04 December 2016

Identity Theft Expert

Archive for: 2012
Robert SicilianoIDTheftSecurity.com - Boston

Lookout for These Nastygrams

19 December 2012  |  2775 views  |  0 comments | recommendations Recommends 0

Natural disaster scam: Sadly, scammers seem to come out of the woodwork during a natural disaster such as Hurricane Sandy to catch consumers when they’re in a panic, looking for answers, and when they’re most vulnerable. People should not click on links or respond to phishing e-mails for relief donations that ask for credit card numbers or other pe...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

How to Protect Your Personal Data: 3 Things You Must Know

14 December 2012  |  3326 views  |  0 comments | recommendations Recommends 0

There are two kinds of identity theft you must protect yourself from: New account fraud: Refers to financial identity theft in which the victim’s personal identifying information and good credit standing are used to create new accounts, which are then used to obtain products and services. Stolen Social Security numbers are often used to commit new...

TagsSecurity
More blog posts
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

US Teens Are Up to No Good Online

14 December 2012  |  3124 views  |  1 comments | recommendations Recommends 1

Teens are spending more and more time online these days and while the Internet offers a variety of benefits it can also serve as a dangerous space –and not just in America. According to Exploring the ...

TagsSecurity
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

10 Secure Online Holiday Shopping Tips

09 December 2012  |  1892 views  |  0 comments | recommendations Recommends 0

Holiday shopping is easy, convenient and it can be secure too. Here are 10 tips to a secure online shopping experience during the holiday season: Avoid spoofed websites. Common sense says any time you...

TagsSecurity
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

The Upside of Electronic Health Records

03 December 2012  |  1642 views  |  0 comments | recommendations Recommends 0

In a world where a Twitter tweet can be heard around the world instantly, a friend’s video on YouTube can go viral overnight, and you can speak to anyone online across the globe without using a phone,...

TagsSecurity
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

What Makes My Passwords Vulnerable?

20 November 2012  |  2438 views  |  0 comments | recommendations Recommends 0

There is no such thing as a truly secure pass­word. There are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your account...

TagsSecurity
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

Internet Safety Is Not A Technology Problem

20 November 2012  |  1759 views  |  0 comments | recommendations Recommends 0

A recent story about a teen romance gone wrong, had reportedly started on Xbox. Now their parents and police say the four Iowa teens have run away from their homes. Two teenage girls from Shellsburg a...

TagsSecurity
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

Sofia Vergaras Personal Photos Hacked

15 November 2012  |  2255 views  |  0 comments | recommendations Recommends 0

In my line of work I get emails such as this one: “Hi Robert, I’m not sure if you saw what had happened on my Facebook page last night, but someone stole my cell phone while I was at a concert, and po...

TagsSecurityRisk & regulation
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

The Seedy Site of Web Searches

15 November 2012  |  2509 views  |  0 comments | recommendations Recommends 0

Ever seek out information online and end up somewhere you never meant to go? I’m not talking about some website that didn’t have what you were looking for, I’m talking about a website that you REALLY ...

TagsSecurityRisk & regulation
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

Cybersecurity Matters in The Election

30 October 2012  |  2358 views  |  0 comments | recommendations Recommends 0

The term “cyberattack” or cyberwarfare is defined as “politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional ...

TagsSecurityRisk & regulation
Previous 1 | 2 | 3 | 4 | 5 |Next
members
28,740
Members
comments
16,448
Comments
blogs
10,726
Posts
bloggers 
1,226
Active bloggers

Top bloggers: 30 days

Most viewed Engaging
Carlo R.W. De Meijer
Carlo R.W. De Meije...

Independent financial services advisor

Rob De Dominicis
Rob De Dominicis

CEO and Managing Director of ASX-listed...

Tony Xhufi
Tony Xhufi

Founder & CEO - A hybrid crowdfundin...

Estelle Roiena
Estelle Roiena

Estelle combines 6 years of experience a...

Who is commenting on these posts

Ketharaman Swaminathan
Bruno Bontempi
Jeremy Light
Bahman Rezayat
Maruthi Ramanan Thangaraj
João Bohner
Mark Cheng
Rob De Dominicis
Adedeji Olowe
York Weyers
Melvin Haskins
Raj Singh