21 October 2014

Identity Theft Expert

Robert SicilianoIDTheftSecurity.com - Boston

6 Ways to prevent Social Engineering Attacks

14 October 2014  |  587 views  |  0  |  Recommends 0

Hacking isn’t just about weak passwords and single-factor authentication. A lot of it occurs because people can be so easily tricked into giving up personal information: the craft of social engineering. Example: “Download this video of Kim K fully naked!” How many men would be lured into clicking this gateway to a viral infection? We are a sad sp...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

7 ways to prevent Data Theft when traveling

10 October 2014  |  616 views  |  0  |  Recommends 0

The threat of data theft follows travelers; there’s never a vacation from hackers. So what should the traveler do? Anticipate snooping by hackers. This way, you can prepare for the worst. If you must bring a laptop, use it as a shell to access data remotely. Leave private information behind. If this is not possible, bring it with you in the f...

TagsSecurity
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

Identity thieves bombarding Call Centers

25 September 2014  |  931 views  |  0  |  Recommends 0

One out of 2,900 seems very small, but when there’s a total of 105 million…then this percentage stacks up in the end. It represents the frequency of calls from fraudsters made to call centers in an at...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

What to do in the Aftermath of an Attack

23 September 2014  |  1023 views  |  0  |  Recommends 0

Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked. After the attack, locate the p...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

10 most dangerous Facebook Scams

20 September 2014  |  1928 views  |  1  |  Recommends 0

Twenty percent of the world’s population is “on” Facebook—that’s well over a billion people Top 10 Most Popular Facebook Scams Profile visitor stats. It’s all about vanity. It doesn’t take long...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Identity proofing proves who You are

16 September 2014  |  1632 views  |  0  |  Recommends 0

Identity proofing is proof of whom you are. Proving one’s identity starts with that person answering questions that only they themselves can answer (even if the answers are fictitious), such as their ...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Are All Hackers Bad?

09 September 2014  |  803 views  |  0  |  Recommends 0

The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about ...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

The Role of Antivirus Software

16 August 2014  |  1936 views  |  2  |  Recommends 0

The purpose of antivirus (AV) software is to detect, neutralize or eradicate malware (malicious software). AV software not only will identify and destroy the computer virus, but it’s also designed to...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

ATM Skimming, Cyber Fraud Keep Bankers up at Night

13 June 2014  |  1624 views  |  0  |  Recommends 0

Last year there were hundreds of cyber fraud incidents that struck banks and put consumers’ personal data at risk, even though the one involving Target stole the scenes. These crimes included payment...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

10 simple Ways Identity Thieves steal your Credit Card

07 May 2014  |  1433 views  |  0  |  Recommends 0

There are 10 basic ways a crook can easily rob your identity by getting at your credit card or open a new credit card in your name, but there are also ways you can prevent this from occurring. Sim...

TagsSecurity
Previous 1 | 2 | 3 | 4 | 5 |Next
 
1,315
Active bloggers
25,552
Members
8,152
Posts
11,335
Comments

Top bloggers: 30 days

Most viewed Engaging
Ketharaman Swaminat...

As Founder and CEO, S. Ketharaman provid...

Steve Sprague

Steve Sprague has been working in the el...

David Gibbard

Leader in the OmniChannel and Digital Ba...

Who is commenting on these posts

Pat Carroll
Melvin Haskins
James Van Dyke
Ketharaman Swaminathan
Jim Wells
Brett King
John Candido
Paul Love
Mosh Adetoro
Matt White
Lu Zurawski
James Piggot