Entries by Robert Siciliano

What is Sextortion?

A Massachusetts man is on trial. His crime? Stalking. But, it’s probably not what you think. The 48-year-old was chatting and sharing photos with a 16-year-old girl, and these chats and photos were “sexual in nature.” The pair met on social media, and when the girl asked to stop these exchanges, the man threatened to…

How to Make $5 Million a Day in Cybercrime

This post isn’t exactly a “how to” but if your current employment isn’t bringing in the bacon, I’m sure your criminal mind can figure it out. In the biggest digital advertising fraud in the history of the U.S., it was recently found that a group of hackers is bringing in from $3 million to $5…

Survive Falling Through Ice

It can be truly terrifying to fall through ice on a frozen lake, but if you remain calm, it can save your life. Most people don’t realize that you have more time than you think, according to experts. This is due to the concept of thermoregulation and how your body deals with the shocking cold…

Home Door Kick-in Prevention

Burglars love doors, because that’s their No. 1 way of gaining entry to a house. When thinking of ways to make your home safer, you should really home in on your doors. Solid wood door without a window (ideally with solid wood core) Top flight deadbolt (ideally two) Reinforced frame and doorjamb The above elements…

Desperate Teens Turning to Prostitution and Drug Dealing to Survive

Teenagers across the country are falling into drug dealing, theft, and prostitution in order to eat. This, according to a recent study, which found that poverty has been increasing throughout the U.S. Researchers at the Urban Institute in Washington, D.C. have taken a close look at the current Census data, and this group estimates that…

Fake News is Becoming Too Real

Fake news is a problem that is taking the internet by storm, and it ran rampant during the 2016 Presidential Election. In fact, many believe that fake news stories had a strong impact on the outcome of the election. In a survey following the election by the Pew Research Center, a whopping 64 percent of…

Top 3 Social Engineering Scams

Think about hackers breaking into accounts. If you think they need top-notch computer skills, you would be wrong. These days, instead of requiring skills behind a keyboard, hackers generally rely on strategy…specifically a strategy called social engineering. This means that hackers don’t have to be technical, but they DO have to be clever and crafty…

Small Business a favorite Attack Vector

Small businesses are hardly immune to attacks by hackers. The illusion of low attack risks comes from the publicity that only huge corporations get when they are breached, like Target, Sony and Anthem. These are giants, so of course it makes headline news. But when a “ma and pa” business gets attacked, it’s not newsworthy.…