where the writers are

Robert Siciliano's Blog

RSSSyndicate content
Jan.29.2014
You must change your passwords like you must change your bed sheets. This is not up to negotiation, thanks to the influx of viruses, malware, phishing sites and key loggers. Changing a password means having a new password for all of your accounts rather than using the same password. Imagine what...
Continue Reading »
Jan.28.2014
Target continues to be tangled up in chains due to its December 2013 data breach that current estimates say affected 110 million customers. Target is known as proficient and prolific in the use of mobile devices and other means for collecting consumer data. This proficiency has backfired,...
Continue Reading »
Jan.28.2014
What should you do if you come home to find it’s been ransacked? Don’t panic; be organized and strategic. There are three main actions you should take, in the following order: Report and check Clean up Plan ahead Report the crime and check the home Your goal here is safety first and then...
Continue Reading »
Jan.27.2014
Should victims of a data breach be notified? This situation can be confusing due to various state laws. Certain issues must be considered, including differences among state laws. Differences include what exactly defines personally identifiable information; which agency (e.g., law enforcement,...
Continue Reading »
Jan.27.2014
What a steal: You can purchase a U.S. stolen identity for $25, and an overseas one for $40. Cybercrime is booming. Cybercriminals are competing even against each other. Data theft is becoming increasingly easier, with more and more people gaining entry into this realm. It’s no longer for the elite...
Continue Reading »
Jan.26.2014
CO Alarms do save Lives What you can’t see or smell can kill you. Many CO deaths could have been prevented with an alarm. How is CO dangerous? CO gas robs your blood of oxygen, slowly (at lower levels) or quickly (at high levels), choking off your air supply. A low-level leak can leave you...
Continue Reading »
Jan.25.2014
Burglars would rather keep their dirty little secrets to themselves. But today, Schlage, makers of the grade one Touchscreen Deadbolt, and I are revealing what they don’t want you to know. Burglars have jobs too. Your burglar was already in your house. He was there recently to repair the furnace...
Continue Reading » 1 comment
Jan.24.2014
Deadbolt technology just gets smarter and smarter. There are now electronic deadbolts that can be manipulated with an integrated keypad, a smartphone or opened with a key. After all, relying on the traditional key can be a nuisance, for obvious reasons. The Camelot Style deadbolt from Schlage...
Continue Reading »
Jan.23.2014
A public cloud service can bring on five risks to a business. Here they are, and their solutions. The three A’s: authentication, authorization, access control. Here are some questions to ponder about a cloud service: How often does it clean up dormant accounts? What kind of authentication is...
Continue Reading »
Jan.23.2014
The Internet of Things—IoT—is a formal term referring to distinctly identifiable objects (cars, kitchen appliances, smartphones) and their cyber-representations on the Internet. By 2020, it’s projected by at least one expert that there will be over 30 billion “things” represented virtually. All of...
Continue Reading »
Jan.22.2014
Being stuck at an airport due to winter weather can be a real downer, but with an assortment of devices, apps and other instruments for connecting to the world, you can make that down time pass in a jiffy. With today’s technology, gone are the days where you nearly go bonkers doing endless...
Continue Reading »
Jan.21.2014
Social media makes dumb criminals look (and act) even dumber. Take the case of Damian and Rolando Lozano of Texas, who were suspected of stealing items from 17 cars in the town of Rosenberg. Damian was caught, but Rolando was still out there somewhere. The Rosenberg police posted Rolando’s photo...
Continue Reading »
Jan.20.2014
If your personal information gets compromised, a thief will open up financial accounts in your name. However, they will not pay the bills, and this will ruin your credit. Whether bad credit results from the legitimate credit holder’s irresponsibility or from identity theft, your ability to buy a...
Continue Reading »
Jan.20.2014
America the Superpower is also the super choice for criminals wanting to steal credit card information. Security experts warn that this problem will get worse before it improves. That ancient technology of the magnetic strip on the back of credit and debit cards is a godsend to criminals. The easy...
Continue Reading »
Jan.19.2014
There are numerous tax related scams out there. And as a business or even a consumer, forewarned is forearmed. Tax relief. Predators scan through tax lien notices to see who’s in deep with the IRS, then offer them tax relief services which are fraudulent. You pay them, and voila, your money not...
Continue Reading »