Entries by Robert Siciliano

Get Smart─Lock Down Your Apps

Apps are what make smartphones smart. Without apps, smartphones would just be regular feature phones. Apps are what make our smartphones into our most personal computers. And like our computers, we need to protect our smartphones and apps. Some of the most commonly used apps on the Android platform such as Facebook, LinkedIn and Gmail…

Students Getting Cyberwise to Become Safe and Responsible Digital Citizens

Australian Prime Minister Julia Gillard unveils the new cyber education module, which was developed in partnership with McAfee and Life Education Australia. This module expands the Life Education Program that is for primary school children across Australia.                     A study called “The Secret Life of Teens 2012 report,” (conducted by TNS…

What Security Challenges to Focus on in the New Year

In 2012, security challenges we faced were often the ribbon cuttings and business plans that startup criminal organizations launched. In 2013, those criminal enterprise business plans will come together—and we need to be ready. Social media is high on criminal hackers radar. Criminals scan social media looking for people who they can scam. One such…

What We Learned About Digital Security In 2012

Sometimes it’s the worst things that can happen that become the eye-opening best things that effect positive change. The year 2012 saw numerous high-profile data breaches, epic hacks, full-on hacktivism and lots of major identity theft ring busts. The best news is the public is more aware, which means they are better equipped to protect…

10,000+ Identity Theft Rings In The U.S.

Identity theft is the easiest crime to commit and the hardest crime to get caught for. It has been said numerous times that identity theft is the closest we’ve ever come to the perfect crime.  This explains why a recent study by ID Analytics found more than 10,000 identity fraud rings in the U.S.  An…

What’s on Your Phone? A Lot More than You Realize.

It’s funny to me that when having conversations about technology people still don’t see the parallel between their smartphone and their computer. Today, smartphone are connected to the Internet and have much of the same information as the personal computer, if not more. Now Androids and other smartphones have become little mini handheld computers. Carriers…

What Can We Expect in 2013?

The cybercrime landscape is always growing and changing as hackers look for new ways to make money from us. And 2012 was no different as McAfee Labs™ found huge growth in malicious software and activities. As the year closes, McAfee Labs looks ahead to see what is on the horizon for 2013. Here’s the areas…

Why Elderly Are Targeted By Scammers

It has long been believed that elderly, which depending on your definition, are people over the age of 60 years old, are targeted by scammers due to their generations naïve upbringing. But from my perspective, a 65 year old grew up in the 60’s and there’s nothing naïve about the Vietnam war/Woodstock generation. My dad’s…