ARCHIVED BLOG POSTS

2011 

An excellent way to improve one’s level of security intelligence is to follow the writings of Robert X. Cringley, one of my favorite technology know-it-alls. Anyway, Cringley’s credit card was recently hacked. And if his card can be hacked, anyone’s can. Like many cardholders, Cringley received ...
05/31/2011
In Gemalto’s eBanking Security Guide, a question is asked: “Banking is changing, are you?” Banking is a changing business. Since the early 1980’s banking has been going digital and moving online. During the last 10 years, we’ve seen a major shift in the services offered and the behavior of custo...
05/31/2011
You know how much you love to and rely on controlling your TV from your couch? I’m a little dumfounded when I can’t find the remote. And by the time I do, I could have easily changed the channel and found what I was looking for, but the process just isn’t the same without the remote control. The...
05/31/2011
Here’s an identity theft story you’ll love to hate. In Panama City Florida a local and respected teachers’ identity was used to create a fake Twitter profile which spouted off derogatory comments about autistic students. The teacher works with special needs students and had no idea this was going...
05/31/2011
There is unfortunately no limit to how naïve (and stupid) and vulnerable the public is to the evil (and creative) criminal mind when it comes to home security and burglary. I haven’t seen reports of this happening in the US, yet, but in Turkey which is somewhere over there, burglars are actually ...
05/26/2011
Home security and home burglary protection is more than just installing a home security system. The best defense includes a great offense and a solid strategy incorporating a well thought out plan. Outside of Detroit I worked with local law enforcement to conduct a security seminar at a credit un...
05/22/2011
Worried about shopping online safely? Shopping online is unquestionably more convenient and efficient than traditional commerce. However it can be scary when entering your personal information on sites you aren’t familiar with. The McAfee SECURE™ Shopping Portal lets you shop on thousands of trus...
05/20/2011
More than 90% of online purchases are made with cards, whether they are credit, debit, or gift cards. A virtual payment that takes place online or over the phone, without physical inspection of the card, is considered a “card not present” or CNP transaction. In a CNP transaction, it is not possi...
05/20/2011
A traveler was in a bus station and put his bag down for 2 seconds to get some food and the bag disappeared. He called the police and they made their way down to the bus station. The victim lost a laptop, black and white motorcycle jacket and a black Kiss concert T-shirt. Now if I was a thief, wh...
05/20/2011
Reed College’s entire website was recently copied and replicated, but with the fictitious name “University of Redwood.” The Wall Street Journal reports, “Officials at Reed suspect the site is part of a scheme to collect application fees from prospective students in Hong Kong and Asia.” Presumably...
05/19/2011
Rainmaker
450,089

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
Spam prevention