Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Retired Member

Encryption used in most GSM networks cracked and available

I didn't get to wait until the New Year for those GSM mobile phone conversations and phone banking sessions to become even more accessible to criminals (it is unlawful to intercept mobile communicatio...

31 Dec 2009
Whatever...
Robert Siciliano

Expanding Internet Capabilities Makes U.S. Vulnerable

The FBI considers the cyber threat against our nation to be one of the greatest concerns of the 21st century. Steven R. Chabinsky is deputy assistant director of the cyber division of the Federal Bure...

29 Dec 2009
Robert Siciliano

Russian Hackers Make Millions Breaching ATMs

It started simply by hacking 7-Elevens public website using a SQL injection. SQL is abbreviation of Structured Query Language. Pronounced ”Ess Que El” or ”Sequel” depending on who you ask. This l...

28 Dec 2009
Robert Siciliano

U.S. Cyber Challenge to Defeat Criminal Identity Theft

President Obama has chimed in with a directive to review the nations cyber security as it relates to security and our critical infrastructures. CNN recently reported about the “U.S. Cyber Challenge”...

28 Dec 2009
Robert Siciliano

The Feast of the 7 Phishes

Being a “Siciliano” and having roots in Italy, namely Sicily, the little island at the bottom of the boot, we have a tradition where we celebrate “the vigil” (La Vigilia), with a Feast of the Seven Fi...

23 Dec 2009
Robert Siciliano

Craigslist ATM I bought Causes Industry Stir

Apparently I raised a hackle or two. Seems my little stunt got the attention of industry insiders, and not all of them believe that I bought a used ATM on Craigslist, which turned out to contain tho...

22 Dec 2009
Robert Siciliano

Lack of Laptop Security Leads to Identity Theft

In 2003, an estimated 1.5 million laptops were stolen worldwide. Today, that number has climbed to 2.6 million. That’s a 70% increase in just a few years. That’s one stolen laptop every 12 seconds. La...

22 Dec 2009
Uri Rivner

The Russians Love Their PCs Too

The Russians song by Sting was released in 1985, a year after Tom Clancy’s Hunt for Red October. No one could have guessed that within a couple of years, Perestroika and Glasnost would begin to defree...

18 Dec 2009
Online Banking
Robert Siciliano

Identity Theft 2010 Top 10 Predictions

The Identity Theft Resource Center® (ITRC) and Robert Siciliano (me) have joined forces to expand the pool of knowledge about identity theft issues. As nationally recognized experts in this crime, we ...

18 Dec 2009
Robert Siciliano

Facebook Newest Portal for Social Media Identity Theft

Imagine trying to log into your online accounts one after the other and being locked out. At first you think the site you are visiting screwed up but then it keeps happening over and over again no mat...

15 Dec 2009
Robert Siciliano

Child Identity Theft Protection

In a blog I guest contribute to called “NextAdvisor” they offer the following advice on child identity theft protection: The following post in our Reader Question series is an actual user submitted qu...

15 Dec 2009
Robert Siciliano

Merchant Credit Card Transaction Monitoring

Security professionals intuitively think proactively. Our job is to predict and prevent what the bad guy will do next. My job specifically is to instill this mindset into you, the consumer, SMB or ...

12 Dec 2009