Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Business Identity Theft Beware of Identity Thieving Employees

Wow, a lawyer in Memphis got scammed by his secretary—she embezzled over $362,000 from him, says an article on wreg.com. Attorney Jerry Schatz hired Teresa Sumpter, 48, in July of 2013. Little did he ...

31 Dec 2015
Robert Siciliano

Stop being a blabber on Social Media

Are you a cyber-blabber? Even a post about your daily afternoon foray to the sub sandwich shop could get you in trouble: A burglar reading this knows when to rob your house. But it doesn’t end there. ...

24 Dec 2015
Robert Siciliano

Should Stalking or Spying Apps be banned?

The words “spying” and “stalking” have negative connotations, but there’s a flipside to the coin: parents monitoring their kids’ online activities and physical locations. And how about middle-aged adu...

20 Dec 2015
Robert Siciliano

20 Security Tips For Overseas Travelers With Credit Cards

Thinking of bringing a credit card with you on your travels? You can end up in a jam: You just treated your extended family to fine dining in France. Time to pay; your credit card is declined. If you ...

16 Dec 2015
Robert Siciliano

8 ways to avoid holiday shopping scams

So what will you be doing this holiday season to avoid getting scammed? The scammers really come out of the woodwork during the holidays, waiting to snatch their victims. It’s easier than you think to...

10 Dec 2015
Robert Siciliano

8 Ways to Ensure Safe and Secure Online Shopping this Holiday Season

So, who’s on your holiday gift list this year? That list is a lot longer than you think; consider all the names of hackers that have not yet appeared on it. Scammers will do whatever it takes to get o...

01 Dec 2015
Robert Siciliano

How to pwn Anyone

Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacki...

28 Nov 2015
Robert Siciliano

What are Bug Bounties?

A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system. This is akin to giving a reward to a burglar for pointing out weakness...

20 Nov 2015
Robert Siciliano

Best practices for BYOD data storage

The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means ...

16 Nov 2015
Robert Siciliano

Infrastructures under attack

It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murd...

11 Nov 2015
Robert Siciliano

How Passwords Get Hacked

If I wanted to crack one of your passwords, I could probably make a series of educated guesses and get pretty close. Why? Because people tend to stick with simple, easy to remember passwords, but thes...

26 Oct 2015
Robert Siciliano

Dept. of Homeland Security Computers Vulnerable

There’s a problem on the home front: security lapses in the computers of the Secret Service and Immigration and Customs Enforcement, says a report on townhall.com. These departments were recently audi...

25 Oct 2015

Now hiring