Entries by Robert Siciliano

4 Different types of burglary and burglars

https://safr.me/webinar/  | Robert Siciliano is the #1 Security Expert in the United States with over 25 years of experience! He is here to help you become more aware of the risks and strategies to help protect yourself, your family, your business, and your entire life. Robert brings identity theft, personal security, fraud prevention and cyber…

What to do in the Aftermath of an Attack

Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked. After the attack, locate the portal through which the crumb-bag entered. This could be the e-mail program or browser. This may be easier said than…

Consumers Eager for Connected Technology

Many of us are familiar with the Jetson’s TV cartoon that showed the life of a family in 2026 and how technology is a part of their everyday life. If you’re like me, some of the gadgets that George and his family had are probably things you thought were cool or would be convenient to…

10 most dangerous Facebook Scams

Twenty percent of the world’s population is “on” Facebook—that’s well over a billion people. Top 10 Most Popular Facebook Scams Profile visitor stats. It’s all about vanity. It doesn’t take long for any new Facebook user to see an ad offering to reveal how many people are viewing your profile. You can even find out…

How to revive Someone who blacks out

Fainting, or “blacking out,” has numerous causes. Sometimes the person “comes to” quickly (e.g., the cause is prolonged standing in heat), or the person won’t respond (illness), and this kind of cause can be life threatening. Signs someone’s about to faint include frequent yawning, chest tightness, teetering, heart palpitations, nausea, a slow pulse, dizziness, lightheadedness,…

Is private NSA proof E-mail possible?

You can buy encryption tools to prevent people from reading the contents of your e-mails should they intercept them. But what about those who have NSA-caliber resources and skills? The problem is that encryption services usually leave wide open the e-mail’s metadata: e.g., sender, recipient, subject line and timestamp. But a new service, ShazzleMail, delivers…

Know your Options for Self-Defense

Most people don’t give good hard thinking to their capabilities in a physical assault situation. You need not be built like an MMA fighter to know effective self-defense. An ounce of prevention is worth a pound of safety. Attackers look for unsuspecting targets. Walk and park only in well-lit areas. Never park right beside a…

Identity proofing proves who You are

Identity proofing is proof of whom you are. Proving one’s identity starts with that person answering questions that only they themselves can answer (even if the answers are fictitious), such as their favorite movie, mother’s maiden name or name of their high school. Since most people provide real answers (that can be found online) rather…

6 Ways to Secure Your Email Account

On August 30th, 1982, a copyright for a Computer Program for Electronic Mail System was issued to Shiva Ayvadurai. Thus, email was born. 32 years later, email has become an essential part of our lives. Emails are a must-have item, allowing us to connect and share information with friends, teachers, and co-workers. To celebrate email’s…