Entries by Robert Siciliano

Hackers: The Good, The Bad and The Money

The term Hacker was made popular by Steven Levy in his book “Hackers: Heroes Of The Computer The Revolution” published in 1984 was about those brilliant and eccentric nerds from the late 1950s through the early ’80s who took risks, bent the rules, and pushed the world in a radical new direction.   In the…

The Seedy Site of Web Searches

Ever seek out information online and end up somewhere you never meant to go? I’m not talking about some website that didn’t have what you were looking for, I’m talking about a website that you REALLY didn’t want to go to or would never go to. This is the dark side of the Net. Think…

Bieber Fever Results In Fraudulent Ticket Sales

Bieber Fever is a sickness that has recently become more common, where a kid is extremely obsessed with Justin Bieber, and everything related to him. The act, or disease is most commonly found in girls, but occasionally a guy or two. Example: Girl- Dude omgomgomgomgomg i loooooove Justin Bieber he doesn’t know it yet but…

FBI: Focusing on Hackers and Intrusions

Your tax dollars are being put to work in ways to secure your bank accounts and our critical infrastructure. But there’s still more work to do. The FBI reports Early last year, hackers were discovered embedding malicious software in two million computers, opening a virtual door for criminals to rifle through users’ valuable personal and…

Top 13 Halloween Safety Tips

The fall is here and Halloween is right around the corner. Fortunately for me I have two kids which means I’m going trick or treating and eating 20lbs of chocolate on November 1st.  Don’t worry I’ll give them a few pieces! To prepare you and your family for a safe and secure Halloween follow these…

Cybersecurity Matters in The Election

The term “cyberattack” or cyberwarfare is defined as “politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation.” “Weapons of Mass Disruption” are a growing concern. The U.S. and many…

Social Media Security in the Workplace

Why someone would set up a fake social media profile? The answer correlates with news of cyber-attacks on businesses and other organizations being targeted with advanced persistent threats which has risen sharply over the past two years. The Register reports “Social engineering via platforms such as Facebook can be one of the early stages of…

Your Rights To Online Privacy

“Americans have always cherished our privacy. From the birth of our republic, we assured ourselves protection against unlawful intrusion into our homes and our personal papers. At the same time, we set up a postal system to enable citizens all over the new nation to engage in commerce and political discourse. Soon after, Congress made…

Internet Privacy Tools for Online Safety

Drug dealers, child pornographers, terrorists and criminal hackers, are often sharing the same Internet privacy tools as law enforcement, domestic violence victims and citizens of oppressive governments who most likely use a “darknet” which is an anonymous secret internet designed to cover their tracks and protect them from internet surveillance. The “darknet” is used by…