Entries by Robert Siciliano

Privacy is more than locking your Doors

There are 10 distinct meanings of privacy. Protecting Reputation You’ve heard of money management, right? Well, there’s also reputation management. There’s a difference between having facts about a person and then making judgments based on those facts. Often, judgments are skewered, and the result is a soured reputation. Showing Respect We must respect one’s desire…

Ransomware demands Dollars for Data

“Ransomware” is what holds data hostage by invading one’s computer when the user clicks on a malicious link in an e-mail or downloads an infected attachment. Visiting a fraudulent web site can also trigger an attack. Ransomware then goes to work at putting your files on lockdown so you can’t access them—but the hacker sure…

Six Steps for Keeping Your Mobile Secure

Mobile phones are a world away in terms of capabilities to what they were 10 years ago. Research from Doilette has found that 72% of people in the UK now own a smartphone device. Considering all the personal information evidently available on your phone, it’s probably about time that you properly protected it. Read more HERE

Credit Card Theft increasing for Banks and Retailers

2013 was the year of 740 million records involving data breaches. And that number may be erring quite on the conservative side, according to the Online Trust Alliance. The records come from a list on the Privacy Rights Clearinghouse Chronology Data Base. The list is that of publically disclosed breaches, including the alleged 110 million that…

ID Theft, Medicare Fraud Prevention in People Over 45

My job as a security analyst is to educate people on the prevalence of ID theft, and this especially includes those over 45, and I also must point out that scams involving Medicare are on the rise. According to Reuters, Identity theft led the list of top consumer complaints once again in 2013, with U.S.…

Can Home Invasion of Elderly Cause Heart Attack?

I’m a home security expert and have given many speeches on how to protect your home from an invasion, but one of the topics that doesn’t seem to get much attention is the possibility of a heart attack being triggered in an elderly homeowner by the stress of an intrusion. Here are two alarming cases…

Top Security Techniques That Work For The Masters

Banks know security just about better than anyone. Find out what they can teach you about safeguarding your small business. Security is a journey, not a destination. This is a security industry axiom that means we can strive for security, and by making this effort, we can put ourselves on a path to security. But…

Businesses fail in Customer Privacy

The U.S. Consumer Confidence Index, released by TRUSTe®, shows an alarming trend: A high percentage of U.S. people over age 18 are unnerved about their online privacy, and this trend is worsening. This survey was conducted online among 2,019 U.S. adults and reveals that 92 percent of the participants are on edge, at least some…

7 Ways to Tell If It’s a Fake

Unfortunately in today’s world, scammers are coming at us from all angles to try and trick us to get us to part with our hard earned money. We all need to be vigilant in protecting ourselves online. If you aren’t paying attention—even if you know what to look for—they can get you. There are numerous…

WiFi Security Truths and Falsehoods

Security truths evolve—meaning, they change, and you must keep up with this, particularly with wireless security. Advice for wireless security can quickly become outdated. There are actually three big wireless security myths swirling around. #1. Limit the IP address pool to restrict number of devices that can connect. Even if your cable company tech recommends…