Entries by Robert Siciliano

What Security Benefits Does Contactless Technology Offer?

Contactless technology offers many benefits, including faster and easier transactions, versatility to be incorporated into various personal devices including mobile phones, and improved data security over the magnetic stripe technology. According to the Smart Card Alliance, “Contactless smart card technology includes strong security features optimized for applications involving payment and identities. Every day tens of…

Phishing Remains Popular and Effective

Phishing, where a scammer sends an email that appears to come from a trusted source in order to trick recipients into clicking malicious links, has been around for quite a while now. Although phishing has become fairly well known, the scam continues to be a successful and widely used as a method of stealing bank…

Where Will I See Contactless Technology in My Everyday Life?

As contactless technology embeds itself into the fabric of everyday transactions all over the world, numerous industries are fine-tuning integration of this latest payment technology into their operations. Employee Badges: Organizations all over the world are using contactless technology to verify individuals’ authenticity before granting access to a restricted facility, computer system, or electronic device.…

“Operation High Roller” Makes Banks Cringe

According to a McAfee and Guardian Analytics report dubbed “operation High Roller,” an international ring of cybercriminals has been attacking banks around the world. They have been siphoning roughly $78 million from bank accounts in Columbia, Germany, Italy, the Netherlands, the United Kingdom and the U.S. In the report, McAfee Director of Advanced Research and Threat Intelligence…

Protect Your Facebook Photos

Imagine you have a baby and want to share your newborn’s photos with your Facebook friends and family all across the country. You snap the pictures and post and receive lots of fun and exciting feedback. Then a week later you are scanning Craigslist to buy some second hand baby stuff like strollers and maybe…

What is Contactless Technology?

“Contactless” refers to technology embedded in a personal device — typically a mobile phone, key fob, credit card, or access card — that transmits your data to another device from a distance of a few inches in order to complete a transaction. Transactions involving data transfer have traditionally involved plastic cards with a magnetic stripe…

How the Rich and Famous Prevent Identity Theft

Despite what you may assume, most celebrities and other extremely wealthy individuals do not relish living in a fish bowl, with every move scrutinized. While some certainly do flaunt their wealth, the vast majority do not want you dropping by their home or following them into the bathroom. The average people who post their whereabouts…

Mobile Security: Tips for Using Personal Devices at Work

Businesses in all forms operate under numerous business regulations. Small businesses such as finance healthcare, or one where a fine might be imposed if a data breach occurred need to recognize mobile security as a fundamental layer of yours or your company’s information security process. Mobiles are smartphones and used for ecommerce for consumers and…

Technology Fuels Cyberbullying and Cheating in Teens

McAfee’s study “The Digital Divide: How the Online Behavior of Teens is Getting Past Parents” shows an alarming 70% of teens have hidden their online behavior from their parents, up from 45% in 2010. And yet half of parents live under the assumption that their teen tells them everything he/she does online. The school year is now upon us.…