Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Check Your Password Security

Passwords are the bane of the security community. We are forced to rely on them, while knowing they’re only as secure as our operating systems, which can be compromised by spyware and malware. There a...

19 Mar 2011
Robert Siciliano

Be Careful Of Earthquake Related Charity Scams

Internet criminals follow a similar editorial calendar as newspaper and magazine editors, coordinating their attacks around holidays, and the change in seasons. They further capitalize on significant ...

17 Mar 2011
Robert Siciliano

Mobile Payment is Coming

Near Field Communications, or NFC, is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when ma...

17 Mar 2011
Robert Siciliano

Banks Need You To Be Responsibly Secure

Our culture deemphasizes individual responsibility. In my mind, life begins when you begin taking responsibility for everything in your life. Personal security is fundamentally your own responsibility...

13 Mar 2011
Robert Siciliano

Tax Related Identity Theft Scams Up

Cases of stolen tax returns have surged over the past five years, leaving many identity theft victims struggling to recoup their lost refunds. Approximately 155 million tax forms are filed annually. T...

10 Mar 2011
Robert Siciliano

Dumb Criminal Tries To Guess PIN 50 Times

What do you do when you are picked up in a cab and the driver suspects your home will be vacant while you are gone? The Manchester Evening News reports “A BUNGLING burglar went to the same ATM more th...

08 Mar 2011
Robert Siciliano

Mothers Book Recalls Serial Killer 07 MA Home Invasion

In July of 2007 on a hot summer night a serial killer was arrested after he broke into a 15-year-old girl’s room in Chelmsford Massachusetts in the middle of the night and tried to rape her. The girl...

07 Mar 2011
Robert Siciliano

Mobile Phones Being Hacked and Cloned

Cloning occurs when hackers scan the airwaves to obtain SIM card information, electronic serial numbers and mobile identification numbers, and then using that data on other phones. Cloning can happen ...

05 Mar 2011
Robert Siciliano

LinkedIn Gone Wild: Invades Inboxes

Did you know there is a setting on LinkedIn where they will email your entire contact list in your behalf to let everyone know about a new position you have taken with a company? I didnt. Until I got ...

04 Mar 2011
Robert Siciliano

Social Security Numbers Easily Cracked

It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a r...

02 Mar 2011
Robert Siciliano

Dealing With Daily Digital Surveillance

Our everyday activities are being monitored, today, right now, either by self-imposed technology or the ever-present Big Brother. Traditionally, documenting our existence went like this: You’re born, ...

02 Mar 2011
Robert Siciliano

4 Reasons 2011 is the Year to Get Serious About Security

Prognosticators are silly. Or that’s how I’ve always viewed them, anyway. They combine past experience with their perspective on current trends to make predictions and pretend to be smarter than you. ...

28 Feb 2011

Now hiring