21 December 2014

Identity Theft Expert

Archive for: 2010
Robert SicilianoIDTheftSecurity.com - Boston

Happy Holidays and Thank You From Robert Siciliano

31 December 2010  |  2937 views  |  1  |  Recommends 0

25 years ago I was in a situation where I needed some help. A man appeared out of nowhere and seemed to have sensed my desperation and offered assistance. I accepted. Up until that day “It was all about me”. When I asked why he stopped to offer assistance and go out of his way as he did, he simply said, “Sometimes people just need help” That simp...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Hacking Wireless for Identity Theft

28 December 2010  |  4518 views  |  0  |  Recommends 0

The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-tim...

TagsSecurityRisk & regulation
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

Online Shoppers Concerned About Identity Theft

13 December 2010  |  5906 views  |  0  |  Recommends 0

Shopping online is unquestionably more convenient and efficient than traditional commerce. But is it safer? We face risk everywhere we go. We risk car accidents on the way to the mall. Muggers and thi...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Twitter Crime on the Rise

09 December 2010  |  2740 views  |  0  |  Recommends 0

Twitter is now beginning to see a substantial rise in active users. A recent report found that the percentage of Twitter users who have tweeted ten or more times, have more than ten followers, and fo...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Top 5 Vishing Techniques

07 December 2010  |  6107 views  |  0  |  Recommends 0

“Vishing” occurs when criminals call victims on the phone and attempt to lure them into divulging personal information that can be used to commit identity theft. The name comes from “voice,” and “phis...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

How Much Longer Does the Magstripe Have?

06 December 2010  |  2235 views  |  3  |  Recommends 0

Every U.S.-based credit card has a magnetic stripe on the back. This stripe can be read and rewritten like a rewritable burnable CD, using card burners that are easily available online. The simplicity...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Supercookies: What Websites Know About You

01 December 2010  |  3376 views  |  0  |  Recommends 0

Most major websites now install cookies on your computer, which track what you do online. Over time, these cookies develop a profile, which becomes your digital fingerprint, to a certain extent. You ...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

What Security Issues Should You Worry About?

22 November 2010  |  2450 views  |  0  |  Recommends 0

First thing I tell my seminar attendees is “The chances of anything bad ever happening to you is very slim. So don’t worry about. However you should still put these systems in place.” Are you a helico...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

CO. Supreme Court Using a Stolen SS Number is Not ID Theft

16 November 2010  |  2981 views  |  0  |  Recommends 0

I feel like my head is going to explode. The Colorado Supreme Court has ruled “that using someone else’s Social Security number is not identity theft as long as you use your own name with it.” The def...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Using Video To Catch a Nasty Neighbor

15 November 2010  |  2650 views  |  2  |  Recommends 0

Living in the Northeast has its pros and cons. We have the four seasons, great food, entertainment, sports, everything is at your fingertips, and for me it’s where business gets done. Drawbacks includ...

TagsSecurityRisk & regulation
Previous 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 |Next
 
1,272
Active bloggers
24,685
Members
8,344
Posts
11,687
Comments

Top bloggers: 30 days

Most viewed Engaging
Laurence Leyden

Responsible for SAP Business Development...

Robert Siciliano

Security analyst, published author, tele...

Paul Love

A payments professional, consultant, SME...

Lu Zurawski

Bipolar electronic payments expert. Curi...

Iain Montgomery

Innovation & Growth Consultant for M...

Who is commenting on these posts

Rozar Fid
Eric Lindeen
Sreeram Yegappan
Ketharaman Swaminathan
Simon Sanderson
enrico camerinelli
Alex Letts
Andrew Miller
Iain Montgomery
Lu Zurawski
Alexander Peschkoff
Chetan Ghadge