Entries by Robert Siciliano

5 Online Security Tips You need to know

It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate. Passwords Being that cyber crime has been a fixture of modern living for over a decade, you’d think that everyone and his brother would know to use strong, long passwords, and a different password for each…

Town sees Big Spike in Burglaries

Why are so many burglaries hounding the town of Los Altos in California? There were 79 reported in 2013, but 118 for 2014. This past January and February there were 36. At that rate, by Christmas 2015, it’s unthinkable what the total number of burglaries will be. In a report on mercurynews.com, the Los Altos…

Paralyzed Home Invasion Victim speaks

If a home invasion doesn’t leave you dead, it might leave you permanently paralyzed, like it did Richard Potorski, who was shot two years ago and can’t move from the chest down. On January 8, 2013, Potorski went to his Maine home for lunch after work. Moments later he saw a gun pointing at him;…

6 Ways to halt Online Tracking

“On the Internet, you can be ANYBODY!” Not quite. Remaining anonymous in cyber space isn’t as easy as it used to be. Your browsing habits can be tracked, leading to your true identity. But there are things you can do to remain as anonymous as possible. Don’t feel you must use your full, real name…

Lost your Master Password, do This

You have a master password, from your password manager, for 28 accounts. Life has been so easy since! But then you lose this master password. First off, you can’t fix this like you would if you forgot your password for PayPal or your credit card’s site. Plus, each password manager service has a different solution.…

What is a Virus?

Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses, varicella replicates itself, spreading though the body, and eventually appearing as itchy red blisters all over the body. But the virus doesn’t stop there; it can spread to other people through physical contact and through…

Keyloggers log wirelessly

Gee, it sounds like something out of one of those 1970s TV shows about government spies, but it’s reality: Plug this little thing into a wall socket and it records the keystrokes of a person nearby typing into a Microsoft wireless keyboard. The little gadget sends the information back to the gadget’s owner over the…

4 Tips for Spring Cleaning Your Digital Life

Spring is in the air (if you’re in the northern hemisphere) and it’s traditionally a time to clean every nook and cranny and get rid of excess stuff in your house. But it’s also a good time to clean up your digital life. Just like your house, your digital life needs a good cleaning once…

It’s a Security System and More

WARNING: Removing this video surveillance camera to kill evidence of your robbery will do you chickenfeed because the video of you is being stored in the cloud! Today’s security systems are so much more evolved than they were 20 years ago, even 10 years ago. We’ve all heard of the bright light that goes on…

Identity Theft Protection 101

What’s it called if, for example, someone runs up your credit card line without your permission? Identity theft. ID theft isn’t necessarily someone going around impersonating you. But it is considered someone taking over your accounts. Account takeover is also someone hacking into your computer and getting the password for your PayPal account, then sucking…