Join the Community

23,247
Expert opinions
43,779
Total members
372
New members (last 30 days)
182
New opinions (last 30 days)
29,055
Total comments

Latest expert opinions

clear
clear

73 Results from 2015

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Business Identity Theft Beware of Identity Thieving Employees

Wow, a lawyer in Memphis got scammed by his secretary—she embezzled over $362,000 from him, says an article on wreg.com. Attorney Jerry Schatz hired Teresa Sumpter, 48, in July of 2013. Little did he know that his assistant would end up stealing checks from his trust account, forging her signature on them, and opening three credit cards—all in his ...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Stop being a blabber on Social Media

Are you a cyber-blabber? Even a post about your daily afternoon foray to the sub sandwich shop could get you in trouble: A burglar reading this knows when to rob your house. But it doesn’t end there. STOP THE MADNESS! The Giants: Facebook and Twitter Be careful what you post on Facebook and tweet about. It can be used against you in court, even so...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Should Stalking or Spying Apps be banned?

The words “spying” and “stalking” have negative connotations, but there’s a flipside to the coin: parents monitoring their kids’ online activities and physical locations. And how about middle-aged adults keeping track of the whereabouts of their aged parents with dementia? If you fear that apps for “spying” might get banned, here’s bad news: U.S. ...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

20 Security Tips For Overseas Travelers With Credit Cards

Thinking of bringing a credit card with you on your travels? You can end up in a jam: You just treated your extended family to fine dining in France. Time to pay; your credit card is declined. If you try to make a purchase overseas, your credit card company might think it’s fraudulent, since it would appear anomalous, relative to your usual, U.S. p...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

8 ways to avoid holiday shopping scams

So what will you be doing this holiday season to avoid getting scammed? The scammers really come out of the woodwork during the holidays, waiting to snatch their victims. It’s easier than you think to avoid getting ripped off or getting your entire bank account sucked dry. Here’s how to avoid getting tangled in a scammer’s net: Always inspect eve...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

8 Ways to Ensure Safe and Secure Online Shopping this Holiday Season

So, who’s on your holiday gift list this year? That list is a lot longer than you think; consider all the names of hackers that have not yet appeared on it. Scammers will do whatever it takes to get on your holiday gift list! Here’s how to keep these cyber thieves out of your pocket: Before purchasing from a small online merchant, see what the Be...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How to pwn Anyone

Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you are on the Internet, no matter how infrequently you post on your Facebook page...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What are Bug Bounties?

A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system. This is akin to giving a reward to a burglar for pointing out weaknesses in your home’s security. But whom better to ask than a burglar, right? Same with a company’s computer systems: The best expert may be the black hat...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Best practices for BYOD data storage

The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment. A company manager or owner realizes that company use of employee mobile device...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Infrastructures under attack

It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people. A report at bits.blogs.nytimes.com notes that foreign hackers have cracked into the U.S. Department of Energy’s networks 150 times; they...

/security

Now Hiring