Posts Tagged Facebook

Please Rob Me, I just left my house…

Posted by Rob on Thursday, 18 February, 2010

I have most of the major social networking pages somewhere, not that I still use all of them. I have still, or have in the past used MySpace, Facebook, LinkedIn, Twitter, Google Buzz, Digg, Technorati and probably a bunch more if I felt like checking all of my internet book marks.

To tell you the truth, it takes up way too much time trying to “stay connected”. But there are even apps that tie 2 or more of these sites together, which I suppose makes keeping up with friends, followers, and stalkers much easier. That way you can tweet a message and it automatically posts to your Facebook. Or you can status your Facebook and it will tweet it too. Hopefully you don’t have it set up to FB to Twitter that tweets back to FB which goes back to Twitter in an endless loop of insignificant social babble…

One of the latest Facebook/Twitter fads is called geolocation. Which is when you can download an app to your smart phone that grabs your precise physical location and tweet or status that spot to all of your friends. I have a Facebook buddy that does this all the time. He is always letting us know what restaurant he is waiting in line at, or other event he is hobnobbing around.

A while back, when he first started doing that, I thought, “Hrrm, “Ted” isn’t at home and he just told the world… and if you wait an hour or two, he’ll probably let you know when he is heading back.” Sure enough he did. Perfect time to rob his house, if you were into that sort of thing.

Usually your Facebook account is only full of your nearest and dearest friends, not 100s of casual acquaintances, and people you hardly know but sent to a friend request, right? …RIGHT?

What about those college kids that friend everyone on campus? Probably not the best course of action. You know how those mature co-eds act.

How likely would it be for some loser college “friend” to ransack your dorm room when they just saw your tweet that you and your roommate just took off for the long weekend?

Worse yet, leave it to some techno-nerd to one up the whole geolocation snooping. There is actually a website called Please Rob Me dot com. This site will filter out all the “I’m taking a shower” and motivational quote spam on Twitter and just get down to the nitty gritty. It takes all the real-time geolocationing info and displays them in a one-stop-shop list. Here is a snippet of the results from last night:

Listing all those empty homes out there

Recent Empty Homes

@HolzJS left home and checked in about a minute ago: I’m at Celebration Town Tavern (721 Front Street, Sycamore Street, Celebration). http://4sq.com/8BCs0A

@amisij left home and checked in about a minute ago: I’m at Kirkhof Center (GVSU, Allendale) w/ 2 others. http://4sq.com/6Xvr8B

@jacobkampen left home and checked in about a minute ago: Woot! #fb (@ Ronald Reagan Washington National Airport (DCA) w/ 2 others) http://4sq.com/31ZCjK

@argonman left home and checked in about a minute ago: I’m at Edwards movie theater. http://4sq.com/bHeIQr

And of course there is a search box if you have a specific target in mind, perfect for selecting a burglary target, or narrowing down your night’s stalking route.

From their home page, you can click on the WHY link and get their reasoning for creating this site, which states their goal is to raise some awareness on the potentially dangerous issue of willy nilly geolocation spamming and have people think twice about how they use those services like Foursquare, Brightkite, Google Buzz etc.

The danger is when you get in the habit of publicly telling strangers where you are, and consequently where you are not… which is at home. “So here we are; on one end we’re leaving lights on when we’re going on a holiday, and on the other we’re telling everybody on the internet we’re not home.”

They also state their “intention is not, and never has been, to have people burglarized.” But it should make you wonder. Who is keeping tabs on you, especially when you are so freely giving out boatloads of personal information, intentionally or unintentionally.

Take a piece here, take a tweet there, read a couple social profiles, and then use Google. You’d be surprised how much info you can find on someone. I hope you have some sort of home security or a dog (real or fake) keeping an eye on things at the homstead.

I’m just waiting on the following:

@geotweeter is at the new restaurant, long wait to be seated, I may be here awhile.

@geoburglar is at @geotweeter’s house. Wonder if he’ll get back in time before I clean it out…

Be Safe, Be Prepared. Keep your geo tweets to yourself.

Related Posts:
Infidelity and Facebook Cheating
Burglar Smacked Silly with a Shovel
Another burglar drops his cell phone
Home Ransacked After Fake Craigslist Ad

Popularity: 2% [?]

https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/digg_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/reddit_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/dzone_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/stumbleupon_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/delicious_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/blinklist_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/blogmarks_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/furl_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/technorati_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/google_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/myspace_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/facebook_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/yahoobuzz_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/mixx_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/twitter_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/jamespot_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/meneame_32.png

Thanks for returning so frequently, I hope you are enjoying our blog. Please feel free to leave us your comments or suggestions!

Recent Laptop Snatching Attempts in Florida

Posted by Rob on Tuesday, 24 February, 2009

We have two attempted laptop snatchings recently, one in Bradenton and one in Stuart, Florida.

The first one took place inside a Starbucks. Apparently, a social networking 19-year-old just had to check out what was going on Facebook this past Saturday.

He walked up to a customer using a laptop and asked if he could check his Facebook profile real quick. When the customer refused, the guy started to walk away, then made a grab and snatched the laptop and ran out of the coffee shop.

Two other customers in the parking lot tackled the thief and held him there until mall security arrived.

The victim got his laptop back and the guy was charged with felony robbery by sudden snatching.

Next, we have a 75-year-old man standing outside of a Best Buy in Stuart. He just bought a new laptop and printer, and was waiting for his wife to pull up to the door to load the car with his new tech gear.

A 29-year-old guy, thinking he saw an easy target, attempted to snatch and run with the Best Buy bags. Sadly for the 29-year-old thief, he didn’t even make it 10 feet when the old man caught up with the much younger assailant and grabbed him before he could get any farther.

An off-duty police officer was nearby and assisted the victim.

This guy was charged with robbery by sudden snatching and battery on a person over the age of 65.

Tips for Preventing Computer Laptop Theft

Why Do Thieves Target Laptops?

Computer Laptop are a target of choice all over the country.

Why? Because laptops are small, can be removed quickly, are easily hidden, and are quite valuable. There is a good market for them as a good laptop could be worth up to $5,000 or more.

Stolen laptops can easily be sold to an unsuspecting used computer store or pawnshop, and thieves may receive up to half its value in cash, just for the hardware.

The Real Cost of a Stolen Laptop

The actual cost of a stolen laptop is more than just its replacement cost, which can be hefty. Peripherals such as modems and network cards, all of the installed software, additional cost of configuring and reloading replacement software, and all the lost time for the owner while the laptop is being replaced is often overlooked.

An even greater cost is involved if your employer issued you the laptop. The potential exposure and liability that results from compromised confidential corporate and client information can be enormous.

How Can You Reduce the Risk of Laptop Theft?

* Never leave a laptop in an unlocked vehicle, even if it is in your driveway or garage. Do not leave laptops in plain sight, even if you vehicle is locked. You are just inviting trouble. If you must leave the laptop in a vehicle, lock it in the trunk. If you don’t have a trunk, at least cover it up and lock the doors.

* Parking garages are likely areas for vehicle burglaries, as they provide many prime targets and cover for thieves. Again, never leave a laptop in plain sight in your vehicle, cover it up or lock it in the trunk.

* Besides, try to avoid leaving your laptop in a vehicle anyways because of the damage extreme temperatures can cause to computers.

* Carry laptops in a nondescript carrying case, briefcase, or other bags. Using cases designed for laptop computers are dead giveaways to thieves that you have a laptop.

* Going to lunch, or taking a break? Don’t leave your laptop in meeting or conference rooms. Take it with you, or it may not be there when you return.

* Always lock the laptop up in your office during off-hours.

* Don’t have your own office? Use a specially designed cable lock and wrap it around your desk or chair leg. Alternately, you can lock the laptop in a closet or cabinet.

* Don’t let unaccompanied visitors wander around in your workplace. Offer assistance and accompany the visitors to their destinations. Make sure it is office policy.

* Apply distinctive paint markings or etch your name or other distinguishable marks on the bottom of the laptop to make it unique and easily identifiable. Record the serial numbers, make and model of your system.

* Consider purchasing a theft alarm systems specially made for laptops, either hardware or software.

* Be aware that if your computer is stolen, any automatic log-ins you have stored on the system can easily allow the thief to send inappropriate messages with your accounts or gain unauthorized accesses.

* Back up your important information on CDs or DVDs today, and safely store the disks at home or the office.

Tips For Flying With Your Laptop

Flying to a conference? Never check laptops as luggage at the airport because they can disappear or otherwise be damaged in transit.

The FAA has issued warnings about an increasingly common scam of stealing laptop computers from the conveyor belts of metal detectors.

At the X-ray scanner two thieves get in the line. The first one walks through the scanner quickly. The second person delays the rest of the line by emptying pockets full of change, keys, or other cumbersome items.

Meanwhile, the travelers stuck behind the slow thief may have already placed their belongings, including laptops, on the conveyor belt. The first thief can pick up a laptop case as if it were his own and walks away while the other accomplice continues to hold up the line.

Only put your laptop on the conveyor belt when you are the very next person to go through the metal detector. Keep your eye on your laptop the whole time as it comes off the conveyor belt. Alert the security personnel immediately if you think someone is attempting to steal your computer.

If a theft does occur:

Report it to the police department as soon as possible.

Users should have the make, model, and serial number available so authorities can file a complete report and enter the stolen laptop information to the National Crime Information Computer.

If you have backed up your data, all will not be lost. If you have sensitive and confidential information on your laptop, you should consider using encryption software to protect the data.

Be Safe, Be Prepared, Stay Aware.

Popularity: 9% [?]

https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/digg_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/reddit_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/dzone_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/stumbleupon_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/delicious_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/blinklist_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/blogmarks_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/furl_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/technorati_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/google_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/myspace_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/facebook_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/yahoobuzz_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/mixx_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/twitter_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/jamespot_32.png https://worthprotectionsecurity.com/blog/wp-content/plugins/sociofluid/images/meneame_32.png

Technorati Fave

Twitter