Entries by Robert Siciliano

Healthcare Workers Indicted for Identity Theft

A wise man once said, “Beware of false prophets, which come to you in sheep’s clothing, but inwardly they are ravening wolves.” The wolf in sheep’s clothing refers to someone in a role contrary to his or her character and with whom contact is dangerous. In other words, sometimes it’s the people we trust the…

Do You Know Who’s Spying on You?

There have multiple revelations about government agencies spying on their citizens, which, frankly, should come as no surprise. But there are also several others who are also spying on you, and often you’ve given them permission to do so. Hackers: Routers can be hacked if not properly secured. Spyware can be installed if your PC…

15 Tips to Prevent Identity Theft

There at least 99 things to know about how to prevent identity theft. Below is a good starting point. Tips: Watch your bank accounts online and examine your statements frequently. Opt out of preapproved credit cards. Go to https://www.optoutprescreen.com/?rf=t to get started. Check your credit for free at https://www.annualcreditreport.com/cra/index.jsp. You can do this up to…

Security Measures for the Wealthy vs. for the Rest of Us

“Wealthy,” by some standards, might mean being in the top one percent of earners today in the US, which is $370,000 a year. Otherwise, the “bottom” 95 percent is making less than $150,000 a year, and then 75 percent of the population makes less than $66,000 a year. Depressed? Sorry; the point of this post…

Contactless Challenge Revisited: Final Thoughts

The Gemalto Contactless Challenge kicked off in the United States June 10th, with two bloggers from Austin, Texas and Salt Lake City, Utah, respectively, putting contactless payment infrastructure to the test. The Isis Consortium of AT&T, T-Mobile and Verizon Wireless chose Austin and Salt Lake City to pilot its mobile wallet using near field communication…

Your Government Can’t Protect You From Identity Theft

I’ve always marveled at the law enforcement motto, “To Serve and Protect.” While honorable, it’s essentially a slogan that presents our government representatives’ best intentions because in reality they can’t proactively 100 percent protect us the way we believe or expect them to do so. “Where’s a cop when you need one?” people say. But…

Caller ID Spoofing Effective in Identity Theft

Caller ID spoofing is when a telephone’s caller ID displays a number that does not belong to the person calling. The telephone network is tricked into displaying this spoofed number as a result of flaws in caller ID technology. Caller ID spoofing can look like the call is coming from any phone number. People inherently trust…

Will Obamacare Lead to Identity Theft?

The fear mongers and Obamacare haters make a scary point and want you to know that as soon as the Patient Protection and Affordable Care Act goes live, your identity will be at risk and, more than likely, stolen. Forbes reports in regard to what’s called the Obamacare-mandated “data hub” in which personal records are…

10 Ways to Protect Your Twitter Account From Getting Hacked

Recent news of Twitter accounts being hacked has slowed a bit, partly due to Twitter implementing two-factor authentication. When you sign in to Twitter.com, there’s an option in “Settings” under “Account security” for a second check to require a verification code to make sure it’s really you. You’ll be asked to register a verified phone number and…

Getting Cybersmart and Staying Dutifully Employed

Knowing what I know today, if a 15-year-old asked me what she should be when she grows up, I’d say cybersecurity professional. The unfortunate fact is that bad guys are everywhere—and if you are in the security industry, bad guys are good for business. There are many ways and resources for people, especially young adults,…