Identity Theft Expert Speaker

Follow me
By
Services for Real Estate Pros - IDTheftSecurity.com Inc
RECENT BLOG POSTS
Information is Power as they say. Information refers to data that has been processed, organized, or structured in a way that makes it meaningful and useful. It can be understood as knowledge communicated or received concerning a particular fact or circumstance. “Fact” being the operative word. In...
11/07/2024
Real-estate fraud experts warn that AI advancements and the abundance of publicly available information has made scammers more daring in their attempts at deed or title theft. These fraudsters are targeting a wide range of property owners from residents of big mansions to individuals with simpler...
10/29/2024
I received a sextortion email, to my actual inbox, not in spam, addressed specifically to me, with my name, my address, my phone number, and the worst part, a picture of my home.Here’s how it began:Subject line: Robert Siciliano“Robert Siciliano,I know that calling 617329XXXX or visiting (my actu...
10/10/2024
Are you doom scrolling? Do you find yourself obsessively checking your feeds? Does the election have you pinned to an anxiety rating of 10? Are you logging into your social media accounts and wanting to go to battle with every idiot who posts a dumb meme counter to your beliefs? Are you only read...
09/19/2024
Over the years criminals occasionally contact me to tell me about their exploits and often ask how they can get into the “security awareness” business. Everyone wants to be a Frank Abagnale (Catch Me If You Can movie). These crimes are often sociopaths and incapable of functioning normally withou...
08/21/2024
Maybe company executives who don’t engage in real world security awareness training should suffer the consequences for their insufficiency.An excellent Help Net Security article is titled “What CISOs need to keep CEOs (and themselves) out of jail” discusses many of the fundamentals of cyber secur...
08/01/2024
The primary intention behind artificial intelligence (AI) generated spam on social media appears to be financial gain through deceptive means. Facebook algorithms are suggesting users to visit, view and like pages that are 100% artificially intelligent generated photos of people, places, and thin...
05/31/2024
K.I.S.S.I.N.G. First came love, then came marriage, then came the baby in the baby carriage! Sucking his thumb, wetting his pants, doing the hula - hula dance! And the BABY is a Boy!The Yahoo Boys. The Yahoo Boys are a notorious group of cyber criminals operating out of West Africa, primarily Nig...
05/14/2024
It’s everyone. (It’s you too. Just read.) Security goes against our core beliefs. Security is not natural, it’s not normal, it means that we don’t trust others. However, we trust by default. Not trusting others is actually a learned behavior. Security means that you are aware that there are other...
05/03/2024
The proliferation of AI technologies like voice cloning and caller ID spoofing has opened up new avenues for fraudsters to exploit. By mimicking voices and masking their true caller identities, scammers can launch highly convincing social engineering attacks over the phone. This potent combinatio...
04/26/2024
Rainmaker
1,096,935

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
local_phone(617) 329-1182
Contact The Author