Entries by Robert Siciliano

Next Steps in Wearable Tech

Tech devices are rapidly evolving from those you carry around with you in a pocket to those you wear on an arm, and they seem to be getting smaller and smaller. We have the laptop as the progenitor, culminating in the smartphone and tablet. And beyond: Google Glass, a computer you wear, freeing your hands,…

Corporate BYOD puts Client Data at risk

When employees improperly use mobiles, they put their companies at risk for data breaches. This includes leaving lots of sensitive data on the devices—which can pave the way to leakage of data, plus other issues. Mobile device use in workplaces is increasing—and so is its associated security risks. Current security measures are lagging behind the…

10 Tips to Keep Your Data Private Online

The Internet has become an essential tool for most of us and a part of our everyday lives. We rely on it to send/receive emails, post/share photos and messages on social networking sites, shop for clothes, search for information, etc. But how do all these online activities affect your privacy? Your online privacy depends on…

Teens trash Million Dollar Mansion

If your home is full of valuables, why not add one more valuable: a home security system? A mansion in La Habra Heights (California) was ransacked by 16 teenagers; they made off like bandits with over $1 million worth of property. It all began when some local teens noticed that the mansion was vacant (the…

McAfee Labs 2014 Predictions

As we wind down the year, it’s a time to reflect, but also to look forward. Some of us may be thinking about resolutions and what we need to do in the upcoming year—exercise more, eat better, have better work/life balance, etc. Others of us will be thinking about how we’re going to ring in…

Online Shopping Warnings and Advice

Shopping online can be just as dangerous to your security as leaving your car unlocked in the mall parking lot. Consumer Reports notes the following: Don’t judge a website by its cover. A malicious website can look legitimate, even though it aims to nab your personal data, even identity, or sell counterfeit products. Others aim…

Protecting Yourself from Debit Card Fraud

A thief got ahold of woman’s debit card information and raided her bank account. This true story is described in a recent St. Louis Post-Dispatch article. Thieves can wire money over the Internet and get the cash by showing a false ID, says the article. This kind of fraud is more common than people think.…

7 Essentials for a Survival Kit

If you were out in the middle of nowhere for three days or stuck at home due to man made or natural disaster, what would you need to survive? Here are numerous items that are essential for survival. Keep in mind this is a basic list that might be proactively packed in a “go bag”…

Lessons learned from a Password Attack

It’s easy for millions of passwords to be stolen via hacking into Facebook, Twitter and Gmail accounts: It recently happened because malware was unknowingly downloaded into computers worldwide that extracted log-in information. The data was then directed to the hackers’ server, which was tracked to the Netherlands. A password is never 100 percent secure, but…

Protection For Your Shiny New Devices

After Santa heads back to the North Pole, there will be many new devices in the hands of good girls and boys that will be targeted by criminals. With the enjoyment of these cool devices should come top-notch protection for them, as they can be vulnerable to a number of malicious threats. Laptop or PC…