Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Why Mobile Security is a Must

Smartphone use continues to increase. More than one third of Americans have dropped landlines and only use mobiles. It is very possible that within the next 10 years, the landline will be obsolete and...

11 Nov 2013
Robert Siciliano

Scammers Use Online Calendars to Phish Victims

You’ve been here before: You’re at work, you get a notification via a popup, then an email, then a text reminding you of an appointment on your calendar. For most busy professionals, this is pretty no...

10 Nov 2013
Robert Siciliano

Apple Makes Life Harder for iPhone Thieves

You probably know that iPhones are high on the wish list of thieves all over the country—so much so that data from the New York City Police Department reveals that iPhone and iPad thefts have soared 4...

10 Nov 2013
Robert Siciliano

Socint: Disseminating Cybercrime Through Social Intelligence

People talk—A LOT. They can’t stop talking. Talking, getting something off your mind and out there feels good. Talking takes the pressure off one’s mind; our mouths are like relief valves for our head...

10 Nov 2013
Robert Siciliano

Whats the Point of 1 Million in Insurance for ID Theft

Honesty is the best policy, right? I’ve spent my life being honest, and do you know what is the most important lesson I’ve learned is? The truth hurts. And when you (meaning me too) says it like it is...

04 Nov 2013
Robert Siciliano

Danger Wireless Toilets Next on Hackers List

Just about anything wireless is hackable today. Everything—from PCs to mobiles to tablets to home automation devices to pacemakers to insulin dispensers and even cars—are hackable. And now “smart” toi...

04 Nov 2013
Robert Siciliano

5 Home Security Tactics of the Uber Rich

The uber rich have many reasons to invest in uber security. I met a woman who won a $300 million lottery, and she had some unfortunate stories about how low people go to get at and to moneyed individu...

01 Nov 2013
Robert Siciliano

What is Business or Commercial Identity Theft?

Business or commercial identity theft happens when thieves use an existing business’ name to get credit, or they may bill a business’ clients for products and services. Sometimes the Social Security n...

29 Oct 2013
Robert Siciliano

What is Synthetic Identity Theft?

Identity theft is first and foremost a problem because we rely on numerical identifiers that attach humans to credit and a variety of services. Once a criminal gets hold of those identifiers, he can s...

09 Oct 2013
Robert Siciliano

What is Encryption?

Encryption is the science of encoding and decoding secret messages. It began as cryptography—the ancient Greeks used it to protect sensitive information that might fall into the hands of their enemie...

07 Oct 2013
Robert Siciliano

Medical Identity Theft: Ins and Outs

Medical identity theft is the deadliest form of identity theft—and I say this without hyperbole or exaggeration. When financial gain is the general motivation for stealing medical information, insuran...

07 Oct 2013
Robert Siciliano

11 Types of Grey Charges

Grey charges: “Deceptive and unwanted credit and debit card charges that occur as a result of misleading sales and billing practices.” Technically, grey charges aren’t considered fraud because the leg...

07 Oct 2013

Now hiring