Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Most Unwanted Criminals Dumpster Divers Sly Spies

There is no shortage of bad guys, identity thieves, and hackers trying to separate you from your money. They range from previously discussed pickpockets, Trojan viruses, and ATM skimmers to dumpster ...

08 May 2011
Robert Siciliano

Most Unwanted Identity Theft Criminals

Here is a tongue-in-cheek list of the most unwanted identity thieves, describing the various techniques thieves use to steal your information. It’s clever and, unfortunately, very real. Pauly the Pic...

08 May 2011
Robert Siciliano

My Top 5 Mobile Commerce Apps

The day when your wallet becomes a relic, like an 8-track tape, isn’t here quite yet. But we are getting close. Thinning out your wallet isn’t just nice for your pants pocket. It’s also a good way to ...

28 Apr 2011
Robert Siciliano

Mobile Phone Operating System Insecurity

As more online retailers introduce mobile ecommerce applications, criminal hackers are taking notice. Existing mobile operating systems are under attack and, like standard PC operating systems, they s...

26 Apr 2011
Robert Siciliano

Phishers Using Holidays and Social Media to Target

Recent reports of “The Oak Ridge National Laboratory, home to one of the world’s most powerful supercomputers, has been forced to shut down its email systems and all Internet access for employees sin...

24 Apr 2011
Robert Siciliano

Pickpockets, a Dying Breed

If there were a criminal hall of fame with an award for the coolest criminal, it would have to go to the pickpocket. Pickpockets are sneaky creatures who manage to function exactly one degree below th...

22 Apr 2011
Robert Siciliano

Mobile Banking Becoming an E-Commerce Staple

Mobile banking, m-banking, or SMS banking refers to online banking that occurs via mobile phone or PDA rather than a PC. The earliest mobile banking services were offered over SMS, but with the introd...

22 Apr 2011
Robert Siciliano

Hackers Go After Points, Credits, and Virtual Currency

In a previous post I discussed virtual currency, which is used to purchase virtual goods within a variety of online communities, including social networking websites, virtual worlds, and online gamin...

20 Apr 2011
Robert Siciliano

Mobile Payment Set to Dramatically Increase

Mobile payments generally involve three participants: the mobile device, the merchant, and a financial service provider or trusted third party. That trusted third party, or TTP, is an established, rep...

20 Apr 2011
Robert Siciliano

Five Mobile Operating System Options

There are a number of mobile operating systems, but five major players have floated to the top, dominating a major chunk of the market. It used to be that people chose their phone only by their carrie...

19 Apr 2011
Robert Siciliano

Facebook Used To Stop Home Invasion

This is just the greatest story about social media used for doing good EVER. A University of Georgia student was in bed when masked men invaded his home and tied up his 17-year-old sister and his gra...

19 Apr 2011
Robert Siciliano

The Rise of Smartphones

More consumers than ever before are buying smartphones. A smartphone is an Internet-enabled mobile phone with the ability to purchase and run applications. Smartphones are generally equipped with voic...

18 Apr 2011

Now hiring