Home | Solutions Blog
Latest Posts
Did you know that Facebook can use photos you post on the site in advertisements targeted on the right (advertising) side of your contact’s profile?
Unless you customize your privacy settings, Facebook can share just about anything you post with just about everyone. Using your intellectual property for their financial gain is not a new Facebook issue, but one that should be revisited due to recent Facebook Privacy changes. Here’s the funny part: you gave Facebook the right to use any of your content in any way they see fit when you signed up for your account and didn’t read the user agreement. If you visit the Facebook Statement of Rights page you will see the following:
You own all of the content and information you post on Facebook, and you can control how it is shared through your privacy and application settings. In addition:
Posted in Burning Questions (Video), Identity Theft Prevention, Video Tips by Identity Theft Speaker John Sileo.
Tags: Facebook, Facebook Ads, Facebook Safety, Facebook Share, Facebook Tips, Identity Theft Prevention, John Sileo, social networking, Social Networking Speaker
The identity theft and corporate data risk problem isn’t limited to iPad users – it affects all Tablets – but iPads are leading the way. With the rapid increase in highly powerful tablet computers, including the Motorola Xoon and Samsung Galaxy, a new survey is urging users to beware of the risks. Harris Interactive just released a study showing that tablet users transmit more sensitive information than they do on smartphones and are considerably less confident of the security protecting those tablets.
The survey shows that 48% of tablet users transfer sensitive data using the device while only 30% of smart phone users transfer sensitive information. The types of sensitive data included credit card, financial, personal and even proprietary business information. Many factors contribute to the increased risk:
- Users initially bought tablets as book readers and web browsers, but have increasingly added to their functionality with new Apps.
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Apple, Apps, Data Breach, galaxy, Identity Theft Prevention, ipad, malware, Security, Sileo, tablet, xoon
With the recent avalanche of digital convenience and mass centralization comes our next greatest privacy threat – the stupid use of Mobile Apps. As a society, we depend on the latest technology and instant connectivity so desperately that we rarely take the time to vet the application software (Apps) we install on our mobile phones (and with the introduction of the Mac App store, on our Macs). But many of the Apps out there have not been time-tested like the software on our computers. As much as we love to bash Microsoft and Adobe, they do have a track record of patching security concerns.
The ability to have all of your information at your fingertips on one device is breathtakingly convenient. My iPhone, for example, is used daily as an email client, web browser, book, radio, iPod, compass, recording device, address book, word processor, blog editor, calculator, camera, high-definition video recorder, to-do list, GPS, map, remote control, contact manager, Facebook client, backup device, digital filing cabinet, travel agent, newsreader and phone… among others (which is why I minimize my stupidity by following the steps I set out in the Smart Phone Survival Guide).
Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Android, Applications, Apps, BlackBerry, data security, Droid, Expert, Fraud, Hacking, iPhone, jail break, jail breaking, Jailbreaking, John Sileo, Mobile Phone, safety, Security, Smart Phone, Smartphone, Smartphone Survival Guide
According to the Federal Trade Commission, Identity Theft still tops the annual list of consumer complaints. The list was released last Tuesday and Identity Theft was #1 for the 11th year in a row with more than 250,000 complaints. Identity theft accounts for 19% of all consumer complaints received by the FTC last year.
Why is this such a lingering, time-tested problem? Because most people, most businesses, read about it being such a terrible problem, and then go off an do little about it. Corporations fail to train their employees on personal identity theft, and that lack of skill and prevention framework seeps into the workplace. This, in turn, leads to the loss of more data, customer records, employee files and intellectual capital.
The report also states that the Miami-Ft. Lauderdale, Fla. area ranks #1 in the nation for identity theft complaints per capita. Number 2 on that list is Brownsville, Texas followed by Dunn, N.C.
Posted in Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Consumer Complaints, FTC, identity theft expert, Identity Theft Prevention, John Sileo
In a town with a population of about 3,000 people it seems that almost all the citizens of Bennett, Colorado have had their identity stolen. The scheme was simple and it was easy to fall victim. Identity thieves apparently used skimmers to extract credit and debit card numbers from individuals. Skimmer scams can happen when the criminal installs a “skimming” device over the card slot of an ATM, debit or credit card reader. The skimmer then reads the magnetic strip as the user unknowingly passes their card through it.
In the case of Bennett, Colorado it is believed that this was done at a local King Soopers gas pump. The skimmer is gone now and authorities are on the hunt for the thief. King Soopers has denied that any of the fraudulent activity happened at their gas pumps and authorities have also said that they knew this was a crime spree for the past few weeks. In the meantime, many of the victims who used debit cards are without those funds because its the same as using cash. The average amount stolen was around $700 and more people are coming forward every day.
Posted in Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Bennett, Colorado, credit card fraud, Debit Cards, Fraud, identity theft expert, Identity Theft Prevention, John Sileo, Skimmers, Skimming
In response to the increasing data theft threat posed by Smartphones, identity theft expert John Sileo has released The Smartphone Survival Guide. Because of their mobility and computing power, smartphones are the next wave of data hijacking. iPhone, BlackBerry and Droid users carry so much sensitive data on their phones, and because they are so easily compromised, it’s disastrous when they fall into the wrong hands.
Denver, CO (PRWEB) March 7, 2011

Smartphones are quickly becoming the fashionable (and simplest) way for thieves to steal private data. Case in point: Google was recently forced to remove 21 popular Android apps from it’s official application website, Android Market, because the applications were built to look like useful software but acted like electronic wiretaps. At first glance, apps like Chess appear to be legitimate, but when installed, turn into a data-hijacking machine that siphons private information back to the developer.
Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Android, Android Market, App Store, Applications, Apps, BlackBerry, BlackBerry Security, data security, Droid, Droid Security, Expert, Fraud, Hacking, Hijacking, iPhone, iPhone Security, jail break, jail breaking, Jailbreaking, John Sileo, Lookout, Mobile Phone, safety, Security, Smart Phone, Smartphone, Smartphone Survival Guide
Google removes 20+ Apps from Android Market, signaling that malware distribution has gone mainstream, and not just for Droids.
The Adroid Operating System is open source – meaning that anyone can create applications without Google’s approval. It boosts innovation, and unlike Apple iPhones or Blackberrys, Droid Apps aren’t bound by all of the rules surrounding the Apple App Store. But this leniency can be exploited by hackers, advertisers and malicious apps. And now those apps aren’t just available on some sketchy off-market website, but on the Android Market itself. As smartphones and tablets become one of the primary ways we conduct business, including banking, this development shifts the security conversation into high gear.
A recent discovery forced Google to pull 21 popular and free apps from the Android Market. According to the company, the apps are malware and focused on getting root access to the user’s device (giving them more control over your phone than even you have). Kevin Mahaffey, the CTO of Lookout, a maker of security tools for mobile devices, explained the Android malware discovery in a recent PC World article (emphasis mine):
Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: Android, Android Market, App Store, Applications, Apps, BlackBerry, BlackBerry Security, data security, Droid, Droid Security, Expert, Fraud, Hacking, Hijacking, iPhone, iPhone Security, jail break, jail breaking, Jailbreaking, John Sileo, Lookout, Mobile Phone, safety, Security, Smart Phone, Smartphone, Smartphone Survival Guide
Partial Reprint from CNET.com
Facebook announced this week that it’s seeking user comment on a proposed redesign of its privacy policy that’s meant to make the policy easier to understand while bringing the world of legalese-smothered documents into the widget-filled realm of the 21st century.
In a post to Facebook’s site governance section, the company’s privacy team offers a look at its “first attempt” to re-organize, rewrite, and add interactivity to the current policy, which is essentially your standard mass of small black text.
Among other potentially interesting re-imaginings, the proposed redesign features an interactive tool intended to demonstrate how profile data is put to use in serving advertisements (click “Personalized ads” and scroll down to “Try this tool”). The tool puts Facebook members into the shoes of someone creating and targeting an ad. It’s not clear if users would deem it an educational aid or a nuisance in practice, but that seems to be part of why the potential redesign is being put to public scrutiny in this way.
Posted in Cyber Data Security, Identity Theft Prevention, Online Privacy by Identity Theft Speaker John Sileo.
Tags: Expert, Facebook, Policy, Privacy, Redesign, Sileo, Speaker
For six years I have done almost nothing professionally but study and speak on phenomenons that drive companies out of business or otherwise destroy their reputation. In the process, I have discovered what I consider to be an under-recognized and highly powerful maxim that remains relatively untapped both by people (especially leaders), and by businesses. We talk about it, but we rarely take an active role in improving it.
Reputation gets you what you want.
I know this because I have seen countless people’s reputation destroyed by identity theft (including mine when I was thought to be a criminal) and hundreds of businesses’ reputations wrecked because of data breach, social networking over-exposure or reputation hijacking. I know this because I’ve worked as a reputation management partner to companies that aggressively manage what the world thinks of them from an offensive perspective – they cultivate it long in advance of any attack.
Posted in Digital Reputation & Trust, Fraud Detection & Prevention by Identity Theft Speaker John Sileo.
Tags: Bad Reputation, Expert, John Sileo, Management, Online Reputation, Reputation & Trust, Reputation Management Partners, Reputation Speaker