01 October 2014


Robert SicilianoIDTheftSecurity.com - Boston

Identity thieves bombarding Call Centers

25 September 2014  |  779 views  |  0  |  Recommends 0

One out of 2,900 seems very small, but when there’s a total of 105 million…then this percentage stacks up in the end. It represents the frequency of calls from fraudsters made to call centers in an attempt to get customer account details so they could steal. Many times these crooks will succeed by conning phone operators into altering personal ...

Chris SullivanCourion - London

Can changing employees' behaviour mitigate business risk?

24 September 2014  |  2573 views  |  0  |  Recommends 0

In last month’s Information Security Forum, CEO Steve Durbin called for changing employees’ behaviour with regards to security and data privacy as a way to reduce business risk. His argument resonates strongly with the financial services world where there’s ever-increasing pressure to apply tougher governance and more thorough risk mitigation. ...

TagsSecurityRisk & regulation
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

What to do in the Aftermath of an Attack

23 September 2014  |  928 views  |  0  |  Recommends 0

Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked. After the attack, locate the p...

Jane AdamsCurrently looking for a job - Edinburgh

Security versus convenience - am I never satisfied?

23 September 2014  |  1038 views  |  1  |  Recommends 0

One of the biggest aggravations involved in dealing with banks and credit card issuers is their security checking process when you contact their call centre. Questions, questions, so many questions. S...

Robert SicilianoIDTheftSecurity.com - Boston

10 most dangerous Facebook Scams

20 September 2014  |  1723 views  |  1  |  Recommends 0

Twenty percent of the world’s population is “on” Facebook—that’s well over a billion people Top 10 Most Popular Facebook Scams Profile visitor stats. It’s all about vanity. It doesn’t take long...

Robert SicilianoIDTheftSecurity.com - Boston

Identity proofing proves who You are

16 September 2014  |  1548 views  |  0  |  Recommends 0

Identity proofing is proof of whom you are. Proving one’s identity starts with that person answering questions that only they themselves can answer (even if the answers are fictitious), such as their ...

Thomas JorgensenEncap Security - Oslo

Mobile Money: Apple’s next security pitfall?

11 September 2014  |  6072 views  |  0  |  Recommends 0

Apple has a trick it repeats every few years. It takes a technology or concept that has been around for some time, and makes it attractive and accessible for consumers. The iPod was far from the first...

TagsSecurityMobile & online
Robert SicilianoIDTheftSecurity.com - Boston

Are All Hackers Bad?

09 September 2014  |  780 views  |  0  |  Recommends 0

The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about ...

Pat CarrollValidSoft - London

iHack Hastens Call for Multi-factor Authentication

05 September 2014  |  2374 views  |  1  |  Recommends 0

“If only I would have known” is a phase that Jennifer Lawrence, Kate Upton and possibly as many as 100 celebrities and notable personalities are likely saying after a reported massive breach of Apple...

TagsSecurityPaymentsGroupInformation Security
Robert SicilianoIDTheftSecurity.com - Boston

How to Secure Your iCloud

03 September 2014  |  1668 views  |  1  |  Recommends 0

By now you’ve heard that Jennifer Lawrence’s (and other celebs’) cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the “Fin...

Previous 1 | 2 | 3 | 4 | 5 |Next
Active bloggers

Top security posts in last 5 days

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Chris Sullivan

As Vice President of Advanced Solutions,...

Pat Carroll

Throughout his career, Pat has been at t...

Jane Adams

Currently looking for a senior marketin...

Who is commenting on Security posts

Ketharaman Swaminathan
Ilja Ilit
Chris Torr
Robert Siciliano
Boris Taratine