Robert is an identity theft expert and McAfee consultant who is committed to informing, educating, and empowering Americans so they can be protected from crime in the physical and virtual worlds. Stay informed and check back regularly for new blogs from Robert on keeping your identity safe!
|

Latest Posts

Fifteen years ago, cell phones were so bulky and cumbersome that they had to be carried in bags or briefcases. Then they became chunky, heavy bricks. Calls dropped every other minute. Clearly, cell phones have evolved since then. Today’s cell phone is a smartphone and it’s much more than a phone. It’s a computer—one that rivals many desktops and laptops being manufactured today. A smartphone can pretty much do everything a PC can do, including online shopping, banking, and merchant credit card processing.

As mobile Internet usage continues its rapid growth, cybercriminals are expected to pay more attention to this sector. Mobile device platforms compete for content creators’ latest innovations, which often require more and more device access. As applications and other content are more widely distributed, security breaches will be inevitable.

The speed of technological advancement and the demand for new products and services make mobile phones particularly vulnerable. In some countries, almost all banking takes place with the use of phones.

Spyware, which was created as a legitimate technology for PCs, further complicates matters. Spyware can track and record social networking activities, online searches, chats, instant messages, emails, keystrokes, websites visited, and programs launched. It can be the equivalent of digital surveillance, revealing every stroke of the user’s mouse and keyboard. When a PC or phone becomes infected with spyware, all the data on that PC or phone is immediately compromised.

As more people switch to smartphones, mobile security concerns increase. Here are a few reminders to help keep your data secure on your phone:

  • Record all of your phone’s essential data. If your phone is lost or stolen, the make/model, serial, and IMEI number will help police identify it as yours if it is recovered.

  • Use a PIN to lock your phone. Many consumers do not lock their phones with a PIN. The simple act of initiating a four to six-digit PIN can help protect all the data on a lost or stolen mobile phone.

  • Always log out of critical applications that involve any personal or financial information. And don’t have your apps set to remember your user name and password in case your phone does get lost or falls into the wrong hands.

  • Don’t leave your phone unattended in a locked vehicle or any public place.

  • Only download applications from trusted websites.  Be sure to check reviews of the apps and also review the apps privacy policy to make sure that information that it is accessing on your phone makes sense. For instance, a game app probably does not need access to your

  • Keep your phone updated with the latest operating system, either by downloading updates from within your phone’s settings or through the manufacturer’s website. OS updates often include critical security patches.

  • Install a comprehensive mobile security product that has anti-theft protection (these tools can remotely access a lost phone, pinpoint its location, and, if necessary, wipe data from the phone), antivirus protection, application protection, call and SMS filtering, and web protection.
We all probably have a lot more information on our mobile devices that we realize. So while we use it like a computer, we still tend to think of it as a phone. Now is the time to for all of us to protect our mobile phones—before it phone is lost, stolen, or hacked.
 
 
Robert Siciliano is an Online Security Evangelist to McAfee. See him discussing identity theft on YouTube. (Disclosures)
 
Posted by Robert Siciliano on Mar 30, 2012 2:54 PM CDT

Most predictions look to history as an indicator of what might come in the future.

McAfee Labs is a team of security professionals that spends their waking hours observing and combating threats to our digital identities. They are constantly looking for what may be become a possible threat and how these can be avoided.

Here’s what they say we should be watching out for in 2012:

Attacks on critical infrastructure and utilities: Terrorists and criminals from around the world have set their sights on critical, life-supporting utilities, such as water and power. These utilities are at risk of being disabled, either to be held hostage in hopes of negotiating a payoff or simply to wreak havoc.

As a citizen and a consumer, you can help protect our critical infrastructure by protecting your own PC. Preventing the computer that sits in your home office from being turned into a zombie prevents it from being used as part of a botnet—a robot network of computers—and used as a base of attack.


Political hacktivism: “Hactivists” are loosely organized hackers who work together using computers or computer networks to protest or promote political change. Many feel that the 1% is manipulating the 99%, and will stop at nothing to get their message heard. Others hack under the umbrella of hacktivism in order to obscure their more nefarious intentions.

Spam, spam, and more spam: Spam has become cheaper and easier to distribute. Shady, for-profit advertisers are making a mint selling lists of names and email addresses to spammers. (Advertisers are not legally required to receive consent before sending advertising.)

Never click on links within spam messages. Don’t bother trying to unsubscribe, and don’t waste your time reporting it as spam. Make sure your ISP’s spam filters are turned on and that your email provider has you protected. And do not to dig around in your spam folder, rooting out ruses meant to trap you. Just hit delete.


Mobile malware: PCs are still the low hanging fruit. But as more mobiles are used for mobile commerce, virus creators are working on malware designed either to take over your smartphone, to deliver ads, or even to run up your bill by sending expensive text messages.

Keep your smartphone and tablet protected by installing comprehensive mobile security, that includes anti-theft, antivirus and web and app protection.


Hacked cars, GPS, and wireless equipment: Cybercriminals have begun targeting embedded operating systems or even hardware in order to gain control of everything from cars to global positioning system trackers and medical equipment.

This opens up some scary possibilities, so if you buy a car with these features, ask your dealer how you can go about updating your new vehicle’s computer chip. Over time, your car will probably need updates, just like a PC. Meanwhile, be sure to have proper insurance and an auto theft prevention system.


Cyber war: McAfee Labs has observed an increase in high-tech spying and other “cyber” techniques used to gain intelligence. This should not incite panic, but it is something you ought to be aware of.
 
It really is up to each of us as individuals to protect what is within our scope, including our families, homes, and digital devices. Although some of the threats may seem scary, the reality is that many are simply new takes on old attacks, and with a little bit of foresight and preparedness, we can guard against them.
 
Robert Siciliano is an Online Security Evangelist to McAfee. See him discussing identity theft on YouTube. (Disclosures)
 
 
Posted by Robert Siciliano on Mar 14, 2012 2:02 PM CDT
Look Out For Tax Time Scams
While identity theft complaints have begun to decline in recent years, complaints pertaining to stolen tax returns have increased significantly—from 11,010 complaints in 2005 to 33,774 in 2009, according to an analysis of more than 1.4 million identity theft records from the U.S. Federal Trade Commission. That’s nearly 300%.

As long as death and taxes are inevitable, so too are tax scams. Online banking, investing, and trading can, in fact, be flawlessly safe when properly secured. At this point in time, it is absolutely crucial that you identify and take steps to mitigate risks to your personal data is crucial. Forewarned is forearmed; awareness of scams is essential.

Look out for phishing scams. Never respond or click on links within unsolicited emails requesting that you enter personal data or visit a website to update account information, especially from the IRS as they do not send emails out to consumer.


Look out for IRS scams. Beware of scammers posing as IRS agents. They contact targets via phone or email, and are often prepared with a few personal details, which they use to convince targets of their IRS affiliation. This data may actually have been gleaned from public records or even your trash. This type of scammer may offer you a tax refund, and will generally pressure you to comply with their request.


Look out for rogue tax preparers. Anyone can hang out a shingle and claim to be a credible accountant. That shouldn’t be enough to persuade you to disclose all your financial records.


Protect your data. This means that all sensitive documents, including anything that includes tax or investment records, credit, debit, or bank account numbers, or a Social Security number, must be secured from the moment they arrive in your mailbox. Secure means that your mailbox and file cabinet have locks, or even storing important documents in a fire-resistant safe.


Shred non-essential paperwork. Check with your accountant to determine what you need and what you don’t. Use a cross-cut shredder to destroy unneeded documents. You can shred your monthly and quarterly statements from brokerage, 401(k), IRA, Keogh, and other investment accounts as new ones arrive according to Consumer Reports.org. But keep annual statements handy until you sell the investments.


Go paperless. Whenever possible, opt to receive electronic statements in your inbox. The less paper in your life, the better.


File early. The earlier you file, the more quickly you thwart any criminal’s attempt to file on your behalf and collect your refund. Only file your tax return with the help of a local, trusted, professional accountant whom you know, like, and trust. If you file online, you should use a secure PC and a secure Internet connection. If you submit your taxes through the mail, you should bring them directly to your local post office.


Protect your PC. A computer’s operating system should always be updated with the latest critical security patches and you should use comprehensive security software that provides antivirus, anti-spyware, anti-phishing, anti-spam and a 2-way firewall.
 
Robert Siciliano is an Online Security Evangelist to McAfee. See him discussing identity theft on YouTube. (Disclosures)     
Posted by Robert Siciliano on Mar 2, 2012 2:19 PM CST
According to McAfee Labs, fake antivirus software is one of the most persistent threats on the Internet today and it represents almost one quarter of all dangerous links. Unfortunately, many users don’t know how fake antivirus software works or how to recognize it.
 
Fake antivirus, often called “scareware,” works by tricking users into thinking they are purchasing legitimate antivirus software. The scam tricks you into believing that your computer has been infected with a virus and prompts you to download “free” security software. Once the software is installed and a scan is run, the fake antivirus will tell the user their computer is infected and they need to purchase the full version of the AV software.
 
After a user agrees to the scam, the cybercriminals not only have the user’s money, they also have their credit card information. There are some ways to avoid becoming a victim:
 
  • If you see a message saying that your computer may be at risk, disconnect from the Internet and use the  security software already on your computer to run a scan.
  •  Be suspicious of security messages that are overly dramatic, or inaccurate. For instance, a message might warn that Drive X is infected, and you may not have a Drive X.
  • Only purchase security software from a trusted vendor, through their secure website or retail outlet.

Robert Siciliano is an Online Security Evangelist for McAfee. See him discuss identity theft on YouTube. (Disclosures)




Posted by Robert Siciliano on Dec 9, 2011 4:29 PM CST
Whether you like it or not, whether you’re ready or not, the Christmas machine has arrived—well before Thanksgiving—at least as far as stores and advertisers are concerned. And there’s no question that scammers, identity thieves, and criminal hackers have already begun setting traps for holiday shoppers via the “The 12 Scams of Christmas”.
 
1. Mobile Malware: McAfee cites a 76% increase in malware targeting Android devices in the second quarter of 2011 over the first, making it the most targeted smartphone platform.
 
2. Malicious Mobile Applications: These are mobile apps designed to steal information from smartphones, or to send out expensive text messages without a user’s consent.
 
3. Phony Facebook Promotions and Contests: Cyber scammers know that contests and free offers are attractive lures, and they have sprinkled Facebook with phony promotions and contests aimed at gathering personal information.
 
4. Scareware: This fake antivirus software tricks recipients into believing their computers are at risk, or have already been infected, so that they will agree to download and pay for phony software.
 
5. Holiday Screensavers: A Santa screensaver that promises to let you “fly with Santa in 3D” is malicious.
 
6. Mac Malware: Cybercriminals have designed a new wave of malware directed squarely at Mac users. According to McAfee Labs, as of late 2010, there were 5,000 pieces of malware targeting Macs.
 
7. Holiday Phishing Scams: Cyber scammers know that most people are busy around the holidays, so they tailor their emails and social messages with holiday themes in the hopes of tricking recipients into revealing personal information.
 
8. Online Coupon Scams: When consumers accept an offer for an online coupon code, they are asked to provide personal information, including credit card details, passwords, and other financial data.
 
9. Mystery Shopper Scams: Mystery shoppers are hired to shop in a particular store and report back on the customer service.
 
10. Hotel "Wrong Transaction" Malware Emails: Scammers have designed travel-related scams in order to tempt us to click on dangerous links in emails.
 
11. “It Gift” Scams: When a gift is hot, not only do sellers mark up the price, but scammers will also start advertising these gifts on rogue websites and social networks, even if they don’t actually have the popular items.
 
12. “Away From Home” Status Updates: Posting information about your vacation on a social networking website could actually be dangerous.
 
How to Protect Yourself
Internet users can protect themselves from cybercrime with the following quick tips from McAfee:
 
  • Only download mobile apps from official app stores, such as iTunes and the Android Market, and read user reviews before downloading them.
  • Be extra vigilant when reviewing and responding to emails.
  • Watch out for too-good-to-be-true offers on social networks (like free airline tickets). Never agree to reveal your personal information just to participate in a promotion.
  • Don’t accept requests on social networks from people you don’t know in real life. Wait to post pictures and comments about your vacation until you’ve already returned home.
 
Robert Siciliano is an Online Security Evangelist for McAfee. See him discuss identity theft on YouTube. (Disclosures)
Posted by Robert Siciliano on Nov 28, 2011 12:00 PM CST
Phishing: Despite consumer and employee awareness, a carefully crafted email that appears to have been sent by fellow employee or trusted entity is probably the most effective spear phish. “Whaling,” or targeting a CEO or other high level executive with a phishing email can be even more successful. Never click links in emails and always type the address in manually or use a bookmark.

P2P File Sharing: Peer-to-peer file sharing is a fantastic way to leak company and client data to the world. You should set administrative privileges to prevent the installation of P2P software.

Social Networking: Social networking websites have grown too big, too fast, and can’t keep up with security. Criminals know exactly how to take advantage of this, so create policies and procedures that outline appropriate use, and beware of social networking scams.

Malicious Websites: Websites designed to attack your computer and infect it with viruses number in the millions. Hacked websites, along with out-of-date operating systems and vulnerable browsers, put your identity at risk. Use antivirus software to protect your PC and your data.

Malicious Attachments: PDFs used to be safe, but Adobe is the same boat today that Microsoft found itself in years ago: hack central. Adobe’s software or files are used on almost every PC and across all operating systems, and criminal hackers love it. According to an estimate from McAfee, in the first quarter of this year, 28% of all exploit-carrying malware leveraged an Adobe Reader vulnerability.

Make sure you have updated antivirus software, a two-way firewall, that you run spyware removal software regularly.

McAfee Identity Protection includes proactive identity surveillance to monitor subscribers’ credit and personal information, as well as live access to fraud resolution agents. For additional tips, visit CounterIdentityTheft.com.

Robert Siciliano is a McAfee consultant and identity theft expert. See him explain how a person becomes an identity theft victim on CounterIdentityTheft.com (Disclosures)
Posted by Robert Siciliano on Apr 6, 2011 11:25 AM CDT
Approximately 155 million tax forms are filed annually. There are a number of common tax scams to watch out for.

Employment Identity Theft Scams: If you ever receive documentation in the mail indicating earned income that you are not aware of, it may mean that someone else has used your Social Security number to gain employment.

Account Takeover Scams: If, when filing your tax return, you receive a letter from the IRS saying that you have already filed, it almost certainly means that someone else has filed a fraudulent return on your behalf in order to steal your refund.

Tax Preparer Scams: In an old scam that’s still in play, tax preparers tell clients they must pay back stimulus payments, and then pocket the money. Make sure you do research and choose your tax preparer wisely.

Late Payment Scam: As people fall behind on their taxes, lists are created and are printed in the local paper as public record. Thieves can use these lists to call unassuming people and pose as collectors.

Internet Phishing Scams: The IRS doesn’t send emails. Phony IRS emails that try to lure taxpayers into giving out personal information are a common scam.

IRS Scams: If a scammer posing as an IRS agent ever contacts you, they may already have some of your personal information, which they can use to try to convince you that they are actually from the IRS.

Protect yourself by filing early. It seems crazy to think that someone would fraudulently file taxes in your name, but it’s being done.

You should also secure your mail with a locking mailbox. Instead, take it to the post office or use a big blue post office drop box.

Protect your PC. Whether or not you file online, securing your PCs is essential. Make sure you have updated antivirus software, a two-way firewall, that you run spyware removal software regularly.

McAfee Identity Protection includes proactive identity surveillance to monitor subscribers’ credit and personal information, as well as live access to fraud resolution agents. For additional tips, visit CounterIdentityTheft.com.

Robert Siciliano is a McAfee Consultantand Identity Theft Expert. See him discussing IRS related identity theft on Fox news. (Disclosures)
Posted by Robert Siciliano on Mar 10, 2011 3:39 PM CST
The major differences in credit vs. debit is in the protections (or lack of protections) that come along with the fine print. A debit card is connected directly to a person’s bank account and when compromised can devastate your bank balance. more...
Posted by Robert Siciliano on Jan 26, 2011 9:21 AM CST

I’ve lost my wallet more times than I can count. It’s embarrassing, frustrating and in some cases nauseating. But if I lost my wallet today, it’d be no big deal.

In my wallet I have a MasterCard and an American Express, and if everyone took American Express I’d only have one card. I also carry a Costco card, driver’s license, and a debit card to make deposits and get cash. That’s it.

A lost or stolen wallet can lead to instant identity theft. The more information you have in it the greater the chances are a thief will steal your identity.

#1 Thin it out as much as possible. Remove unnecessary cards and put them in a safe, or cut them up and cancel the accounts. Multiple credit cards, store cards, Social Security cards, insurance cards are unnecessary. All these ancillary cards serve no purpose other than putting you at risk for new account fraud or account takeover.

#2 You should never carry your Social Security card or Social Security number in your purse or wallet.

#3 Remove insurance cards. Insurance cards only need to be carried the day of an appointment. They are not necessary in emergency situations.

#4 Photocopy all the cards in your wallet (front and back) and keep them in a safe.

#5 When your wallet is lost or stolen, pull out the photocopies of your cards. Call the credit card issuer to report the loss and request new cards.

McAfee Identity Protection has Lost Wallet Protection. Just one phone call to McAfee Identity Protection support helps you notify and cancel your credit, debit and medical card accounts and order replacement cards.

Robert Siciliano is a McAfee Consultant and Identity Theft Expert. See him discussing how to protect yourself from identity theft on CounterIdentityTheft.com. (Disclosures)

McAfee protection is free for a year for Scottrade customers. Visit www.scottrade.com/securityfor more information about virus protection and online security. 

Posted by Robert Siciliano on Jan 14, 2011 9:01 AM CST
The Federal Trade Commission estimates that there are 500,000 new victims every year. When a total stranger gets a hold of your kids Social Security number they can do all kinds of damage. However the culprits are often parents who have direct access to the child’s Social Security number. When irresponsible parents apply for credit in their children’s names due to existing financial hardships, the soiling of their credit begins. more...
Posted by Robert Siciliano on Jan 5, 2011 9:25 AM CST
< Prev    1 2   

Most Recent Comments

Bad parents do this. I'd be suprised if the people with kids that do this are invested
There is no free lunch. If you want good stuff, you have to pay for it.
What kind of free software Malwarebytes do you use. I'd weary of some programs out there.
Shaun the Malwarebytes that I use in my tip is free. If computer companys such as MS tightened up there product before...