Entries by Robert Siciliano

Shoring Up National Cyber Security Infrastructure

The wild, wild web is the most exciting, alluring, and all-around awesome thing available to us today. It’s also something we have come to rely on to a fault. And that’s a little scary. The Internet is a decentralized wilderness, used by billions of devices worldwide. Joe Lieberman, chairman of the Homeland Security and Governmental…

One In Seven Social Security Numbers Are Shared

More than 20 million Americans have multiple Social Security numbers (SSNs) associated with their name in commercial records according to a new study announced in December from ID Analytics, Inc. The study found that rather than serving as a unique identifier, more than 40 million SSNs are associated with multiple people. 6.1 percent of Americans have…

Online Credit Applications Ripe For Fraud

We currently rely on easily counterfeited identification, and we transmit credit card applications using the phone, fax, Internet, or snail mail, all of which are relatively anonymous methods. Fraudulent credit card applications are the most lucrative form of credit card fraud. Identity thieves love credit cards because they are the easiest accounts to open, and…

Lost or Stolen Mobile Can Lead to Identity Theft

We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out of pockets and bags all the time. I’m one of those people that’s so smart, I’m stupid and absent  minded when it comes to my stuff. Where’s my wallet, where my keys, where’s my phone?…

Identity Theft Strikes Local Couple – Again

When someone works under your name, it can cause lots of headaches and sometimes results in financial loss. One common loss is the time lost in clearing up the employment fraud, and as we know, time is money. Lancasteronline.com reports that when a couple applied for public assistance at a local government office, they discovered…

Survey Shows “Account Takeover Fraud” Drops

Account takeover happens when your existing bank or credit card accounts are infiltrated and money is siphoned out. A hacked account or stolen credit card is often to blame. The drop in account takeover may be due in part to a few different things. Less breaches. There was a drop in data breaches from 221…

Donate To A Trusted Cause This Winter

Just appease me on this post. Please. Can you call yourself a “philanthropist”? The definition of philanthropy is “a friend to humanity”.  Are you a friend to humanity? Are you? Think about it. If you’ve never watched Schindlers List, or haven’t watched it in the past 10 years, do what you need to consume this…

Home Security Isn’t Conformity

In a recent post I discussed an opportunity I had working with a TV journalist on home security. When we discussed “signage” as a layer of protection I recommended he install some in addition to the existing home alarm that he has. A “Beware of Dog” sign is a favorite of mine. He responded by…