ARCHIVED BLOG POSTS

2010 

0 5 Sneaky Credit Card Scams Published: Oct 15, 2010 - Edit this #1 Phone Fraud. The phone rings, a scammer poses as your banks fraud department. They may have your entire card number stolen from another source. They ask about a charge made and you deny the charge, but in order for the charge to...
10/26/2010
Sometimes all you can do is shake your head and wonder how we have managed to get this far as a species. Scanning today’s paper I couldn’t help but notice the total mayhem that makes up one day of news. I bring this to your attention not to sensationalize or provide the “bad news” but to make yo...
10/26/2010
As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for content creators’ latest innovations, which often require more and more device access. As applications and other content are more widely dis...
10/23/2010
Pete Herzog, Founder of ISECOM, will be discussing the revised Open Source Security Testing Methodology Manual (OSSTMM v3) and how it applies to web application security today (10-13-2010) in Raleigh, NC. Pete rarely gets to the US, so this is a unique opportunity for security professionals to h...
10/23/2010
Being on top of what is new and ahead of what is next in technology has always been my thing. I had a beeper the size of a pack of cigarettes and a mobile phone bigger than a shoe box. I’m somewhat of a gadget geek. I like new and shiny. However, when it comes to all these new technologies I am ...
10/23/2010
You may have seen this before, it goes like this: a pop-up pops and it looks like a window on your PC. Next thing a scan begins. It often grabs a screenshot of your “My Computer” window mimicking your PCs characteristics then tricking you into clicking on links. The scan tells you that a virus h...
10/18/2010
In the late 90s and early 2000s, hacking had evolved from “phreaking” (hacking phone systems) to “cracking” (breaking into networks). At the time, hackers hacked for fun, for the challenge, and for fame and popularity within the hacking community. But soon enough, the public began spending more ...
10/09/2010
Strangers and posers: You tell your children not to talk to strangers, so why do you open the door to a total stranger? And never talk to strangers via an open or screen door. Home-invaders pose as delivery people, law enforcement or public workers. Distress: If someone is in distress tell him o...
10/07/2010
In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon), I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blur...
10/07/2010
This is just a bad, bad story with no happy ending. There are home invasions, then there is this home invasion. Just when you think humans can’t get any meaner towards each other there is Steven Hayes and Joshua Komisarjevsky, the 2 men accused of a home invasion in Connecticut in 2007. Hayes an...
10/06/2010
Rainmaker
913,933

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention