07 February 2016

Identity Theft Expert

Archive for: 2010
Robert SicilianoIDTheftSecurity.com - Boston

Happy Holidays and Thank You From Robert Siciliano

31 December 2010  |  3325 views  |  1  |  Recommends 0

25 years ago I was in a situation where I needed some help. A man appeared out of nowhere and seemed to have sensed my desperation and offered assistance. I accepted. Up until that day “It was all about me”. When I asked why he stopped to offer assistance and go out of his way as he did, he simply said, “Sometimes people just need help” That simp...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Hacking Wireless for Identity Theft

28 December 2010  |  4861 views  |  0  |  Recommends 0

The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-tim...

TagsSecurityRisk & regulation
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

Online Shoppers Concerned About Identity Theft

13 December 2010  |  6259 views  |  0  |  Recommends 0

Shopping online is unquestionably more convenient and efficient than traditional commerce. But is it safer? We face risk everywhere we go. We risk car accidents on the way to the mall. Muggers and thi...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Twitter Crime on the Rise

09 December 2010  |  2931 views  |  0  |  Recommends 0

Twitter is now beginning to see a substantial rise in active users. A recent report found that the percentage of Twitter users who have tweeted ten or more times, have more than ten followers, and fo...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Top 5 Vishing Techniques

07 December 2010  |  6313 views  |  0  |  Recommends 0

“Vishing” occurs when criminals call victims on the phone and attempt to lure them into divulging personal information that can be used to commit identity theft. The name comes from “voice,” and “phis...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

How Much Longer Does the Magstripe Have?

06 December 2010  |  2415 views  |  3  |  Recommends 0

Every U.S.-based credit card has a magnetic stripe on the back. This stripe can be read and rewritten like a rewritable burnable CD, using card burners that are easily available online. The simplicity...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Supercookies: What Websites Know About You

01 December 2010  |  3580 views  |  0  |  Recommends 0

Most major websites now install cookies on your computer, which track what you do online. Over time, these cookies develop a profile, which becomes your digital fingerprint, to a certain extent. You ...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

What Security Issues Should You Worry About?

22 November 2010  |  2651 views  |  0  |  Recommends 0

First thing I tell my seminar attendees is “The chances of anything bad ever happening to you is very slim. So don’t worry about. However you should still put these systems in place.” Are you a helico...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

CO. Supreme Court Using a Stolen SS Number is Not ID Theft

16 November 2010  |  3160 views  |  0  |  Recommends 0

I feel like my head is going to explode. The Colorado Supreme Court has ruled “that using someone else’s Social Security number is not identity theft as long as you use your own name with it.” The def...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Using Video To Catch a Nasty Neighbor

15 November 2010  |  2868 views  |  2  |  Recommends 0

Living in the Northeast has its pros and cons. We have the four seasons, great food, entertainment, sports, everything is at your fingertips, and for me it’s where business gets done. Drawbacks includ...

TagsSecurityRisk & regulation
Previous 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 |Next
Active bloggers

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Neil Crammond

trading manager

Ivy Schmerken

Writer of blogs and whitepapers about el...

Who is commenting on these posts

Ray Kenny
Vivek Singh
Neil Crammond
Ian Davis
Charmaine Oak
Manish Grover
Ketharaman Swaminathan
Balasubramaniam GD
John Candido
Matt Scott
Bruno  Schütterle
Ajit Tripathi