ARCHIVED BLOG POSTS

2012 

The term “cyberattack” or cyberwarfare is defined as “politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation....
10/29/2012
Why someone would set up a fake social media profile? The answer correlates with news of cyber-attacks on businesses and other organizations being targeted with advanced persistent threats which has risen sharply over the past two years. The Register reports “Social engineering via platforms such...
10/29/2012
“Americans have always cherished our privacy. From the birth of our republic, we assured ourselves protection against unlawful intrusion into our homes and our personal papers. At the same time, we set up a postal system to enable citizens all over the new nation to engage in commerce and politic...
10/27/2012
Drug dealers, child pornographers, terrorists and criminal hackers, are often sharing the same Internet privacy tools as law enforcement, domestic violence victims and citizens of oppressive governments who most likely use a “darknet” which is an anonymous secret internet designed to cover their ...
10/27/2012
Children engage in online shopping, social media, mobile web, and computers just like adults do. Many parents feel a bit overwhelmed by technology and often throw their hands in the air and give up. Unfortunately, that’s not an option. It is essential that parents educate themselves on safe, secu...
10/27/2012
I love my dog, 60lb German Shepherd. Small for a shepherd, but she was the runt. I’ve always rooted for the underdog. The underdog has more heart, more passion and often tries harder. Anyway people love their pets, which is why it’s a multi-billion dollar a year business. Scammers know this too ...
10/24/2012
We use the web to search, shop and to connect with friends and family. And in the process criminals are trying steal from us. It used to be that a person only had to know not to open a file in an attachment from someone they didn’t know. Today there are more ways than ever that your PC can be hij...
10/24/2012
Over the past 5 years a scam known as electronic funds transfers at the point of sale (EFTPOS ) or skimming has been prevalent. Consumers commonly swipe both credit and debit cards through the in-store machines to pay for goods and services and hackers have been adept at coming up with ways to sk...
10/24/2012
Calling all identity thieves, stop wasting your time trying to open new credit card accounts or taking over existing credit card accounts, the money is in IRS tax related identity theft. The IRS is struggling to keep up with all the fraudulent income tax returns coming in via US postal and online...
10/18/2012
Identity theft of the deceased is so wrong, and so easy, thanks in part to the availability of public records. In the 1990s, a provision in a federal welfare reform law created a loophole allowing swindlers to obtain Social Security numbers of the recently deceased. Some states’ records and stati...
10/18/2012
Rainmaker
905,793

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention