Latest Posts

What Larussa’s Botched Bullpen Call Teaches About Trust

image-5073

St. Louis Manager Tony La Russa changing course mid-stream (Dilip Vishwanat / Getty Images)

During Monday night’s World Series game, Tony La Russa, the coach of the St. Louis Cardinals, failed to warm up the right-handed relief pitcher he desperately needed to face the Texas Rangers red-hot right-handed batter, Mike Napoli. Napoli, with the games announcers in complete disbelief at the oversight, took advantage of the mistake, drilling the pitch into right center field for a double. The Texas Rangers went up 4-2 and won the game.

Directly following the game, La Russa blamed the dugout phone, the bullpen coach (indirectly) and the noisy crowd for his failure to warm up the right guy. Within minutes, you could almost hear the simultaneous guffaw of the entire sports world, “It’s the phone’s fault?”. Our collective BS meters went off because in some way, we sensed he was covering something up.

Posted in Digital Reputation & Trust, Fraud Detection & Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

Britain, America Unite Against Identity Theft Trends

image-5063
London, UK (PRWEB) October 16, 2011

The world of identity theft is changing rapidly. Earlier this week Experian UK, a unit of one of the world’s largest credit-reporting agencies, hosted the 2011 Identity Theft & Fraud Forum at The Grove, a prestigious five-star resort located on the outskirts of London. The purpose of the Forum was to assemble a cross-cultural collection of thought leaders on identity theft prevention and to focus attention on Britain’s increasing financial battle with identity theft. Keynote presenters included highly regarded American identity theft expert John Sileo, Jairam Sridharan, Head of Retail Assets, Axis Bank of India and Jonathan Walsh, Head of Consulting and Analytics, Identity & Fraud at Experian.

During his afternoon presentation, Mr. Walsh revealed the results of a newly released study commissioned by Experian UK. The study found that cases of identity fraud have doubled in Britain over just the past six months and that the trend is likely to continue unless addressed.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Child Identity Theft (Part II)

If you missed the first part of this series, please visit Child Identity Theft  (Part I).

Child Identity theft is the fastest growing sector of the identity theft “industry,” and the numbers are staggering. Although it’s difficult to estimate exactly how many children lose their identities since the crime can go undetected for years, the FTC states that 5% of identity theft cases target children, which translates into 500,000 kidnapped child identities per year, and growing. The Carnegie Mellon CyLab Report states that in 54% of the cases, the child was under the age of 14.

The identity thief is not always a stranger. In many cases, it’s a relative with bad credit who takes advantage of a child’s pristine credit. Conveniently, these family members generally have access to the information necessary to maximize the fraud with little attention. This seems absurd, but imagine a parent who is strapped for cash, has a bad credit score and needs to buy groceries. In this case, short-term thinking blinds the relative or friend to long-term consequences. In other instances, the child’s future is not taken into consideration at all.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , ,

Credit Freeze Stops Financial Identity Theft

credit-freeze
image-702
Freezing your credit is the number one way to protect against financial identity theft. If everyone in the country applied for a Credit Freeze, identity thieves would quickly be out of business. At least, a major part of their business. Take 30 minutes and lower your chances of identity theft drastically (see the online Freeze links at the bottom of this post).

To go directly to placing a security freeze on your 3 bureau accounts, page down to the bottom section.

Every time you establish new credit (e.g., open up a new credit card, store account or bank account, finance a car or home loan, etc.), an entry is created in your credit file which is maintained by companies like Experian, Equifax and TransUnion (listed below). The trouble is, with your name, address and social security number, an identity thief can pretend to be you and can establish credit (i.e., spend your net worth) in your name.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Are Mobile Banking Apps Safe and Secure? Not Yet | Sileo Group

mobile banking apps

A study produced by The Ponemon Institute and ThreatMetrix (Mobile Payments & Online Shopping – October 2011) states that only 29% of consumers use mobile banking apps on their smart phones and tablets. Of those that don’t participate, 51% cite security reasons for their lack of participation. In other words, consumers like you and I are not yet comfortable with mobile banking apps safety. And our instincts are correct! Why shouldn’t you be comfortable with mobile banking apps quite yet?

Top 7 Reasons Why Mobile Banking Apps Aren’t Safe (Yet)

  1. Because most app stores (e.g., Android Marketplace) don’t review apps for security, it is very easy for criminals to post malicious apps that steal information from your mobile device (like your bank account numbers).
  2. The average smartphone or tablet user has installed no security software on their mini-computer (that’s what smartphones and tablets are), meaning that they have only a fraction of the security of a laptop or desktop.

Posted in Cyber Data Security by Identity Theft Speaker .
Tags: , , , , ,

Is Your Wireless Carrier Tracking Your Surfing Habits (Maybe)

Oh what your mobile phone carrier knows and tracks about you! A one-page document from the Justice Department‘s cybercrime division shows how cell phone companies record and retain your call and surfing activity (calls, text messages, web surfing and approximate location). Here’s a summary of how each company retains your information (full details in the image below):

  • Verizon Wireless – rolling one-year records of cell tower usage & what phone accessed what web site
  • AT&T / Cingular – ongoing records of cell tower usage since July of 2008
  • T-Mobile USA – doesn’t keep any data on Web browsing activity
  • Sprint Nextel’s Virgin Mobile – 3 month record of text content
  • Other than Virgin Mobile and Verizon, none of the carriers keep texts but they keep records of who visited a particular web site.
  • Verizon keeps some information for up to a year that can be used to ascertain if a particular phone visited a particular Web site

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , ,

iPad Vampires: 7 Simple Security Settings to Stop Data Suckers

image-5024
Information is the currency and lifeblood of the modern economy and, unlike the industrial revolution, data doesn’t shut down at dinnertime. As a result, the trend is towards hyper-mobile computing – smartphones and tablets – that connect us to the Internet and a limitless transfusion of information 24-7. It is an addiction that employers encourage because it inevitably means that we are working after hours (scanning emails in bed rather than catching up with our spouse).

In the work we do to change the culture of privacy inside of organizations, we have discovered a dilemma: iPads are not as secure as other forms of computing and are leaking significant amounts of organizational data to corporate spies, data thieves and even competing economies (China, for example, which would dearly love to pirate the recipe for your secret sauce). Do corporations, then, sacrifice security for the sake of efficiency, privacy for the powerful touch screens that offer a jugular of sensitive information?

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , ,

U.S. is Dumb About Smart Cards

image-5008
The typical US consumer still swipes their card, credit or debit, with those same old black magnetic stripes. And, we hold our breath and hope they work, and don’t lead to erroneous (fraudulent) charges we have to defend. The rest of the world has switched to Smart cards, according to Peter Svensson, The Associated Press, in The Denver Post. “The problem with that black magnetic stripe on the back of your card is that it’s about as secure as writing your account information on a post-card”.

Svensson comments “Smart-cards (chip-based cards) can’t be copied, which greatly reduces the potential for fraud. Smart cards with built-in chips are the equivalent of a safe:  They can hide information so it can be unlocked only with the right key”.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , ,

Sileo on 9News: Aurora City Council Identity Theft

By Kevin Torres, 9News

AURORA – Five of Aurora’s most powerful politicians found out how vulnerable they truly are. They’ve joined a long list of people who have fallen victim to identity theft.

The city councilors thought they were alone, until they heard from their colleagues at a council meeting.

“It was kind of a relief when I found it was a council thing and not me personally,” said Councilor Molly Markert.

Markert and four other councilors received bills for items they never even purchased, including electronic devices.

If there was ever an expert on identity theft, John Sileo would certainly be high on the list.

He’s written a few books on the issue and even does work for the Department of Defense and Homeland Security.

Sileo says the thief or thieves likely cracked the councilors’ codes by one of two ways.

Posted in Identity Theft Prevention, Sileo In the News by Identity Theft Speaker .
Tags: , , , , , , ,