Finextra Research
Sibos 2025
Sign in
Sign up
Sibos 2025
  • News
    • Latest news
    • Company updates
    • Long reads
  • TV
  • Research
  • Events
    • All
    • Conferences
    • Webinars
    • Popular
  • Community
    • Community latest
    • Latest expert opinions
    • Groups
    • Search members
  • Jobs
  • APIs
Sign in
Sign up
Sibos 2025
  • News
    • Back
    • News
    • Latest news
    • Company updates
    • Long reads
  • TV
  • Research
  • Events
    • Back
    • Events
    • All
    • Conferences
    • Webinars
    • Popular
  • Community
    • Back
    • Community
    • Community latest
    • Latest expert opinions
    • Groups
    • Search members
  • Jobs
  • APIs
  • payments
  • markets
  • retail
  • wholesale
  • wealth
  • regulation
  • crime
  • crypto
  • sustainable
  • startups
  • devops
  • identity
  • security
  • cloud
  • ai

Community

  • Your feed
  • Latest expert opinions
  • Groups

Join the Community

23,910
Expert opinions
40,635
Total members
369
New members (last 30 days)
198
New opinions (last 30 days)
29,253
Total comments
Join Sign in
Follow Unfollow

Robert Siciliano

Security Analyst
Safr.me
Member since
04 Feb 2009
Location
Boston
Followers
8
Following
0
Opinions
856
Long reads
0
Followed by John Sims, Martha Boyle and 5 others you follow
View Robert Siciliano's full profile

Robert's opinions

clear
Robert Siciliano

8 Ways to Ensure Safe and Secure Online Shopping this Holiday Season

So, who’s on your holiday gift list this year? That list is a lot longer than you think; consider all the names of hackers that have not yet appeared on it. Scammers will do whatever it takes to get on your holiday gift list! Here’s how to keep these cyber thieves out of your pocket: Before purchasing from a small online merchant, see what the Be...

01 December 2015 /security

Robert Siciliano

How to pwn Anyone

Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you are on the Internet, no matter how infrequently you post on your Facebook page...

28 November 2015 /security

Robert Siciliano

Nineways to shop safely on Cyber Monday

With Cyber Monday, you don’t have to camp outside in the cold overnight so you can be the first person busting through the doors like on Black Friday. But you still may get trampled to a pulpby cyber scammers waiting for their prey. How can you avoid these predators? You know that old mantra: If it’s too good to be true, it probably is. Be highly ...

24 November 2015 /security

Robert Siciliano

What are Bug Bounties?

A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system. This is akin to giving a reward to a burglar for pointing out weaknesses in your home’s security. But whom better to ask than a burglar, right? Same with a company’s computer systems: The best expert may be the black hat...

20 November 2015 /security

Robert Siciliano

Medical Identity Theft can be deadly

Every time you have a medical procedure done, including routine checkups and treatment for minor issues, paperwork is generated. You should have copies of every single paper. This is one line of defense against medical identity theft. Review your paperwork thoroughly for unauthorized or duplicate charges, mistakes with diagnoses, dates, names, anyt...

18 November 2015 /security

Robert Siciliano

The World's First Biometric Password Lockdown App is here

It’s about time: a biometric for your smartphone that will change the way you think about biometric security. This revolutionary biometric comes from Biometric Signature ID and it’s called BioTect-ID, and though it’s a biometric, it does not involve any so-called invasiveness of collecting body part information. The world’s first biometric password...

17 November 2015 /security

Robert Siciliano

Best practices for BYOD data storage

The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment. A company manager or owner realizes that company use of employee mobile device...

16 November 2015 /security

Robert Siciliano

Infrastructures under attack

It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people. A report at bits.blogs.nytimes.com notes that foreign hackers have cracked into the U.S. Department of Energy’s networks 150 times; they...

11 November 2015 /security

Robert Siciliano

How to avoid Online Fundraising Scams

You’ve probably heard of the gofundme.com site, where all sorts of stories are posted of people seeking donations. Some are tragic, others are trite. You may be touched by a particular story, perhaps one in which an entire family is killed in a house fire. You click the “Donate Now” button and donate $50. So just how do you know that family who die...

10 November 2015 /security

Robert Siciliano

Fake IDs are everywhere

Okay, so you’re 18 or 19 and in college, and are stressed because you have to be 21 in order to gain entry to a night club or bar where you’d like to drink up a storm and mingle with a “more mature” crowd. Or really, you just want to meet someone. Life sure is tough, isn’t it? You have to wait till you’re 21, but by then…you may be graduated from c...

29 October 2015 /security

  • 1
  • 3
  • 4
  • 5
  • 6
  • 14

Robert writes about

  • artificial intelligence
  • security
  • payments
  • regulation & compliance
  • retail banking
  • identity

Robert's opinion archive

  • 2025 (2)
  • 2024 (3)
  • 2023 (10)
  • 2020 (5)
  • 2019 (11)
  • 2018 (21)
  • 2017 (7)
  • 2016 (28)
  • 2015 (73)
  • 2014 (71)
  • 2013 (51)
  • 2012 (43)
  • 2011 (72)
  • 2010 (129)

Robert reads

  • Twitter
  • LinkedIn
  • YouTube
  • My Website
ShowHide similar members

Similar members

Alon Refaeli

Alon Refaeli
Security Analyst at Secured Zones Technologies Ltd.

Follow Unfollow

Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.

Please read our Privacy Policy.

Accept
Finextra

Finextra

  • About

Community

  • Rules
  • Contact the community team

News

  • Guidance
  • Contact the news desk

Sales

  • Media pack
  • Contact the sales team

Get involved

  • Finextra Live@
  • Webinars
  • Finextra TV
  • Research
  • Finextra.jobs
  • Finextra Pro

Events

  • Sustainable Finance Live
  • NextGen Nordics
  • EBAday
  • NextGen:AI

Members

Join the community News alerts

Follow

Download Finextra Pro

Download Finextra Pro from Apple App Store Download Finextra Pro from Google App Store

Download Finextra News

Download Finextra News from Apple App Store Download Finextra News from Google App Store

© Finextra Research 2025

Terms of usePrivacy PolicyCookie Centre