ARCHIVED BLOG POSTS

2013 

It’s pretty simple: Your mobile’s global positioning system (GPS) functionality allows location-based services to locate and publish information about your whereabouts on various applications and within the code of photos posted online. Various applications allow you to “check in” using your mobi...
09/25/2013
Hey merchants, yes you, BillGuard released a report that examined the grey charge problem among US debit and credit cardholders and the service costs impacting card issuers and retailers. The report revealed 11 types of deceptive ‘grey charges’ that retailers use to mislead consumers in their sal...
09/25/2013
You’ve been thinking about getting a home security system but haven’t because you want to do it right and not invest in old, outdated technology. Well, you’re in luck, because now’s the time. Home security system technology is as advanced as it’s ever been, and just about anyone can afford a basi...
09/25/2013
I have some friends in support of the Adam Smith Institute and the American University of Sharjah. This is a great read if you are interested in furthering your education. Thanks for reading.  Economics, the study of scarcity and choice Let's cut to the chase, in addition to your current vocation...
09/24/2013
A wise man once said, “Beware of false prophets, which come to you in sheep’s clothing, but inwardly they are ravening wolves.” The wolf in sheep’s clothing refers to someone in a role contrary to his or her character and with whom contact is dangerous. In other words, sometimes it’s the people w...
09/16/2013
There have multiple revelations about government agencies spying on their citizens, which, frankly, should come as no surprise. But there are also several others who are also spying on you, and often you’ve given them permission to do so. Hackers: Routers can be hacked if not properly secured. Sp...
09/16/2013
There at least 99 things to know about how to prevent identity theft. Below is a good starting point. Tips: Watch your bank accounts online and examine your statements frequently. Opt out of preapproved credit cards. Go to https://www.optoutprescreen.com/?rf=t to get started. Check your credit fo...
09/16/2013
Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every click and touch, every download and conversation. A keylogger (short for keystroke logger) is software that tracks or logs the keys struck on your keyboard, typicall...
09/04/2013
Rainmaker
904,867

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention