Entries by Robert Siciliano

Time to check your Facebook Privacy settings

Did you know that, once again, Facebook has changed its privacy policies? At the top of the FB page is a lock icon. Click it for more privacy settings. What do visitors see? To view how visitors see your Facebook page, go to “Timeline and Tagging,” then hit “Review what other people see on your…

How Hackers use LinkedIn to Scam

Hackers love LinkedIn because it links them in—straight through the portal of the targeted company. Geez, how much easier could this be, what with all the publically-exposed e-mail addresses of key players (and also worker bees) in big companies that someone wants to hack. An article on blog.sungardas.com was written by a white-hatter (his job…

How Employers or Parents Spy

Disgruntled employees act out in lots of ways. A guy I knew who hated his boss “played” on his work computer all day. The computer was strictly for constructing company graphics. But he installed all kinds of games and wasted lots of time. His boss never knew he blew off half the day. Company computers…

Distracted Teen Drivers a Mess

Worried about your teen causing a car accident from drinking too much? How about from being distracted too much? According to the AAA Foundation for Traffic Safety, distracted driving accounted for 58 percent of medium to severe wrecks involving teenagers, based on analysis of about 1,700 videos. The study involved collaboration with the University of…

Myths Facts and Burglary Prevention

Myth: Most burglaries occur at night when nobody can see the intruder. Fact: Most burglaries occur during the day because criminals know that’s the most likely time that people are away at work. Myth: Most burglaries are random and spontaneous. Fact: Most burglaries occur after the thief has “cased” a residence and pre-meditated an intrusion…

25 Home Security Tips

Yes, 25 tips, because that’s how we roll. No home security tip is too trite. They are all important, especially when used all at once, all the time. Keep shrubs and trees manicured so that burglars can’t hide near them. Do a door and lock inventory to make sure they all work. The only time…

Consumers sacrificing Privacy for Convenience

It’s hard to believe that, according to a recent poll from the Pew Research Center, most Americans aren’t too upset that the government can track their e-mails and phone calls. There’s too much of a blasé attitude, it seems, with people thinking, “I don’t care if I’m monitored; I have nothing to hide.” This blows…

Beware every time the Phone rings

Don’t assume you’ll never be targeted by phone scammers just because you don’t have a cell phone; they continue to feast on landline users, especially those over 50. “This is the IRS…” Drill this into your head: The IRS never calls to collect back taxes. NEVER. A common ploy is to threaten that the listener…

3 Ways We are Tricked into Cyber Attacks

So just how are hackers able to penetrate all these huge businesses? Look no further than employee behavior—not an inside job, but innocent employees being tricked by the hacker. A recent survey commissioned by Intel Security reveals that five of the top seven reasons that a company gets hacked are due to employee actions. One of the…