Entries by Robert Siciliano

How to safely and securely recycles Devices

Don’t just throw out your old devices; take measures to protect your personal information. Back Up Before ridding your device, back up everything on it—everything. Use an automated PC service and/or a flash drive. For the iOS and Android, activate Apple’s iCloud or the Google Auto Backup service. Wipe Wiping refers to removing all your…

Spring Clean Your Online Reputation

Spring is fast approaching, which means that spring break and college graduation are not too far away. Things could get ugly if your friends take photos of you acting foolish and then post them online for everyone to see. Whether you’re searching for your next career move or are on the verge of graduation and…

Ransomware Attacks Small Businesses

The rate of malware (ransomware) attacks on small businesses climbs at an alarming rate. The security firm McAfee warns that soon, attacks that come through social platforms will be “ubiquitous.” Small businesses are typically not able to subsidize the internal security placements to fend off these attacks, which mostly come from abroad. Ransomware blocks your…

Medical Identity Theft Protection And Prevention

Identity theft can be fatal to the victim — if it’s of the medical kind. Medical ID theft can result in getting the wrong blood type during a transfusion, the wrong diagnosis or the wrong prescription — all because the thief’s medical history gets integrated with the victim’s. I hope you’re scared, because that’s my…

Hidden Covert Cameras found in Woman’s Home

Nicole Muscara’s alarm clock acquired an alarming feature: a hidden camera placed by a stalker. She discovered something odd when she one day set the alarm; it wasn’t her clock. Stories like this are happening more commonly. Recently a Kansas City, Missouri woman discovered 11 hidden cameras in her apartment—placed there by her landlord. As…

6 Tools to protect your Privacy Online

The more advanced that communications become, the more likely your personal information is getting leaked out—every time you search the Web, send texts or e-mails, etc. Your private data is literally “out there.” However, there are six software programs to protect your privacy online. Expiration date tag. Files, photos and messages are tagged with an…

Children significantly affected by Burglary

Here’s why you should never assume that burglary won’t have negative effects on your children. Victim Support, an independent charity, and home security specialist ADT, have new research findings: Children who’ve experienced a home burglary are more likely to have problems at school and sleep difficulties. Ten percent of the participating parents said their child’s…

What is a Backdoor Threat?

Did you accidentally leave the back door open? This thought can be scary because you know that leaving the back door open at home could allow someone to enter your home and take your personal belongings. The same is true for a backdoor in the computer world. It is a vulnerability that gives an attacker…

Private Identifiers Not Private

Today’s commerce occurs very much online, with products and services ranging from A to Z. Hence, these many online merchants have hundreds of millions of people around the globe registered with them for convenient purchases. To verify authentication as the true user of these services, the registrant must supply personal data. If cyber criminals get…