Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Spear Phishers Know Your Name

“Spear phishing” refers to phishing scams that are directed at a specific target. Like when Tom Hanks was stranded on the island in the movie Cast Away. He whittled a spear and targeted specific fish,...

05 Nov 2010
Robert Siciliano

Identity Theft Part 2 5 More Identity Theft Myths Unveiled

#1 Publically available information is not valuable to an identity thief. If I was an identity thief I’d start with the phone book. All information about you is of value to an identity thief. The bad ...

03 Nov 2010
Robert Siciliano

Part 1 of Identity Theft 5 Identity Theft Myths Unveiled

#1 You can’t protect yourself from identity theft. Some, not all Identity theft is preventable. There are many things people can do to minimize their risk, both online and offline. Shred anything tha...

01 Nov 2010
Robert Siciliano

Top Ten Most Dangerous Places to Leave Your SS Number

Universities/Colleges are the Riskiest Cases of identity theft are skyrocketing, and 32% of all ID theft victims had their social security number compromised according to Javelin’s 2010 Identity Frau...

01 Nov 2010
Robert Siciliano

Mobile Phone Security Under Attack

As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for content creators’ latest innovations, which ...

01 Nov 2010
Robert Siciliano

5 Sneaky Credit Card Scams

#1 Phone Fraud. The phone rings, a scammer poses as your banks fraud department. They may have your entire card number stolen from another source. They ask about a charge made and you deny the charge...

01 Nov 2010
Robert Siciliano

Five Ways Identities Are Stolen Online

Cybercrime has become a trillion dollar issue. In a recent survey, hundreds of companies around the world estimated that they had lost a combined $4.6 billion in intellectual property as a result of d...

27 Oct 2010
Robert Siciliano

7 Ways to Combat Scareware

You may have seen this before, it goes like this: a pop-up pops and it looks like a window on your PC. Next thing a scan begins. It often grabs a screenshot of your “My Computer” window mimicking your...

19 Oct 2010
Robert Siciliano

Typosquatting for Fun and Profit

Typosquatting, which is also known as URL hijacking, is a form of cybersquatting that targets Internet users who accidentally type a website address into their web browser incorrectly. When users mak...

12 Oct 2010
Robert Siciliano

5 Ways to Prevent Check Fraud Scams

Check fraud is a billion dollar problem. Check fraud victims include banks, businesses and consumers. Our current system for cashing checks is somewhat flawed. Checks can be cashed and merchandise can...

12 Oct 2010
Robert Siciliano

Women Proved Securest in the Defcon Social Engineering Game

In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon), I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up info...

10 Oct 2010
Robert Siciliano

Half Billion Records Breached in 5 Years

In the late 90s and early 2000s, hacking had evolved from “phreaking” (hacking phone systems) to “cracking” (breaking into networks). At the time, hackers hacked for fun, for the challenge, and for fa...

10 Oct 2010

Now hiring