Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc

ARCHIVED BLOG POSTS

2016 

Ever peruse Craigslist for a new home? Nothing against Craigslist for doing that, but that’s where Coty Houston and David Yost happened to find a very alluring four-bed home for sale; looked perfect for their five young kids.Then they all got squashed by a bomb: The man who sold it to them was no...
08/29/2016
IRS The e-mail (or phone call) says you owe money; if you don’t pay it immediately, you’ll be put in jail or fined.The scammer may know the last four digits of the victim’s Social Security number. Caller ID will be spoofed to look like the call is from the IRS. The e-mail will include an IRS logo...
08/24/2016
The days of using a computer to access your bank account, using a password, may be coming to an end, to be replaced entirely (as some experts believe) with a fingerprint or face scan using a smartphone.The smartphone employment of such biometrics will drastically reduce hacking incidents, but wil...
08/23/2016
Malevolent advertising is called malvertising. The “ad” is placed on a website by cybercriminals who want control of your computer for financial gain.And the real scary thing about malvertising is that these trick-ads have appeared on trusted, popular websites like the Weather Network, BBC, NFL a...
08/19/2016
You’d think with all the media attention regarding data breaches, hackers and identity theft, that consumers would be more focused on their privacy and how to protect their information from prying eyes. Surprisingly, almost 70% of the people are clueless about how a criminal might have got a hold...
08/17/2016
If you have an iOS device, you may be leaking personal information about yourself—without even knowing it—because you’re not familiar with the privacy settings.Apps have “permissions,” meaning, they can access private information such as your social calendar stored on the phone, appointments, any...
08/16/2016
How many times have you read, or at least caught a headline, of the latest high profile missing child case? How many stories have we heard about the kid who got lost on a hike? His body was found several miles from where he’d been last seen, concluding a several-day search.What if he had had an i...
08/10/2016
Criminals often rely on tricking their victims to gain access to their passwords and other account information. This act of tricking is called social engineering, also known as a confidence crime, and it comes in many forms. A type of phishing e-mail where the criminal targets someone specific is...
08/09/2016
If your computer password contains the name of your dog, your favorite vacation spot, and an easy-to-remember numerical sequence, then you are breaking some basic rules of password safety. Even though “BusterBermuda789” might seem impenetrable to you, this is a password security experts say is vu...
08/04/2016
Just like older generations never thought that the dial phone in the kitchen could be dangerous (think phone scams), today’s kids don’t have a clue how hazardous smartphone apps can really be. They are a godsend to pedophiles, scammers and hackers. And let’s not forget other kids who just want to...
08/04/2016