Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Google Hack Whacks Passwords

Code named Gaia after “Greek Goddess of Earth” a Google single sign on password system was hacked in December. The NY Times reports “the intruders do not appear to have stolen passwords of Gmail user...

30 Apr 2010
Robert Siciliano

Parents Navigating the Social Media Mess

Children say and do things that make them vulnerable to dangers in the outside world. A parent can parent all day long and do everything possible to protect their kids from themselves, but a child’s p...

26 Apr 2010
Robert Siciliano

Caller ID Spoofing Becoming Illegal

AP reports using false caller ID with the intent of tricking people into revealing personal information or otherwise causing harm would become illegal under legislation that passed the House Wednesda...

23 Apr 2010
Robert Siciliano

Do You Spy on Your Spouse?

Generally in a trusting relationship spying isn’t necessary. I’m sure Sandra Bullock, Kate Gosselin or Tiger Wood’s wife didn’t think they needed to spy on their husbands, until they did. Reckless b

15 Apr 2010
Robert Siciliano

Need Finextra Community Assistance

I know this is an unorthodox request but I envision it can turn into a cool post in the comments, then a great article. I'm doing a report on international issues of "new account fraud" as

09 Apr 2010
Robert Siciliano

Hacking Humans Naivete

Naiveté: A lack of sophistication or worldliness. That sums up a lot of people I know. “There’s a sucker born every minute” is a phrase often credited to P.T. Barnum (1810 – 1891), an American showman...

09 Apr 2010
Robert Siciliano

Using Facebook to Steal Company Data

There is a reason why computer users are called “users.” Like crack addicts who are drug users, more is never enough. And when under the influence, people do stupid things. I find myself scanning the ...

09 Apr 2010
Robert Siciliano

ID Theft Ring Gleaned Socials From Medical Records

Medical identity theft occurs when the perpetrator uses your name and in some cases other aspects of your identity, such as insurance information, to obtain medical treatment or medication or to make ...

08 Apr 2010
Robert Siciliano

Criminal Hacker Gets 20

Albert Gonzalez and his gang of criminal hackers were responsible for data breaches in retailers and payment processors, with some estimates saying they breached over 230 million records combined. Go...

06 Apr 2010
Robert Siciliano

Copy Machines Can Store Your Private Info

Today, copy machines, fax machines and many printers are just like computers; they’re smart and they have hard drives or flash drives and can store data that can be extracted. Peripherals in the olden...

25 Mar 2010
Robert Siciliano

She Said WHAT? On Facebook?

I don’t know about you, but high school was a nightmare for me. I spent a lot of my time in the assistant principal’s office for fighting. My taste for GQ style clothing along with slicked back greasy...

25 Mar 2010
Robert Siciliano

Bridal Scam Shows How Vulnerable We Are

There are few more nuttier earthlings than the Bridezillas. Lovely women who go bonkers within 365 days of a wedding date. I blame the whole thing on Walt Disney. The groom to-be generally wants it o...

18 Mar 2010

Now hiring