Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

MIT Says Handing Over Your Identity Data Protects You

Identity is a simple concept that has become a complex problem. It has become complex due to fraud. Fraud, motivated by money and the ease of obtaining credit and taking over an account. Because ident...

02 Dec 2009
Robert Siciliano

Handwritten Signature is Stupid Authorization

Ever forge your husband's signature? Wife’s? Parent's? Client's? Do you think the clerk behind the counter at Walmart is skilled in handwriting analysis? I’ve always viewed a signature as a totally ri...

01 Dec 2009
Robert Siciliano

The Twelve Scams of Christmas, Pt IV of IV

As cybercriminals begin to take advantage of the holiday season, McAfee, Inc. revealed the “Twelve Scams of Christmas” – the twelve most dangerous online scams that computer users should be cautious o...

29 Nov 2009
Robert Siciliano

Popular Online Attacks This Holiday Season Pt III of IV

Cybercriminals Take Advantage of the Holiday Season, Aiming to Steal Consumers’ Money, Identities and Financial Information As cybercriminals begin to take advantage of the holiday season, McAfee, Inc...

29 Nov 2009
Robert Siciliano

Popular Online Attacks This Holiday Season Pt II of IV

Cybercriminals Take Advantage of the Holiday Season, Aiming to Steal Consumers’ Money, Identities and Financial Information As cybercriminals begin to take advantage of the holiday season, McAfee, In...

26 Nov 2009
Robert Siciliano

The 12 Scams of Christmas

Cybercriminals Take Advantage of the Holiday Season, Aiming to Steal Consumers’ Money, Identities and Financial Information As cybercriminals begin to take advantage of the holiday season, McAfee, Inc...

25 Nov 2009
Robert Siciliano

SWATting, Using Technology To Hurt

Swatting is making prank calls to emergency services. In the field of information security, swatting is an attempt to trick an emergency service (such as a 911 operator) to dispatch an emergency respo...

24 Nov 2009
Robert Siciliano

Hackers Indicted for Jacking Comcast

One hacked email address led to the defacement of Comcasts homepage. When the hackers called Comcasts technical contact to let him know all 200 Comcast domain names and Comcast homepage were vulnerabl...

22 Nov 2009
Robert Siciliano

Money Mules Facilitate Identity Theft and Fraud

Mules are relatively unaware people who get hooked into a “small business” or employment that is a function of a criminal enterprise. The mules often respond to “help wanted” ads from online job place...

19 Nov 2009
Robert Siciliano

I Bought an ATM off Craigslist w 1000 CC-Debits No. on it

After the Vegas DEFCON ATM debacle where hackers hacked hackers by setting up a fake ATM in front of the facilities security office, I needed to see how stupid easy it was to buy and ATM and just set ...

18 Nov 2009
Robert Siciliano

Twitter Phish Identity Theft Scam

I’ve been getting the same “direct message” from several of my Twitter followers. Apparently, their accounts have been hacked, because it’s a phishing message that says, “ROFL this you?” and contains ...

16 Nov 2009
Robert Siciliano

Why is Child Pornography on Your PC?

Anti-virus protection, critical security patches and a secure wireless connection have always been essential processes on my networks. My main concern has always been to protect my bank account by kee...

14 Nov 2009

Now hiring