Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Be Cautious When Using Wi-Fi

The proliferation of mobile devices means that we can work or play online from almost anywhere, so it’s no surprise that public Wi-Fi networks have become more common. From hotels and coffee shops, to...

23 Jun 2015
Robert Siciliano

Your Stolen Data around the World in 2 Weeks

Ever wonder just what happens to the data in a data breach incident? Does it go into some kind of wormhole in cyberspace, out through the other end? Well, the answer is pretty much so, when you consid...

19 Jun 2015
Robert Siciliano

Top 12 Scams Happening NOW

Scamerama is here to stay! Scams are as old as time, and evolve as inventions and technology evolve. Top scams, according to a report on FraudAvengers.com, are as follows: Scammer “accidentally” over...

17 Jun 2015
Robert Siciliano

How to plan for Digital Disasters

In this day and age, we should never hear someone proclaim, “Oh my God, my computer crashed! I lost everything!” You can’t lose something that’s been properly backed up. So many people, including ones...

16 Jun 2015
Robert Siciliano

What is a Cache?

Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should you do it? A cache is a folder of recently visited webpages, which is stored on your computer’s...

15 Jun 2015
Robert Siciliano

Is It Fraud or are You just Crazy?

What would you rather have happen to you? A Russian ring of hackers has infiltrated your computer and smartphone and is hell-bent on taking control of your finances, social media life, even the smart ...

09 Jun 2015
Robert Siciliano

Identity Fraud Victim every two Seconds

Yes, identity fraud is SO common that someone becomes a victim every two seconds. The 2014 Identity Fraud Study, as reported on javelinstrategy.com, turned up some alarming results. Though the dollar ...

04 Jun 2015
Robert Siciliano

What is the Cloud?

You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there? The cloud is best described as a network of servers offering ...

03 Jun 2015
Robert Siciliano

Dude hacked Lottery Computers

Who needs psychics to reveal future lottery numbers when you can hack into the state lottery association and tamper with it? That apparently was the reasoning of Eddie Raymond Tipton, 51. Prosecutors ...

02 Jun 2015
Robert Siciliano

Tips to destroy and shred

You can’t be too neurotic about shredding sensitive documents to smithereens. For example, some people make a career out of “dumpster diving,” digging through trash in search of bank account informati...

30 May 2015
Robert Siciliano

Trusting too much brings Trouble

There will always be the person who lives on the Equator to whom you can sell an electric heater. As they say, there is a sucker born every minute. This is why cyber criminals will always have a field...

26 May 2015
Robert Siciliano

3 More Ways Criminals use influence to steal

Criminals use six basic principles to influence and steal. In the first post we discussed: Reciprocation: Do something nice for a person and they will feel obligated to return the favor. Social Proof...

23 May 2015