ARCHIVED BLOG POSTS

2010 

I have a love/hate relationship with Craigslist. I love the occasional deal I get (like the 25 hp outboard motor I just got) and I love how people use it to find stuff I’m selling or renting out (like an apartment). But I hate the way some people completely over price what they are selling, thin...
08/29/2010
According to the Identity Theft Resource Center, there have been 371 data breaches that have exposed 12,871,065 records so far this year in the United States. NetworkWorld reports that businesses suffered the most breaches, making up 35% of the total. Medical and healthcare services accounted fo...
08/29/2010
Officials are reporting a wave of credit and debit card attacks targeting point of sale swapping, skimming of card data, and hacking into payment processors. Reports say the U.S. Secret Service, among others, are in the process of investigating a multistate crime spree. The Oklahoma Bankers Asso...
08/29/2010
We often hear people (including myself) drone on at how the system is broken and how good guys end up in jail and bad guys are released on good behavior. The criminal justice system is far from fair. Too often bad people are let out only to re-offend and sometimes do worse the second or third ti...
08/27/2010
This year’s Defcon convention of hackers in August brought to light a fact that many in the security industry have known: mobile phones are becoming a bigger target for criminals. Recent news of applications on the iPhone and Android that are vulnerable to attack and possibly designed to send yo...
08/27/2010
In the early days of the web, cybersquatting was a concern among corporations who were late to the game in getting their domain names. I had a little battle with LedZeppelin.com that I regret, but that’s another story. Today that same battle is being played out in social media. Anyone can regist...
08/27/2010
Nationwide, “burglars made off with $4.6 billion in electronics, jewelry, cash and other items in 2008, according to the FBI. In more than 30 percent of those burglaries, the thief got inside without forcing open a door or window. Many occurred during the day.” As you pack your car for your next...
08/25/2010
Social media has evolved into the fifth major form of media: print, radio, television, Internet, social. While social media functions on the Internet, there’s no denying that it is its own platform. It encompasses most forms of media in one tight and neat package. Some social networking sites ha...
08/25/2010
The only difference between a so-called celebrity and you and I is exposure. Their lives are subjected to much more attention than most people and for that they pay a price. Ours is a celebrity obsessed culture that has multiple TV programs every day of the week that focus solely on the lives of...
08/25/2010
In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon) I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. At the recent Defcon event, social engineers proved that it ...
08/24/2010
Rainmaker
913,933

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention