ARCHIVED BLOG POSTS

2011 

A thief hacked into a woman’s checking account and used her daughter’s name on an electronic check to pay for an online porn subscription. The FBI believes this is a relatively new scam, with reports coming in from across the country. The little girl isn’t a signer on the account, but the bank ca...
03/31/2011
Are you one off the 33% of all mobile phones running the Android operating system? The official Android Market is run by Google and there are over 150,000 applications with an estimated 3.7 billion downloads. More than 250,000 applications have been downloaded with a malicious virus. The LA Times...
03/31/2011
Your spouse, boyfriend, girlfriend, or partner just headed out to do errands without logging out of his or her email account. The computer’s sitting right there. Would you feel compelled to check it out? According to a recent study, there’s a good chance that you will eavesdrop on your significan...
03/31/2011
This mess Joseph Kidd stole Larry Smith’s identity 17 years ago, when Smith was 50 years old. While operating under Smith’s identity, Kidd “spent time in jail, as sent to prison, paroled, obtained welfare and Medicare benefits, and got married.” He did all this using Smith’s name, which means tha...
03/28/2011
Facebook for SIM, from Gemalto enables anyone to enjoy Facebook on all handsets, even if without a data connection or data subscription. With this technology, Gemalto brings Facebook to millions of mobile phone users regardless of their handset type. “Increasingly people want to be able to stay c...
03/28/2011
When Google launched Doodle-4-Google, in which children can compete to design Google’s homepage logo, they requested contestants’ Social Security numbers in an effort to prevent duplicate entries. Americans have become accustomed to handing over the last four digits of their Social Security numbe...
03/27/2011
The Huffington Post reports, “The Identity Theft Resource Center says Ty Powell is a victim of identity theft. Freddie Mac says he hasn’t paid his mortgage in two years. The local paper says he’s dead. Powell says, ‘I don’t know what to say.’” Powell bought a house in Arizona from a builder, payi...
03/27/2011
ShareTweet Cellular phones are becoming a bigger target for crime. As smartphones continue replacing landlines and billions of new applications are downloaded, mobile crime, or mCrime, will inevitably increase. McAfee’s threat report for the fourth quarter of 2010 r...
03/27/2011
ShareTweet When a municipality has an organized ring of home invaders you know they have problems. In Fresno Country California a special task force including officers from the sheriff’s department, SWAT teams, and local police agencies had to be created to conque...
03/27/2011
Scammers and hackers often originate from Ghana, Nigeria, Romania, Korea, Israel, Columbia, Argentina, Philippines, Malaysia, and, of course, China and the good old USA. These developing countries breed MIT-like hackers who spend all their days targeting consumers and Internet users like you and ...
03/25/2011
Rainmaker
905,260

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention