26 October 2014

Identity Theft Expert

Robert SicilianoIDTheftSecurity.com - Boston

5 ways Criminals hack your PC

13 hours ago  |  581 views  |  0  |  Recommends 0

Hackers are hell-bent on busting into the network of their targets. They are persistent—never giving up. When you build your defense against cyber criminals, it must be done with the idea that they WILL succeed. When you operate on this assumption rather than thinking that your anti this and anti that are all you need, you’ll have the best cyber ...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

2 Ways to Prevent Military Identity Theft

24 October 2014  |  431 views  |  0  |  Recommends 0

You’d think that servicemen and women would be better protected than civilians from identity theft, but their risk is higher, since their Social Security numbers are used so often and also abroad. In Iraq, it’s painted on their laundry bags! Ohio wants to introduce a bill to stifle military ID theft. When a military individual has damaged cred...

TagsSecurity
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

6 Ways to prevent Social Engineering Attacks

14 October 2014  |  628 views  |  0  |  Recommends 0

Hacking isn’t just about weak passwords and single-factor authentication. A lot of it occurs because people can be so easily tricked into giving up personal information: the craft of social engineerin...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

10 most dangerous Facebook Scams

20 September 2014  |  1938 views  |  1  |  Recommends 0

Twenty percent of the world’s population is “on” Facebook—that’s well over a billion people Top 10 Most Popular Facebook Scams Profile visitor stats. It’s all about vanity. It doesn’t take long...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Identity proofing proves who You are

16 September 2014  |  1653 views  |  0  |  Recommends 0

Identity proofing is proof of whom you are. Proving one’s identity starts with that person answering questions that only they themselves can answer (even if the answers are fictitious), such as their ...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Family Identity Theft is Ugly

29 August 2014  |  1016 views  |  0  |  Recommends 0

Identity theft isn’t just the stuff of exciting movie and TV dramas; this happens in real life—and often. In fact, that Target breach that made headlines, Neiman Marcus, those 1. 2 Billion records the...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Prepaid Cards risk of Fraud

22 August 2014  |  1339 views  |  0  |  Recommends 0

Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire mo...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

The Role of Antivirus Software

16 August 2014  |  1940 views  |  2  |  Recommends 0

The purpose of antivirus (AV) software is to detect, neutralize or eradicate malware (malicious software). AV software not only will identify and destroy the computer virus, but it’s also designed to...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Beware of Flight MH17 Facebook Scams

23 July 2014  |  751 views  |  0  |  Recommends 0

How low can scammers go? The latest is phony Facebook profiles that use identities of deceased victims of Malaysia Airlines Flight MH17—claiming their credit cards were stolen from the crash debris. ...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Convict heads back to Jail for Burglary

26 June 2014  |  776 views  |  0  |  Recommends 0

Criminals do what they do because that’s their nature. Once bad, there’s hardly a chance they can be good. Jeffrey L. Patton, 43, said, “I’ve been scared to death of this day right here,” in refer...

TagsSecurity
Previous 1 | 2 | 3 | 4 | 5 |Next
 
1,306
Active bloggers
24,630
Members
8,174
Posts
11,364
Comments

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Ketharaman Swaminat...

As Founder and CEO, S. Ketharaman provid...

Leon Rees

Leon Rees - Financial Markets and Techno...

Derek Corcoran

My role as CXO is to understand what Bes...

Who is commenting on these posts

Lu Zurawski
Sandra Lee
Asif Faruque
Ketharaman Swaminathan
Pat Carroll
Melvin Haskins
James Van Dyke
Jim Wells
Brett King
John Candido
Paul Love
Mosh Adetoro