Entries by Robert Siciliano

Be aware of Artificial Intelligence Voice Cloning

The proliferation of AI technologies like voice cloning and caller ID spoofing has opened up new avenues for fraudsters to exploit. By mimicking voices and masking their true caller identities, scammers can launch highly convincing social engineering attacks over the phone. This potent combination poses serious risks to individuals and organizations alike. However, we aren’t…

Surf Safely: Armoring Your Digital Life on Public Wi-Fi Waves

Protecting one’s data and devices on public Wi-Fi goes beyond protecting oneself on just the Wi-Fi aspect. Cyber security is holistic in its nature, meaning the devices hardware, software, and various forms of access control all need consideration. I hear all the time that criminal hackers are so “sophisticated”. I suppose they are, but what…

12 of the Nastiest Tax Scams and How to Prevent Them

Lets agree on this: Most of what’s written below will NEVER happen to you. Why? Because you are a subscriber to this newsletter and your propensity to consume security related content keeps you current on fraud prevention tactics. So, this means you have a responsibility as a security conscious citizen to spread the prevention message…

TOP 10 Vital Strategies for Healthcare (or ANY) Organizations to Prevent Ransomware Attacks

Change Healthcare, a major U.S. healthcare company, reportedly paid $22 million to the BlackCat ransomware group after a cyberattack disrupted services nationwide. However, the cybercriminal who facilitated the attack claims they were cheated out of their share of the ransom, leaving sensitive data intact. According to researchers, a hacker forum post suggested that UnitedHealth Group…

The Top 10 Tax Scams of 2024

1. Phishing Scams: Cybercriminals send fake emails or create fake websites pretending to be from the IRS or tax preparation companies. They often request personal information, such as Social Security numbers or financial details, which they then use for identity theft or fraudulent tax filings. 2. Identity Theft: This scam involves stealing someone’s personal information,…

Common Types of Mobile Cyber Attacks and How to Prevent them

With the ubiquity of people owning smartphones and having a growing dependence on them for e-commerce, it has become an attractive avenue for cybercrime. Security researchers report a 500% surge of mobile cyber attacks, as scammers try to steal bank details and passwords or even get full control of phones. However, other forms of mobile malware have invasive…

Prepare Your Digital Life Before You Die

In life as in business, we need to have contingency plans. That means backing up our back up and that means having a plan for when we expire. Nobody really wants to deal with that expire part. Nobody wants to address the fact that the clock is ticking. But you need to. Being in the…