27 March 2015

Identity Theft Expert

Archive for: 2011
Robert SicilianoIDTheftSecurity.com - Boston

Securing New Digital Devices

21 December 2011  |  2449 views  |  0  |  Recommends 0

Laptops, desktops, Macs, mobiles, and tablets are on many people’s wish lists this holiday season. Once these shiny new devices are connected to the Internet, they will be under siege by malware created by criminals in order to steal identities. According to a recent McAfee survey, 60% of consumers now own at least three digital devices, and 25% ow...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Managing Family Time On The iPad or iPhone

16 December 2011  |  2488 views  |  0  |  Recommends 0

On our way home from a recent family vacation, my two year old grew understandably anxious and uncooperative while waiting for a flight in an airport terminal. So I handed over my iPhone, hoping to distract her. Within seconds, she had launched the photo application and begun scrolling through the videos of our trip. She’d watch a video, giggle a ...

TagsSecurityRisk & regulation
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

Human Security Weaker Than IT Security

14 November 2011  |  3068 views  |  0  |  Recommends 0

Information technologies have evolved to a level at which the developers, programmers, and security specialists all know what they’re doing, and are able to produce products and services that work and...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Searching for Hotties Leads to Hacked PCs

04 November 2011  |  2149 views  |  2  |  Recommends 0

Five or ten years ago, it was relatively easy for scammers to trick people into opening email attachments that would launch malicious programs on victims’ PCs. Nowadays, most email providers won’t per...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

What Are Your Digital Assets Worth?

13 October 2011  |  3101 views  |  0  |  Recommends 0

Digital assets include: entertainment files (e.g. music downloads), personal memories (e.g. photographs), personal communications (e.g. emails), personal records (e.g. health, financial, insurance), a...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Think You Are Protected Think Again

02 October 2011  |  3162 views  |  0  |  Recommends 0

In 1990, when only the government and a number of universities were using the Internet, there were 357 unique pieces of malware. The need for security began with desktop computing when the only means ...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Hackers Target Small Business

19 September 2011  |  2238 views  |  4  |  Recommends 0

Big companies and big government get big press when their data is breached. And when a big company is hit, those whose accounts have been compromised are often notified. With smaller businesses, howev...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

How Is All This Hacking Affecting My Identity?

16 September 2011  |  2479 views  |  1  |  Recommends 0

Without question, 2011 is the year for hackers of all kinds to get their 15 minutes of fame. But it feels like it’s lasting a lot longer than 15 minutes. With so many different breeds of hackers, each...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Bill Would Remove Social Security Numbers

26 August 2011  |  2707 views  |  0  |  Recommends 0

The most basic advice for protecting your own identity is to protect your Social Security number. The obvious solution is simply never to disclose your number, but this is silly, since, depending on y...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Researchers Say Identity Theft Has Lasting

26 August 2011  |  3058 views  |  0  |  Recommends 0

Identity theft victims don’t need Jessica Van Vliet, an assistant professor in counseling psychology at the University of Alberta, to tell them that they no longer feel safe when conducting everyday f...

TagsSecurityRisk & regulation
Previous 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |Next
24,830
Members
12,351
Comments
8,646
Posts
 
1,182
Active bloggers

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Charmaine Oak

Shift Thought is a UK-based consultancy...

Jes Breslaw

http://www.delphix.com

Abhishek Chatterjee

Practice Director- Digital Services, EME...

Dan Glessner

Dan leads marketing for Quisk, Inc., a S...

Who is commenting on these posts

Bjorn Soland
Charmaine Oak
Abhishek Chatterjee
Ketharaman Swaminathan
ANJUL SHARMA
Laurence Leyden
KEVIN SMITH
Samarth Bhardwaj
Aditya Gupta
Jamuna Ravi
Tony Wenzel
Jozsef Czimer