ARCHIVED BLOG POSTS

2011 

They say there’s a sucker born every minute. Not everyone can be sophisticated and worldly. Unfortunately, naiveté invites predators and victimization. Social engineering is the act of manipulating people into performing certain actions or divulging confidential information. Essentially it’s a fa...
05/18/2011
In California gang members are recruited in their tweens. Kids as young as 12 and 13 are on the streets and engaged in theft and violence like never before. Other big cities aren’t much different. In Boston, where I live, a few kids had passed through my yard and I informed them of what they were...
05/15/2011
TechNewsWorld reports LastPass, the password manager was under attack last week. “Users rely on it to store the myriad user names and passwords they inevitably collect as they go about their business on the Web. With LastPass, they only have to remember one single master password. LastPass handle...
05/12/2011
In general, there are a few types of job related scams to be aware of. Rule of thumb is if it isn’t a job that you are familiar with or a service you have heard of, it is probably a scam. If it’s not a job you would see printed on a business card, it’s a scam. “Work at home”, make $1000.00 a week...
05/12/2011
Like a roller coaster, online dating can be fun and exciting, or it can be nauseating. Most dating veterans have been there, done that, with a few regrets and lots of lessons learned. While you may have already experienced a lot, you have yet to see it all. It’s essential to be able to distinguis...
05/12/2011
When clicking these links your PC can be infected with a RAT which is a remote access Trojan and all your information may end up in the hands of a criminal. Bottom Line: Be wary of any unsolicited messages that claim to have news on bin Laden, and never click on links or attachments included in t...
05/09/2011
1. Data Breaches: Businesses suffer most often from data breaches, making up 35% of total breaches. Medical and healthcare services are also frequent targets, accounting for 29.1% of breaches. Government and military make up 16.2%, banking, credit, and financial services account for 10.5%, and 9....
05/09/2011
All the advice one hears when told how to keep your kids safe on the internet from your home computer goes out the window when a mobile phone and other portable devices are introduced into the child’s life. The sage advice was to put a PC in the living room and monitor your kids activity. Today t...
05/09/2011
McAfee has created a tongue-in-cheek list of the most unwanted identity thieves, describing the various techniques thieves use to steal your information. It’s clever and, unfortunately, very real. Pauly the Pickpocket & Sally Sticky Fingers work as a team to lift wallets and mobile devices from p...
05/06/2011
An ex-con picked the wrong home to invade. Imagine you’re in bed counting sheep dreaming of clouds and flying unicorns. Suddenly there is a knock on the door, which is startling to most people who wake up to the presence of noise and especially that of a knock at 3am. In your discombobulated stat...
05/06/2011
Rainmaker
911,843

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention