guys from bars who were waiting for a cab and persuaded them to pull money out of their ATMs while they watched for the PINs. Once they got back to the car one, while making out with him, would pick his pocket and hand off the card to the friend.

Beware of ATM skimming and be able to recognize what an ATM skimmer looks like. Here are some excellent pictures of a well made covert skimming device attached to the face of an ATM. You really need to look for it to recognize it. Not all are as well crafted, but some are very good. ATM skimming of course is when the information on the back of your card is “skimmed” and the criminal then burns the data onto another card and makes withdrawals.

They may have also installed a camera behind a brochure holder, speaker, mirror or in a light bar. If you ever get a vibe that something doesn’t feel right, just leave. Always shield the ATM keypad with your second before entering your PIN.

Meanwhile Romanian Police raided 38 locations and arrested five fraudsters allegedly part of a card cloning gang. Those detained face accusations of being members of an organized crime group, unauthorized access to a computer system, possessing card-cloning equipment, access device fraud and distributing fake electronic-payment devices. Based on this video, they didn’t get a whole lot of equipment but confiscated some cash.

To help combat this type of crime, ADT unveiled the ADT Anti-Skim ATM Security Solution, which helps prevent skimming attempts and detects skimming devices on all major ATM makes and models.

ADT’s anti-skim solution is installed inside an ATM near the card reader, making it invisible from the outside. The solution detects the presence of foreign devices placed over or near an ATM card entry slot, without disrupting the customer transaction or operation of most ATMs. It can trigger a silent alarm for command center response and coordinate video surveillance of all skimming activities. Also, the technology helps prevent card-skimming attempts by interrupting the operation of an illegal card reader.

This technology does not require any software adjustments be made to the ATM itself, and does not connect to or affect the ATM communications network. Prior to its North American introduction, the ADT Anti-Skim ATM Security Solution was successfully field tested on dozens of ATMs of four major U.S. financial institutions in controlled pilot programs. Testing pilots yielded positive results, with no known skimming compromises occurring.

Robert Siciliano personal security expert to ADT Home Security Source discussing ATM skimming on Extra TV. Disclosures.

Renting and Securing an Apartment

The time has come to leave the nest. The little birdie has to spread its wings and fly on their own whether they like it or not.  The process is often overwhelming and difficult and the results can end up being great or awful. But knowing what you’re getting yourself into ahead of time can save you all kinds of headaches down the road.

Check the crime climate of the city/town/neighborhood you are considering moving to.  Often we make moving decisions based on convenience and price.  However consider spending a little more (or even less) if another location is safer but less convenient.

Protect your identity. Landlords almost always ask for a Social Security Number in order to check an applicant’s credit prior to considering them for a move. It is generally not an option to say NO. However by investing in a credit freeze or credit monitoring you can reduce your risks that the Social Security Number will be used for identity theft.

Check out potential roommates. I did the roommate thing throughout my entire 20’s. I had the best and the worst roommates of all times. Some, I am friends with today and others, I wish I never met. There are numerous considerations to be made. The most important consideration is your personal security. Do a background check before signing a lease with a potential roommate.  Determine if they have any type of a criminal history. A background check may also determine if they have even been bankrupt.

Ask the landlord about options for installing an apartment security alarm for maximum safety. Apartment security systems today are easy to install for a do-it-yourselfer or certified alarm dealer. Often they require minimal wiring which means the landlord should have a problem with it. Wireless home alarms are even easier and only require batteries and two sided tape. If the landlord opposes an apartment security system, then the apartment is the right fit for you.

Robert Siciliano personal security expert to Home Security Source discussing burglar proofing your home on Fox Boston.

Mortgage Fraud and Identity Theft: Like Chocolate and Peanut Butter

Robert Siciliano Identity Theft Expert

You don’t need to own a house to become a victim of mortgage fraud. Heck, you don’t even need to be older than 3 to be a victim. As long as the thief has a Social Security number, they can apply for loans in your name.

Lexis-Nexis Mortgage Asset Research Institute in Chicago shows that the incidence of fraud in 2009 increased 7 percentage points over 2008’s levels. In 2008, fraud reports rose 26 percentage points from the previous year. The institute collects and provides data – suspicious-activities reports, or SARS – to subscribers, including mortgage lenders. If you want to compare numbers, there were 67,190 such reports collected in 2009, compared with 63,713 in 2008, and 46,717 in 2007. The 2009 increase was small, but officials say they believe a lot of scam artists are going high-tech.

Law enforcement activities surrounding mortgage fraud across the U.S. have resulted in the arrest of thousands, according to reports. The utility of Social Security numbers as a means to obtain credit fuels the pervasiveness of mortgage fraud.

Some of the most devastating instances of mortgage fraud involve identity theft. Consumers not only have to be leery of questionable mortgage lenders, but also of others who might buy a home in their name.

Data from the U.S. Treasury Department’s Financial Crimes Enforcement Network has revealed that instances of suspected mortgage fraud have risen by 1,000 percent over the past six to seven years, reported the article in thisisyourmoney.co.uk, which went on to say the FBI’s financial crimes section has seen an 800 percent increase in its case load since 2003.

The apparent spike in mortgage fraud reveals one more line of attack that thieves exploit to hijack the financial identities of consumers.

The results of a research investigation by the Federal Bureau of Investigation recently revealed an apparent, significant upward trend in the incidence of mortgage fraud. Furthermore, homeowners who have Home Equity Lines of Credit (HELOCs) are prime targets for financial fraud, suggested a related statement from the Identity Theft Assistance Center (ITAC).

The best way to combat the threat is to transform Social Security numbers into something useless to thieves, who use these universal identifiers to obtain financial identities. Social Security numbers’ de facto role as universal identifiers has fueled a massive increase in financial fraud—simply because these numbers allow criminals to assume others’ identities. Given the scope of financial fraud, which costs billions of dollars every year, consumers need a way to deprive thieves of the ability to gain access to someone else’s finances. They must implement measures that render those Social Security numbers useless to thieves.

Invest in Intelius identity theft protection and prevention. Not all forms of identity theft can be prevented, but identity theft protection services can dramatically reduce your risk. (Disclosures)
Robert Siciliano Identity Theft Speaker discussing the Social Security numbers on Fox News.

Beware of Facebook Dangers

Robert Siciliano Identity Theft Expert

Danger!! Hows that for a blog title that screams fear, uncertainty and doubt!? Fact is Facebook boast 400 million users and is in so many ways seems out of the control of its founder, and is looking dangerous. This is a company that has grown faster than fast and has a (very intelligent) 20 something CEO just out of puberty calling the shots. It seems the amount they (his Board? CIO? ) lets him run at the mouth that privacy is no big deal, shows an immature lack of control over this operation. Any company that wields this much power needs to be checked and balanced.

Their growing pains are publicly played out in numerous lawsuits and visceral rants by every possible pundit (like me) and privacy professional on the block.

Sure when you are that big there will always be someone who wants to take you down. But every week there is a new story about a security breach or a privacy violation. That tells me it’s more than growing pains or jealousy. There are serious management problems there resulting in reputation issues for the company and for the user, security issues.

DANGER, DANGER!

The 3rd party applications in the form of games and quizzes are sharing data that’s not meant to be shared. While the user may agree to the terms of service, they aren’t reading the fine print. Is it really in Facebooks interest to allow this?

Seems like every 2 weeks they change whatever privacy settings there are and the public gets more pissed off with each change. Why doesn’t someone inside this company have a clue what the public wants? What’s more obvious is they don’t care!

Criminals and scammers set up fake profiles of companies and individuals all day every day. These social media identity theft profiles are designed to get people to provide data for free gift cards or other offers that ultimately allow for financial fraud to occur. Is there no way they can more effectively police this?

Recently, the chat feature was made public. For a period of time users chats were available for anyone to see. They had to shut it down to calm the mess. How the heck does that happen? Don’t they have redundancy built in to prevent this?

Ads appearing on Facebook are sanctioned in some way by Facebook and some are malicious. When clicked they can infect your PC. You would think that a private company worth billions would have systems in place to prevent its users from getting hacked via ads placed on their own servers?

So now that I’m done throwing up, protect your identity. Because when it gets hacked on Facebook, don’t say I didn’t warn you.

Invest in Intelius identity theft protection and prevention. Not all forms of identity theft can be prevented, but identity theft protection services can dramatically reduce your risk. (Disclosures)

Robert Siciliano Identity Theft Speaker discussing Facebook Hackers on CNN.