Entries by Robert Siciliano

Reporter’s Identity Stolen

It doesn’t matter if you are young or old, rich or poor, if you have good credit or bad credit, pay with cash or credit card, whether or not you use the Internet, or even own a computer. You can be a maintenance worker or a scientist. It doesn’t matter. Whether you are alive or…

Beauty Queen Guns Down Home Invader

An ex-con picked the wrong home to invade. Imagine you’re in bed counting sheep dreaming of clouds and flying unicorns. Suddenly there is a knock on the door, which is startling to most people who wake up to the presence of noise and especially that of a knock at 3am. In your discombobulated state you…

Butler Charged With Home Invasion

Every time I ask my butler to take out the trash or get me some Grey Poupon mustard he gives me lip. I’ve relegated him to cleaning my Bentley every day with a tooth brush. When people think about protecting themselves from the bad guy, they mostly think about a stranger, someone not known to…

Back Up Your Backup, Then Back Up Again!

If you aren’t in the habit of backing up your data, you might assume that it’s difficult or tedious. But I’ve got news for you, it’s easy-peasy. Nowadays, backing up is a complete no brainer. There are many backup options. New PCs often come bundled with backup options included in the “bloat ware.” Microsoft Windows…

What Identity Theft Protection Looks Like

You hear a lot about identity theft protection these days. But what does it look like? I’ve subscribed to no less than six different services in the last decade. Most of them make their presence felt in the form of a charge on your credit card statement, and that’s about it. One thing I like…

My Top 5 Mobile Commerce Apps

The day when your wallet becomes a relic, like an 8-track tape, isn’t here quite yet. But we are getting close. Thinning out your wallet isn’t just nice for your pants pocket. It’s also a good way to minimize your risk for identity theft, should your wallet ever be lost or stolen. As long as…

Mobile Phone Operating System Insecurity

As more online retailers introduce mobile ecommerce applications, criminal hackers are taking notice. Existing mobile operating systems are under attack and, like standard PC operating systems, they sometimes fail to provide the necessary security to support a payment application. Current research is primarily geared towards securing mobile payments, but there is a lack of coordination…

Phishers Using Holidays and Social Media to Target

Recent reports of “The Oak Ridge National Laboratory, home to one of the world’s most powerful supercomputers, has been forced to shut down its email systems and all Internet access for employees since late last Friday, following a sophisticated cyberattack.” The sophisticated cyber attack was reported to be the lowly unsophisticated phishing email. Phishing is…

Pickpockets, a Dying Breed

If there were a criminal hall of fame with an award for the coolest criminal, it would have to go to the pickpocket. Pickpockets are sneaky creatures who manage to function exactly one degree below the radar. Pickpockets whisper through society, undetected and undeterred. They are subtle and brazen at the same time. They are…