Entries by Robert Siciliano

Privacy Laws for Kids Online

Numerous privacy groups are urging the FTC to update its Children’s Online Privacy Protection Act of 1998. The primary goal of the Children’s Online Privacy Protection Act, or COPPA, is to give parents control over what information is collected from their children online and how such information may be used. Jeff Chester, Executive Director of…

Do You Really Need Identity Theft Protection?

I see plenty of articles disclaiming any form of identity theft protection and the related expenses. They have titles like, “Identity Theft Protection Doesn’t Work,” or, “Poor Man’s Guide to Identity Theft Protection.” Most of these articles have some degree of merit, but they usually miss the point. The fact is, you can’t protect yourself…

Using Honeypots to Better Understand Security

When you think “honeypot,” images of that lovable furry bear, Winnie the Pooh, may come to mind. Pooh loved him some honey. And whenever he stumbled upon a pot of honey, he gorged himself on that sugary goodness until he passed out. Yum. But in technology terms, a honeypot is a trap set to detect,…

Are Contactless Payment Methods Secure?

“Contactless,” in this context, refers to the use of a wireless device. A payment is contactless when, instead of inserting your credit or debit card, you hold your card or keychain device within a few inches of the terminal, and your payment information is sent and processed wirelessly. Contactless payments offer a faster and more…

Mobile Phone Spyware Resellers Arrested

Spyware is sold legally in the United States. This software records chats, emails, websites visited, usernames and passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file that can then be accessed remotely. This is all perfectly legal as long as the PC’s owner is…

National Strategy for Online Identification

The Internet has become a fundamental aspect of most of our lives. It goes beyond social media, online shopping, and banking. Critical infrastructures like water, sewer, electricity, and even our roadways all rely on the Internet to some degree. The Internet’s weak link is the difficulty in reliably identifying individuals. When online, our identities are…

Travel Security and Identity Theft Scams

Traveling for business or pleasure is hectic, unnerving, not at all glamorous and often draining. Often, we say we need a vacation after a vacation. And when traveling, the last thing you need is to be ripped off. Things to consider: Hotel Rooms Hotel rooms are not secure. Just last week I entered a hotel…