Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Nineways to shop safely on Cyber Monday

With Cyber Monday, you don’t have to camp outside in the cold overnight so you can be the first person busting through the doors like on Black Friday. But you still may get trampled to a pulpby cyber ...

24 Nov 2015
Robert Siciliano

What are Bug Bounties?

A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system. This is akin to giving a reward to a burglar for pointing out weakness...

20 Nov 2015
Robert Siciliano

Medical Identity Theft can be deadly

Every time you have a medical procedure done, including routine checkups and treatment for minor issues, paperwork is generated. You should have copies of every single paper. This is one line of defen...

18 Nov 2015
Robert Siciliano

The World's First Biometric Password Lockdown App is here

It’s about time: a biometric for your smartphone that will change the way you think about biometric security. This revolutionary biometric comes from Biometric Signature ID and it’s called BioTect-ID,...

17 Nov 2015
Robert Siciliano

Best practices for BYOD data storage

The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means ...

16 Nov 2015
Robert Siciliano

Infrastructures under attack

It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murd...

11 Nov 2015
Robert Siciliano

How to avoid Online Fundraising Scams

You’ve probably heard of the gofundme.com site, where all sorts of stories are posted of people seeking donations. Some are tragic, others are trite. You may be touched by a particular story, perhaps ...

10 Nov 2015
Robert Siciliano

Fake IDs are everywhere

Okay, so you’re 18 or 19 and in college, and are stressed because you have to be 21 in order to gain entry to a night club or bar where you’d like to drink up a storm and mingle with a “more mature” c...

29 Oct 2015
Robert Siciliano

5 In-Demand Cybersecurity Specialties

There are numerous subspecialties within the booming cybersecurity field[i]. Here are some of the most in-demand professions: Cybersecurity Engineer: This is the all-around, jack-of-all-trades, go-to ...

28 Oct 2015
Robert Siciliano

Don't Be Lazy With Your Passwords

It can be tough being a responsible adult sometimes, and managing these responsibilities isn’t always a chore that I want to deal with. Can you relate? Managing life takes focus and effort, and managi...

27 Oct 2015
Robert Siciliano

How Passwords Get Hacked

If I wanted to crack one of your passwords, I could probably make a series of educated guesses and get pretty close. Why? Because people tend to stick with simple, easy to remember passwords, but thes...

26 Oct 2015
Robert Siciliano

Dept. of Homeland Security Computers Vulnerable

There’s a problem on the home front: security lapses in the computers of the Secret Service and Immigration and Customs Enforcement, says a report on townhall.com. These departments were recently audi...

25 Oct 2015

Now hiring