Posts tagged "identity theft expert"

Spokeo Shows Your Home with Only a Name?

image-4041
True. Unless you have chosen to Opt Out (see below), a picture of your home is only one search away on Spokeo.com, even if I don’t have your address.

Check it out for yourself at www.spokeo.com. On most profiles, if Spokeo has your current address, they also have a picture of your home. It is the same as Google Street View, almost. The difference is that on Google Street View or Google Maps, you can’t easily look up someone’s address based on their name and find the corresponding picture of their home.

In other words, Spokeo aggregates your personal data in a more sophisticated way, ultimately giving users the ability to search on your name and peel back layers of your personal information. This has caused a recent web buzz on the subject and is pushing people to go on their site to remove information you don’t want to share with the world. A few months ago I posted a video about removing your information from Spokeo. Here are the steps.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Data Breach Increases 33% in 2010 and You’re Next

The latest identity theft statistics released by the Identity Theft Resource Center documented 662 data breaches* in the United States in 2010. The message couldn’t be more clear:

Corporations are not yet taking identity theft and data breach seriously enough to properly train their employees, executives, and board on the BOTTOM-LINE DESTRUCTION caused by data breach.

Sure, at this point, many organizations pay lip service to data crimes. They have a privacy policy and their marketing materials state that they do everything in their power to protect your private information. Everything, that is, unless it costs them money to do so. Many corporations tend to hide behind the excuse that in these lean times, they can’t afford to take any additional security steps. But they must understand the disproportionate costs of recovering from theft rather than preventing it. In the simplest of terms, the ROI on data theft prevention training can easily be a thousand-fold. Each record lost, according to the Ponemon Institute, costs, on average, $204 to recover. Lose 1000 records (considered a very small breach), and you are suddenly out $204,000! According to the same study, the average cost for a business to recover from a data breach is $6.75 Million. The average cost to implement identity theft, social engineering and data breach training? In most cases, less than $50,000.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Your Apps Are Watching You

image-3974
Statistics say 1 in 2 Americans will have a smart-phone by December 2011. Many people keep their address, bank account numbers, passwords, PIN numbers and more stored in their phone. The mounds of information kept in smart-phones is more than enough to steal one’s identity with ease.

What most people don’t consider are the applications that they are using on a daily basis. What information is stored there? According to a recent Wall Street Journal article, more than you think.

After examining over 100 popular apps, they found that 56 transmit the phone’s unique device ID to companies without the user’s knowledge. Forty-seven of the applications transmitted the phone’s actual location, while five sent other personal information such as age and gender.  This shows how many times your privacy is potentially compromised without your knowledge, just by playing music on Pandora.

Here are a few of the culprits:

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , ,

WSJ Article Quotes Identity Theft Expert, John Sileo

image-4019
How To Beat The Online Scammers

(A Wall Street Journal Excerpt by Jennifer Waters)

Your pet’s name is a fraudster’s best friend.

You may think you’re giving up precious little when you tell your Facebook friends that you’re dressing your pooch, Puddles, in your favorite color, red, for brunch at Grandma’s on Sunday. But you’ve actually just opened a Pandora’s box of risks.

The information consumers willingly, and oftentimes unwittingly, unleash on social-media websites sets off a feeding frenzy among fraudsters looking to steal everything from your flat-screen TV to your identity…

Too much information can hurt you in other ways. John Sileo, a Denver-based identify-theft expert, says your online chatter could equip an ex-spouse with ammunition for a court challenge. Future or current employers could have a problem with information about your personal life that they deem inappropriate for a member of their staff, he says. You also could be furnishing a would-be stalker with information about your whereabouts. Click Here to Continue Reading….

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , ,

How To Control Your Privacy Online

image-3878
Identity theft is all about control. Who has control over your personal and financial information? Is it you, or the criminal on the other end of your computer using your information to apply for a credit card?  Losing control of your personal information can be all too easy online. But by taking some precautions, you can maintain privacy while safely surfing the internet.

Here are 5 tips to protect your privacy online:

1. Adjust social-network privacy settings

Facebook has been working to simplify their privacy settings, but they can still be confusing to the average users. Spend about 10 minutes a month making sure that your privacy settings are what they should be and are actually protecting your privacy.

To get there, log in to Facebook, in the top right of your screen it should say “Account” when you scroll over or click on that tab you can see you Privacy Settings. Click here for a step by step process of how to adjust your privacy settings.

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,

Facebook Reveals the End of Your Privacy | Sileo

image-3876

The many changes that Facebook has been making recently have users nervous. Nervous because they are lacking the control that they once had over their privacy on the social networking site. While Facebook has never been the mecca of privacy, the recent and swift changes they are making has created more of an issue for users. One by one they are voicing their concerns with the new features and why they feel Facebook is slowly revealing the end of your privacy.

Facebook and privacy issues go hand in hand.

Here are a few of the new features; although they are snazzy, they have many users concerned.

Posted in Cyber Data Security, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,

Financial Speaker Sileo Shares Story on Fox & Friends

Financial Speaker John Sileo Appears on Fox & Friends

John recently appeared on Fox & Friends to debunk myths about electronic pickpocketing. After the show, Fox host Steve Doocy asked John to stick around to talk about his personal experiences with identity theft, data breach and fraud. Having experienced these crimes first hand, John became a professional financial speaker with clients including the Department of Defense, Homeland Security, Pfizer, Blue Cross Blue Shield and the Federal Trade Commission. To see John in action, visit his Financial Speaker page.

Posted in Fraud Detection & Prevention, Identity Theft Prevention, Sileo In the News by Identity Theft Speaker .
Tags: , , , , , , , ,

Internet Explorer 9 Privacy Feature Limits Tracking

image-3860
Microsoft has announced that the latest version of Internet Explorer will offer users a new anti-tracking privacy feature. This will help prevent marketing and advertising companies from watching where you surf and what you do online without your consent. Users will be able to set their preferences to prohibit companies from obtaining sensitive tracking information. This is a first step in the right direction – browsers should step up as the first line of defense against unwanted information collection.

This comes at a time where advertisers want to reintroduce the use of deep packet inspection in order to more closely watch and market to consumers online.  This method reads and analyzes raw packets of your personal data as they travel across the Internet – for obvious reasons deep packet inspection has been the subject of much controversy. Internet users are becoming more aware that what they do online is not private and are beginning to ask for tools to protect their browsers from spying.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Sileo Deflates ePickPocketing Hype on Fox & Friends

John appeared on Fox & Friends this morning to set the facts straight about the real and perceived risks posed by Electronic PickPocketing.

It is true that Identity Thieves are able to steal your credit card information without even touching your wallet. The technology exists, is readily available and can be assembled for under $1,000. But that doesn’t necessarily make it an efficient means of stealing credit card numbers.

RFID, or radio-frequency identity technology was introduced to make paying for items faster and easier.  All major credit cards that have this technology have a symbol (pictured below). It means that your card can communicate via electromagnetic waves to exchange data (your credit card number) between a terminal and a chip installed inside of your card (or passport). Thus, by getting within a few inches of your credit card, a thief is able to obtain your credit card number, expiration date and maybe your name.

Posted in Cyber Data Security, Identity Theft Prevention, Sileo In the News by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , ,