Entries by Robert Siciliano

How to pwn Anyone

Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you are on the Internet, no matter how infrequently…

What’s in a Bugout Bag

There’s a name for the survival sack that you take with you outdoors in the event of survival emergency: bugout bag. Let’s start with the key components to net a three-day survival: Water: one liter per person per day Food: “energy bars” or backpack meals Small pot or large cup (though if you have only…

Phishing works and here’s why

A phishing e-mail is sent by a cyberthief to trick its recipient into revealing sensitive information so that the crook could steal money from the recipient or gain access to a business’s classified information. One way to lure an employee is for the crook to make the e-mail appear like it was sent by the…

Is that Viral Story real?

The Internet has almost as many videos as there are stars in the heavens. And you know that some have to be hoaxes. Sometimes it’s obvious, while other times it’s easy to be fooled. For example, the hoax of the “angel” intercepting a truck just about to run over a bicyclist is obviously fake. Isn’t…

Nineways to shop safely on Cyber Monday

With Cyber Monday, you don’t have to camp outside in the cold overnight so you can be the first person busting through the doors like on Black Friday. But you still may get trampled to a pulpby cyber scammers waiting for their prey. How can you avoid these predators? You know that old mantra: If…

How to store Water for Survival

What do you really know about water storage? Below you’ll find information that you probably never even thought of before, or information that contradicts what you’ve always believed to be correct. Storage barrels. These can remain on cellar or basement cement that’s not heated. Cooler cement will not transfer toxins into the barrels. However, garage…

Introducing the very first Biometric Password Lockdown App

This application for your mobile device will change things in a huge way: Locks down smartphones with a finger-based biometric password Multi-factor authentication all-in-one It’s called BioTect-ID And why should you consider the world’s first biometric password for your mobile device? Because most smartphone security devices have been cracked by cyber thieves. Layers of protecting…

What are Bug Bounties?

A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system. This is akin to giving a reward to a burglar for pointing out weaknesses in your home’s security. But whom better to ask than a burglar, right? Same with a company’s computer systems:…

17 ways to prevent identity theft when traveling

There should be more TV commercials for preventing identity theft—it’s nearly epidemic. But also epidemic is the lack of identity security that people have when traveling. Here are some ways to avoid having your identity stolen while traveling: Prior to leaving for your trip, clean out your purse and wallet. Figure out what you really…

Why you want a Copy of your Medical Records

After receiving medical treatment, many people never look over the paperwork (save for bill total) and just shove it into some folder in a file cabinet. But medical identity theft is very much out there; know the signs: You’re denied coverage because you allegedly have a condition you were never diagnosed with. A collection agency…