ARCHIVED BLOG POSTS

2012 

McAfee’s latest Threats Report shows a growth in malicious websites replacing botnets as the primary infection mechanism. This means that by just simply visiting a website you could be exposed to malicious things that can do harm to your computer, mobile device, finances or identity. Websites wi...
09/24/2012
Consumers with smartphones understand they are carrying around the functions of a computer, but most users are unaware that smartphones are susceptible to the same security threats that plague laptops and desktops. As more online retailers introduce mobile e-commerce applications, criminal hacke...
09/24/2012
People love their mobile devices and don’t want to leave home without them. When they bring their digital device to work we call this Bring Your Own Device or BYOD. The day after you get your new mobile phone or iPad, you’ll probably take it to work and have the IT department set it up with your ...
09/24/2012
Unfortunately, more and more airport security reports are coming in that the baggage handlers themselves are actually slicing open your luggage with razor blades and removing your valuables. For your travel safety, follow these security tips to protect your luggage in airports: 1. Follow FAA gui...
09/23/2012
In the real world there is little difference between an employer’s issued device and a personal mobile device. The most important difference should be that a digital device issued by your employer requires and should have a “company mobile liability policy”. Businesses generally provide and pay ...
09/23/2012
House mold is no joke. Mold makes you sick, makes your house sick and ruins properties if left untreated. Keeping mold under control is critical for household safety. The Department of Health in New York defines mold as “Molds are microscopic organisms that live on plant or animal matter. They ai...
09/23/2012
In response to National Fraud Awareness Week it’s important to bring attention to the biggest and worst investment fraud of all: the Ponzi Scheme. Wikipedia defines a Ponzi scheme as fraudulent investment operation that pays returns to its investors from their own money or the money paid by subs...
09/13/2012
A SQL injection is a virus or bug that effects an application that is not properly coded or secured. There are many different configurations of various software used to build and run a website. An example would be the common Word Press blog platform that many use and has been found to be vulnera...
09/13/2012
In one of the worst publically known home invasions of the 21st century both defendants received the death penalty. Joshua Komisarjevsky, confessed to the attack on the home and family of Dr. William Petit, and the murders of his wife, Jennifer Hawke-Petit, 48, and girls Michaela Petit, 11 and H...
09/13/2012
Most of us have heard the saying “It’s 2am, what are your kids doing?” and you may know, but do you know what your mobile apps are doing? I know before I started working in the industry, I would not have given a second thought to this, but consider this. Why would an app designed to monitor your...
09/05/2012
Rainmaker
905,321

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention