There are scammers out there targeting conference exhibitors and attendee. What are they looking for? Credit card numbers, money wires and personal information that they can use to steal identities. One of the ways that scammers get this information is by using invitation or list scams. Basically, if you are registered for a conference, speaking at a conference, a conference vendor or just “in the business”, you might get an email…or several emails…that invite you to a conference or offer to…Continue
Added by Robert Siciliano on May 23, 2019 at 7:15pm — No Comments
You have probably heard of one data breach after another these days, but this is one that you should really pay attention to: more than 772 million unique emails, along with more than 21 million unique passwords, have been exposed.
Troy Hunt, who runs the website “Have I Been Pwned,” first reported this breach, and he says that a huge file (87 GB) was uploaded to MEGA, a cloud service. This data was then sent to a popular hacking site, and now hackers have access to…Continue
Added by Robert Siciliano on May 16, 2019 at 4:12pm — No Comments
I put an ad on Craigslist to sell a refrigerator that I no longer need. Within a few minutes I’m happy to report Micheal responded to buy it!
SCAMMER: Hi am Micheal I like to ask if this item is till available for sale and what the present condition it.
ME: Still for sale, someone is interested tho, its like new, 5 months.
SCAMMER: Thanks for the information…Continue
Added by Robert Siciliano on May 14, 2019 at 6:47pm — No Comments
When you think of a cybercriminal, you probably picture someone in a black hoodie in a dark room on the dark web, but most cybercriminals are out there in plain sight, including on Facebook.
Talos, a cybersecurity firm, found that people can easily join Facebook groups, and then participate in cybercrime including buying and selling credit card info, obtaining spamming tools, or even getting account logins and passwords. All in all, these groups have almost 400,000…Continue
Added by Robert Siciliano on May 3, 2019 at 5:26pm — No Comments
We all get scam phone calls, but the newest one is meant to scare. When you pick up the phone, you get a message that your Social Security number is suspended due to suspicious activity, and then prompts the victim to speak with an agent to get help.
The FTC makes something very clear: your Social Security number cannot be suspended for any reason, so any call that states your SSN is under suspension is a scam. What they are really trying to do is to trick you into…Continue
Added by Robert Siciliano on May 1, 2019 at 5:07pm — No Comments
An unsurprising study was recently released that found even when a portable USB drive is erased, not all of the documents and images are always removed. That, of course, is frightening.
Here’s how the research was done:
Researchers went online to sites like eBay, to second-hand shops, and even auction stores. They bought 200 used USB drives, half from the US and half from the UK. Almost 2/3 of the devices had data on them! This data was, for the most part,…Continue
Added by Robert Siciliano on April 25, 2019 at 9:29pm — No Comments
Evaldas Rimasauskas, a Lithuanian man, became very rich. How? He is a criminal who used his lying skills to get more than $100 million from companies such as Facebook and Google between 2013 and 2015.
He’s now in jail, but during his trial, Rimasauskas admitted that he was guilty of several crimes including money laundering, wire fraud and identity theft. According to court records, Rimasauskas created a Latvian company called Quanta Computer Incorporated, which was the same name as a…Continue
Added by Robert Siciliano on March 29, 2019 at 1:30pm — No Comments
Any industry involving wiring transfers of large sums of money is vulnerable to this new type of hack. Purchasing a car, home or piece of art are large transactions and are not usually done in cash. In well-established industries like real estate, there are some checks and balances, but while one would think it would be very tough to pull off this scam in real estate, it is just as easy. I do not know how many billionaire art collectors follow my blog (they should!), but most of you are…Continue
Added by Robert Siciliano on March 16, 2019 at 4:48pm — No Comments
Have you ever wondered if you could access your old email accounts? You might want to look for some old files, or maybe need information about an old contact. Whatever the reason, there is good and bad news when it comes to accessing old email accounts.
The best thing that you can do is to use the provider to find the old email account or old messages. All of the major providers, including Outlook, Gmail, Yahoo, and AOL, have recovery tools available. If the email…Continue
Added by Robert Siciliano on February 21, 2019 at 8:18pm — No Comments
Do you fancy yourself a spy and wondering how you can monitor someone else’s cell phone? You won’t get that information here, but there is some good info on cell phone monitoring if you keep reading:
The Legalities of Tracking Cell Phones
Generally, it is not legal to monitor a cell phone that does not belong to you. However, generally speaking, and THIS IS NOT LEGAL ADVICE, if the account is under your name or if you have written permission…Continue
Added by Robert Siciliano on February 15, 2019 at 5:00pm — No Comments
Are you getting a lot of scammy, spammy telemarketing calls? If you are, you know how annoying they can here. Fortunately, there are some apps out there that can help. Here are a few worth looking into:
You can use CallApp to lookup numbers, and then decide if you want to answer it or not. It collects data from users, and then gives you this information when a call comes in. You can get CallApp Crawler for Android…Continue
Added by Robert Siciliano on January 24, 2019 at 6:13pm — No Comments
There are a lot of scammers out there, and one of the things they do is create fake websites to try to trick you into giving them personal information. Here are some ways that you can determine if a website is fake or not:
How Did I Get Here?
Ask yourself how you got to the site. Did you click a link in an email? Email is the most effective ways scammers direct their victims to fake sites. Same thing goes with links from social media sites,…Continue
Added by Robert Siciliano on January 22, 2019 at 5:32pm — No Comments
If you have a teenager, you probably have a battle in play: do you or do you not manage your teens mobile devices. Though some parents see this as an invasion of their child’s privacy,(which, frankly, is stupid) there are many reasons why you should start managing what they are doing online.
Some of these reasons make a lot of sense. Mainly, what your kid does at age 17 and under, is your responsibility, or in essence, your fault if they screw up. If they send a nude…Continue
Added by Robert Siciliano on January 17, 2019 at 4:12pm — No Comments
If you have a contactless card, you might have worries about skimming. A contactless card or “frictionless” or “tap and go” is a card that has technology in it that allows payment over secure wireless like Apple Pay, Android Pay etc. Basically, this is where a criminal literally digitally pickpockets you by scanning things like your debit card or passport. What’s scary about this is that anyone can get an app for their phone that will allow them to skim. Is there protection for this?…Continue
Added by Robert Siciliano on January 9, 2019 at 4:42pm — No Comments
USPSID stands for U.S. Postal Service Informed Delivery. It is a good thing to sign up for because it informs you of your expected deliveries.
But there’s a problem: Someone ELSE could pose as you and sign up for this service, getting your mail before you have a chance to.
In fact, it has already happened. Crooks have signed up as other address owners and collected their mail.
This can lead to credit card fraud if some of that mail includes new credit…Continue
Added by Robert Siciliano on December 20, 2018 at 4:47pm — No Comments
Humans have evolved a new body part: the cell phone. One day it will be part of anatomical illustrations of the body in health and medical books probably an appendage on your head. I’m not a Dr. so don’t quote me.
For now, we have to figure out a way to keep this appendage juiced up without being lured into a data-sucking battery-charge station.
There’s even a name for this kind of crime: juice jacking. The kiosk is designed to appear like a legitimate battery…Continue
Added by Robert Siciliano on December 6, 2018 at 3:38pm — No Comments
So maybe Christmas now means the very predictable gift card swap, but hey, who can’t use a gift card? But beware, there are a ton of scams. This includes physical, not just digital, gift cards.
Regardless of who gave you the card, you should always practice security measures. Below are two common ways that fraudsters operate.
Transform Gift Card to Cash Twice.
If someone gives you a $200 gift card to an electronics store and…Continue
Added by Robert Siciliano on December 6, 2018 at 3:37pm — No Comments
Social Security numbers and credit card numbers are not the only types of data that hackers are after. Now, they are looking at frequent flyer accounts, and they are stealing reward miles, and then selling them online.
How do Hackers Steal Frequent Flyer Miles?
As with other types of ID theft, hackers use info that they have illegally obtained to access frequent flyer accounts. With more data breaches happening than ever…Continue
Added by Robert Siciliano on November 29, 2018 at 2:00pm — No Comments
Investigators in Sacramento have arrested Joseph James DeAngelo for rape, but they only found him based on records from a genealogical website.
The effort wasn’t easy, but this guy is now off the streets. The process started with taking a look at DNA that was collected from the crime scene, which happened many years ago. Investigators didn’t have a match. However, recently, they started comparing DNA with genetic profiles that have been collected from ancestry sties.…Continue
Added by Robert Siciliano on November 25, 2018 at 12:53pm — No Comments
You probably have a few usernames, or you might have just one that you use for every site. Either way, your user names can be used not just to identify you online, but it can also be used to track you and find out information about you. How do people track you based on your user name? They do the following:
They Start with a Google Search
The first thing people do to track your username is do a Google search. You will be amazed by all of the…Continue
Added by Robert Siciliano on November 20, 2018 at 5:18pm — No Comments