21 October 2014

Identity Theft Expert

Archive for: 2010
Robert SicilianoIDTheftSecurity.com - Boston

Happy Holidays and Thank You From Robert Siciliano

31 December 2010  |  2902 views  |  1  |  Recommends 0

25 years ago I was in a situation where I needed some help. A man appeared out of nowhere and seemed to have sensed my desperation and offered assistance. I accepted. Up until that day “It was all about me”. When I asked why he stopped to offer assistance and go out of his way as he did, he simply said, “Sometimes people just need help” That sim...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Hacking Wireless for Identity Theft

28 December 2010  |  4482 views  |  0  |  Recommends 0

The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-ti...

TagsSecurityRisk & regulation
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

Online Shoppers Concerned About Identity Theft

13 December 2010  |  5608 views  |  0  |  Recommends 0

Shopping online is unquestionably more convenient and efficient than traditional commerce. But is it safer? We face risk everywhere we go. We risk car accidents on the way to the mall. Muggers and th...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Twitter Crime on the Rise

09 December 2010  |  2720 views  |  0  |  Recommends 0

Twitter is now beginning to see a substantial rise in active users. A recent report found that the percentage of Twitter users who have tweeted ten or more times, have more than ten followers, and f...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Top 5 Vishing Techniques

07 December 2010  |  6083 views  |  0  |  Recommends 0

“Vishing” occurs when criminals call victims on the phone and attempt to lure them into divulging personal information that can be used to commit identity theft. The name comes from “voice,” and “phi...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

How Much Longer Does the Magstripe Have?

06 December 2010  |  2219 views  |  3  |  Recommends 0

Every U.S.-based credit card has a magnetic stripe on the back. This stripe can be read and rewritten like a rewritable burnable CD, using card burners that are easily available online. The simplicit...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Supercookies: What Websites Know About You

01 December 2010  |  3352 views  |  0  |  Recommends 0

Most major websites now install cookies on your computer, which track what you do online. Over time, these cookies develop a profile, which becomes your digital fingerprint, to a certain extent. Yo...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

What Security Issues Should You Worry About?

22 November 2010  |  2426 views  |  0  |  Recommends 0

First thing I tell my seminar attendees is “The chances of anything bad ever happening to you is very slim. So don’t worry about. However you should still put these systems in place.” Are you a helic...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

CO. Supreme Court Using a Stolen SS Number is Not ID Theft

16 November 2010  |  2924 views  |  0  |  Recommends 0

I feel like my head is going to explode. The Colorado Supreme Court has ruled “that using someone else’s Social Security number is not identity theft as long as you use your own name with it.” The d...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Using Video To Catch a Nasty Neighbor

15 November 2010  |  2626 views  |  2  |  Recommends 0

Living in the Northeast has its pros and cons. We have the four seasons, great food, entertainment, sports, everything is at your fingertips, and for me it’s where business gets done. Drawbacks inclu...

TagsSecurityRisk & regulation
Previous 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 |Next
 
1,314
Active bloggers
25,557
Members
8,153
Posts
11,336
Comments

Top bloggers: 30 days

Most viewed Engaging
Ketharaman Swaminat...

As Founder and CEO, S. Ketharaman provid...

Steve Sprague

Steve Sprague has been working in the el...

David Gibbard

Leader in the OmniChannel and Digital Ba...

Who is commenting on these posts

Pat Carroll
Melvin Haskins
James Van Dyke
Ketharaman Swaminathan
Jim Wells
Brett King
John Candido
Paul Love
Mosh Adetoro
Matt White
Lu Zurawski
James Piggot