<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xml:base="http://blog.intelius.com"  xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
 <title>Intelius - Robert Siciliano</title>
 <link>http://blog.intelius.com/taxonomy/term/22/0</link>
 <description></description>
 <language>en</language>
<item>
 <title>How to Hack-Proof Your Smartphone </title>
 <link>http://blog.intelius.com/how-hack-proof-your-smartphone</link>
 <description>&lt;p&gt;&lt;img src=&quot;/corp/files/corp/blog/smartphone-resized-600.JPG&quot; width=&quot;351&quot; height=&quot;234&quot; style=&quot;float: right; border: 0pt none; margin: 10px;&quot; /&gt;Mobile phone usage is growing rapidly and, according to Security Expert &lt;a href=&quot;http://realtysecurity.com/blog/2010/05/13/mobile-phone-becoming-bigger-target-for-hackers/&quot; target=&quot;_new&quot;&gt;Robert Siciliano&lt;/a&gt;, cyber criminals are expected to pay more attention to the mobile sector as this trend continues to grow. From bulky bricks, to today&#039;s mini-computers, the cell phone has certainly evolved. &lt;/p&gt;&lt;p&gt;As Smartphones features continue to replace activities once reserved for our work or personal  our computers, the data contained on our Smartphones becomes more valuable. The consequences of a cyber criminal accessing this information can be devastating. Though it was just last November that the &lt;a href=&quot;http://www.ihackintosh.com/2009/11/iphoneprivacy-a-first-malicious-iphone-malware-detected/&quot; target=&quot;_new&quot;&gt;first malicious malware&lt;/a&gt; hit the iPhone such viruses have now become mainstream as evidenced by anti-virus vendors like &lt;a href=&quot;http://us.mcafee.com/root/product.asp?productid=mobile_info&quot; target=&quot;_new&quot;&gt;McAfee&lt;/a&gt; introducing an anti-malware solution for Smartphones. If you&#039;ve ever accessed an online profile via a phone&#039;s internet connection then you have risked giving third parties access to your personal information. Imagine: Your identity could be stolen, you could be locked out of all of your accounts, account or financial data accessed, confidential business emails could be leaked, or your phone could even be used to spy on you.  &lt;/p&gt;&lt;p&gt;In a &lt;a href=&quot;http://cellphones.org/blog/security/&quot; target=&quot;_new&quot;&gt;recent study&lt;/a&gt; compilation by cellphones.org, sources indicated that 55% of Smartphone users believe that the individual is responsible for the security of their own phone. The fact is, no matter whose responsibility Smartphone security is, it is up to the individual to protect themselves. Bellow you will find tips on how to prevent cyber criminals from accessing your BlackBerry or iPhone. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;BlackBerry:&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;The Blackberry is easily the most popular Smartphone on the market and, according to &lt;a href=&quot;http://cellphones.org/blog/security/&quot; target=&quot;_new&quot;&gt;cellphones.org&lt;/a&gt;, the most ‘natively&#039; secure. Just by having a Blackberry, you are one step ahead but that doesn&#039;t mean you don&#039;t still have to enable your security settings. &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Enable your password.&lt;/strong&gt; Under General Settings set your password to ‘on&#039; and select a secure password. You may also want to limit the number of password attempts. Test to make sure that your password works by locking your phone to confirm. &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Encrypt your data.&lt;/strong&gt; Under Content Protection settings, enable encryption. Then, under ‘Strength&#039; select either ‘stronger&#039; or ‘strongest&#039;. Though ‘strongest&#039; is the most secure, ‘stronger&#039; has faster encryption/decryption. Under the Content Protection settings you will also have the option to encrypt your address book. &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;When visiting password protected internet sites do not save your passwords to the browser.&lt;/strong&gt; Anyone who finds your phone and manages to unlock it will then have access to all of your account data and your identity will be stolen. It may be annoying to have to enter your password every time but the extra 30 seconds is certainly worth avoiding identity theft.  &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;u&gt;&lt;strong&gt;iPhone:&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;&lt;p&gt;The iPhone, which has captured over &lt;a href=&quot;http://www.tipb.com/2010/02/09/apples-iphone-market-share-growing-iphone-3gs-2-bestseller/&quot; target=&quot;_new&quot;&gt;25%&lt;/a&gt; of the Smartphone market, the second highest share in the industry, has notoriously poor encryption capabilities. As such, enabling the included security features and adding apps that allow you to secure your information is key to being a ‘safe&#039; iPhone owner. &lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Enable the Pass code Lock and Auto-Lock.&lt;/strong&gt; Go into your phones General Settings and set the 4-digit phone pass code to something that you will remember but is not ‘significant&#039; to you. That means no birth dates, no anniversary dates, no children&#039;s ages. Then, go back into General Settings and set the Auto-Lock. Although you can choose from 1 min to 5min, the quicker your phone locks the safer it is from those who might be tempted to tamper with it while you aren&#039;t looking. &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Turn your Bluetooth off unless you are using it.&lt;/strong&gt; &lt;a href=&quot;http://www.pcmag.com/article2/0,2817,2339121,00.asp&quot; target=&quot;_new&quot;&gt;Bluetooth&lt;/a&gt; allows you to easily connect to a hands-free head set or to send files from your phone to a computer. However, this also works the other way. A tech savvy hacker with a laptop can easily hack your phone from the Bluetooth connection if it&#039;s on.  &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Download &lt;a href=&quot;http://www.pure-mac.com/iphone/security.html&quot; target=&quot;_new&quot;&gt;Simple Vault 1.2.&lt;/a&gt;&lt;/strong&gt; Simple vault adds a second layer of protection to your iPhone by allowing you to password protect each of your apps. It also allows you to store your sensitive information right on your phone, unlike other security apps which send it to you over the internet when you access it&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;u&gt;&lt;strong&gt;General:&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Whenever possible, wait till you get to your computer on a secured network before accessing sensitive information.&lt;/strong&gt;  When responding to important work emails or checking your bank account balance it really is best to wait until you can access this information from a secure network. Anti-virus and anti-malware software as well encryption capabilities for computers are miles ahead than what is currently available for phones. So ask yourself before you enter your credit card number to that online store: Is it worth identity theft for me to do this now or can it wait till I get back to the office/home?&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Consider investing in an &lt;a href=&quot;http://www.intelius.com/idprotect.html&quot; target=&quot;_new&quot;&gt;Identity Protection service&lt;/a&gt;.&lt;/strong&gt; This way, even if your Smartphone is compromised you won&#039;t be risking your identity.  &lt;/li&gt;&lt;/ul&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/how-hack-proof-your-smartphone#comments&quot;&gt;1 comment&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/how-hack-proof-your-smartphone#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&amp;amp;title=How+to+Hack-Proof+Your+Smartphone+&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&amp;amp;title=How+to+Hack-Proof+Your+Smartphone+&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&amp;amp;title=How+to+Hack-Proof+Your+Smartphone+&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&amp;amp;T=How+to+Hack-Proof+Your+Smartphone+&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&amp;amp;title=How+to+Hack-Proof+Your+Smartphone+&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&amp;amp;title=How+to+Hack-Proof+Your+Smartphone+&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&amp;amp;t=How+to+Hack-Proof+Your+Smartphone+&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&amp;amp;t=How+to+Hack-Proof+Your+Smartphone+&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&amp;amp;title=How+to+Hack-Proof+Your+Smartphone+&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&amp;amp;t=How+to+Hack-Proof+Your+Smartphone+&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Fhow-hack-proof-your-smartphone&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/how-hack-proof-your-smartphone&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/how-hack-proof-your-smartphone#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/cellphones">Cellphones</category>
 <category domain="http://blog.intelius.com/category/tags/cyber-crimes">Cyber Crimes</category>
 <category domain="http://blog.intelius.com/category/tags/identity-theft">identity theft</category>
 <category domain="http://blog.intelius.com/category/tags/intelius">Intelius</category>
 <category domain="http://blog.intelius.com/category/tags/iphone-apps">iPhone Apps</category>
 <category domain="http://blog.intelius.com/category/tags/mobile-phones">Mobile phones</category>
 <category domain="http://blog.intelius.com/category/tags/robert-siciliano">Robert Siciliano</category>
 <category domain="http://blog.intelius.com/category/tags/smartphones">Smartphones</category>
 <pubDate>Wed, 19 May 2010 17:16:00 +0000</pubDate>
 <dc:creator>drupal_admin</dc:creator>
 <guid isPermaLink="false">205 at http://blog.intelius.com</guid>
</item>
<item>
 <title>Robert Siciliano: Why Debit Cards can become a Nightmare </title>
 <link>http://blog.intelius.com/robert-siciliano-why-debit-cards-can-become-nightmare</link>
 <description>&lt;h4&gt;Robert Siciliano, a leading Identity Theft and Security expert, discusses in a recent post some of the major risks associated with the use of debit cards, liability regulations of debit versus credit, and how consumers can protect their finances. &lt;/h4&gt;&lt;address&gt;&lt;span class=&quot;block&quot;&gt;“Not all plastic cards are created equal. The major differences in &lt;/span&gt;&lt;img src=&quot;/corp/files/corp/blog/Credit%20card%20image%20250px.png&quot; mce_src=&quot;/corp/files/corp/blog/Credit card image 250px.png&quot; alt=&quot;Intelius and Robert Sciliano on Debit Cards and ID Security&quot; title=&quot;&quot; style=&quot;&quot; vspace=&quot;&quot; align=&quot;right&quot; border=&quot;0&quot; hspace=&quot;&quot;&gt;&lt;span class=&quot;block&quot;&gt;credit vs. debit is in the protections (or lack of protections) that come along with the fine print.A debit card is connected directly to a person’s bank account and when compromised can devastate your bank balance.”&lt;/span&gt;&lt;/address&gt;&lt;p&gt; Debit card regulation sets consumer liability for fraudulent purchases at $50 if they notify their bank within two days, whereas credit card users’ are allowed a sixty day reporting window. &lt;/p&gt;&lt;p&gt;If fraudulent debit purchases are not reported in two days, federal regulation allows the maximum liability to increase to $500. &lt;/p&gt;&lt;p&gt;Banks tend to be more skeptical and less flexible towards debit card fraud victims. In order to commit debit fraud, thieves need your card number and your PIN.  If your PIN is compromised many banks will not assume responsibility for your loss. &lt;/p&gt;&lt;h4&gt;  So what should you do? &lt;/h4&gt;&lt;ul&gt;&lt;li&gt;Avoid using debit cards, use credit instead &lt;br&gt;&lt;/li&gt;&lt;li&gt;Carefully review your statements each month and refute any unauthorized charges as soon as you discover them&lt;/li&gt;&lt;li&gt;If you plan on traveling, contact your credit card company ahead of time so they won’t put a hold on your card when out of state charges begin to appear&lt;/li&gt;&lt;li&gt;Learn about card skimming and how to protect yourself &lt;br&gt;&lt;/li&gt;&lt;li&gt;If you need cash stick to bank ATM’s and avoid the privately owned machines you may commonly find in convenience stores, restaurants or bars.  Not only are these generic machines more susceptible to tampering, but they also store your account information which may be accessed by others.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;For more information read Robert Siciliano’s complete post &lt;a href=&quot;http://realtysecurity.com/blog/2010/03/26/why-debit-cards-are-a-nightmare/&quot; rel=&quot;nofollow&quot; mce_href=&quot;http://realtysecurity.com/blog/2010/03/26/why-debit-cards-are-a-nightmare/&quot;&gt;Why Debit Cards can become a Nightmare&lt;/a&gt; on his blog  &lt;/p&gt;&lt;h4&gt;What steps do you take to protect your finances? &lt;/h4&gt;&lt;p&gt; Tell us on Twitter &lt;a href=&quot;http://www.twitter.com/InteliusGal&quot; rel=&quot;nofollow&quot; mce_href=&quot;http://www.twitter.com/InteliusGal&quot;&gt;@InteliusGal &lt;/a&gt;&lt;a href=&quot;http://www.twitter.com/InteliusGal&quot; rel=&quot;nofollow&quot; mce_href=&quot;http://www.twitter.com/InteliusGal&quot;&gt;&lt;img src=&quot;/corp/files/corp/blog/icon_twitter.png&quot; mce_src=&quot;/corp/files/corp/blog/icon_twitter.png&quot; alt=&quot;InteliusGal on Twitter&quot; title=&quot;&quot; style=&quot;&quot; vspace=&quot;&quot; align=&quot;none&quot; border=&quot;0&quot; hspace=&quot;&quot;&gt;&lt;/a&gt; or leave your comment below.&lt;a href=&quot;http://www.twitter.com/InteliusGal&quot; rel=&quot;nofollow&quot; mce_href=&quot;http://www.twitter.com/InteliusGal&quot;&gt; &lt;/a&gt;&lt;/p&gt;&lt;br&gt;&lt;div class=&quot;comment-link&quot;&gt;&lt;a href=&quot;/robert-siciliano-why-debit-cards-can-become-nightmare#comments&quot;&gt;0 comments&lt;/a&gt; &amp;ndash; &lt;a href=&quot;/robert-siciliano-why-debit-cards-can-become-nightmare#comments&quot;&gt;Read/add comments&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;service-links&quot;&gt;&lt;div class=&quot;service-label&quot;&gt;Bookmark/Search this post with: &lt;/div&gt;&lt;ul class=&quot;links&quot;&gt;&lt;li class=&quot;service_links_delicious first&quot;&gt;&lt;a href=&quot;http://del.icio.us/post?url=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&amp;amp;title=Robert+Siciliano%3A+Why+Debit+Cards+can+become+a+Nightmare+&quot; title=&quot;Bookmark this post on del.icio.us.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/delicious.png&quot; alt=&quot;Delicious&quot; /&gt; Delicious&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_digg&quot;&gt;&lt;a href=&quot;http://digg.com/submit?phase=2&amp;amp;url=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&amp;amp;title=Robert+Siciliano%3A+Why+Debit+Cards+can+become+a+Nightmare+&quot; title=&quot;Digg this post on digg.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/digg.png&quot; alt=&quot;Digg&quot; /&gt; Digg&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_stumbleupon&quot;&gt;&lt;a href=&quot;http://www.stumbleupon.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&amp;amp;title=Robert+Siciliano%3A+Why+Debit+Cards+can+become+a+Nightmare+&quot; title=&quot;Thumb this up at StumbleUpon.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/stumbleit.png&quot; alt=&quot;StumbleUpon&quot; /&gt; StumbleUpon&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_propeller&quot;&gt;&lt;a href=&quot;http://www.propeller.com/submit/?U=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&amp;amp;T=Robert+Siciliano%3A+Why+Debit+Cards+can+become+a+Nightmare+&quot; title=&quot;Submit to Propeller.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/propeller.png&quot; alt=&quot;Propeller&quot; /&gt; Propeller&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_reddit&quot;&gt;&lt;a href=&quot;http://reddit.com/submit?url=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&amp;amp;title=Robert+Siciliano%3A+Why+Debit+Cards+can+become+a+Nightmare+&quot; title=&quot;Submit this post on reddit.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/reddit.png&quot; alt=&quot;Reddit&quot; /&gt; Reddit&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_magnoliacom&quot;&gt;&lt;a href=&quot;http://ma.gnolia.com/bookmarklet/add?url=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&amp;amp;title=Robert+Siciliano%3A+Why+Debit+Cards+can+become+a+Nightmare+&quot; title=&quot;Submit this post on ma.gnolia.com.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/magnoliacom.png&quot; alt=&quot;Magnoliacom&quot; /&gt; Magnoliacom&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_furl&quot;&gt;&lt;a href=&quot;http://www.furl.net/storeIt.jsp?u=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&amp;amp;t=Robert+Siciliano%3A+Why+Debit+Cards+can+become+a+Nightmare+&quot; title=&quot;Submit this post on furl.net.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/furl.png&quot; alt=&quot;Furl&quot; /&gt; Furl&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_facebook&quot;&gt;&lt;a href=&quot;http://www.facebook.com/sharer.php?u=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&amp;amp;t=Robert+Siciliano%3A+Why+Debit+Cards+can+become+a+Nightmare+&quot; title=&quot;Share on Facebook.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/facebook.png&quot; alt=&quot;Facebook&quot; /&gt; Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_google&quot;&gt;&lt;a href=&quot;http://www.google.com/bookmarks/mark?op=add&amp;amp;bkmk=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&amp;amp;title=Robert+Siciliano%3A+Why+Debit+Cards+can+become+a+Nightmare+&quot; title=&quot;Bookmark this post on Google.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/google.png&quot; alt=&quot;Google&quot; /&gt; Google&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_yahoo&quot;&gt;&lt;a href=&quot;http://myweb2.search.yahoo.com/myresults/bookmarklet?u=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&amp;amp;t=Robert+Siciliano%3A+Why+Debit+Cards+can+become+a+Nightmare+&quot; title=&quot;Bookmark this post on Yahoo.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/yahoo.png&quot; alt=&quot;Yahoo&quot; /&gt; Yahoo&lt;/a&gt;&lt;/li&gt;
&lt;li class=&quot;service_links_technorati last&quot;&gt;&lt;a href=&quot;http://technorati.com/cosmos/search.html?url=http%3A%2F%2Fblog.intelius.com%2Frobert-siciliano-why-debit-cards-can-become-nightmare&quot; title=&quot;Search Technorati for links to this post.&quot; rel=&quot;nofollow&quot;&gt;&lt;img src=&quot;/sites/all/modules/contrib/service_links/images/technorati.png&quot; alt=&quot;Technorati&quot; /&gt; Technorati&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;http://blog.intelius.com/robert-siciliano-why-debit-cards-can-become-nightmare&quot; target=&quot;_blank&quot;&gt;read more&lt;/a&gt;&lt;/p&gt;</description>
 <comments>http://blog.intelius.com/robert-siciliano-why-debit-cards-can-become-nightmare#comments</comments>
 <category domain="http://blog.intelius.com/category/tags/credit-freeze">credit freeze</category>
 <category domain="http://blog.intelius.com/category/tags/debit-card">debit card</category>
 <category domain="http://blog.intelius.com/category/tags/debit-scam">debit scam</category>
 <category domain="http://blog.intelius.com/category/tags/identity-theft">identity theft</category>
 <category domain="http://blog.intelius.com/category/tags/intelius">Intelius</category>
 <category domain="http://blog.intelius.com/category/tags/robert-siciliano">Robert Siciliano</category>
 <pubDate>Wed, 07 Apr 2010 12:45:00 +0000</pubDate>
 <dc:creator>drupal_admin</dc:creator>
 <guid isPermaLink="false">216 at http://blog.intelius.com</guid>
</item>
</channel>
</rss>
