Entries by Robert Siciliano

Home Security begins at the Entrance

If you were to design the ultimate security system for a house, what would you focus on? These days, many people would immediately think in terms of the most technologically advanced alarm system—one that’s voice activated, detects motion anywhere, can be remotely controlled and allows remote viewing of the home, etc. But even in this…

Inside the Business E-mail Compromise Scam

Trick e-mail = fraudulent wire transfer = hundreds of thousands to millions of dollars stolen. That’s what’s happening with business executives in select industries (e.g., chemical operations, manufacturing), says a report at threatpost.com, citing a finding from Dell SecureWorks. The phishing e-mails are part of those Nigerian scams you’ve heard so much about, a business…

Why go with a Wireless Security System?

One reason to go wireless is obvious: Who wants all sorts of wires built under their house, which requires more than just the abilities of a recreational DIY enthusiast, like the old fashioned home security systems required? Not only is this a hairy, time consuming installation project, but a crook could clip the wires (if…

Case allows Employees to run amok on Social Media

Lesson learned: If you run a fast-food restaurant or any company for that matter, you’d better treat your employees right. After all, they have a legal right to tweet all they want about you. A Chipotle Mexican Grill in Havertown, PA, had a ban in place: Employees are prohibited from using social media to spread…

Pokemon Go a Network Malware Nightmare

Pokémon Go has taken the world by storm, even though it is nothing more than a silly little game that people play on their mobile device. And it is not just child’s play, either. Plenty of adults are hooked on Pokémon Go—including college degreed professionals who conduct business on company owned devices as well as…

Computers perfectly forge Handwriting

Handwriting analysts really have their work cut out from them now, thanks to the development of new software that can forge—better than a human can—a person’s handwriting. So if you are worried about identity theft, add one more element to the kettle: a crook getting ahold of this software (developed at the University College London)…

Ransomware a $2.5 Million Service

One bitcoin = $590. If you’re sucked into a ransomware scam, you’ll likely be charged at least one bitcoin for the cyber key to unlock your computer’s files—that are being held hostage by hackers. A report from Check Point Software Technologies and IntSights has discovered a gigantic ransomware-as-a-service (RaaS) ring, raking in $2.5 million yearly.…

Jihadis using easy to get Privacy Software

Over the past two years, the media has tended to sensationalize jihadists’ rapid adoption and strategic use of social media. Despite perpetual news coverage on the issue, the public, by and large, continues to be relatively in the dark about the intricate ways in which many jihadists maintain robust yet secretive online presences. To accomplish…

Man raises a Family on Dead Man’s Stolen Identity

Imagine you learn your husband (or wife) of 25 years is really a different person. That’s what happened to Mary Hickman—25 years after she married a man who had identified himself all those years back as Terry Jude Symansky. The Florida couple had a son and lead an uneventful life, with Symansky working different jobs…

What age is it OK to leave Kids home alone?

Sooner or later, you’ll need to leave your child home—unsupervised, alone—for an extended period. And even though you may have smart devices to keep a constant check on your child, this doesn’t mean you can instantly teleport home in the event your smart security system relays a realtime video of a kitchen fire. It’s one…