ARCHIVED BLOG POSTS

2014 

What is knowledge-based authentication? The KBA design asks the user to correctly answer at least one question, a “secret” only the user would know. There are two types of KBA: 1) Answering a question that the user has pre-selected (static scheme), and 2) Answering a question that’s determined by...
02/12/2014
Imagine not being able to use cash for even the smallest purchases because your bank—still shaking from news of the recent retail data breach that affected at least 110 million accounts—has decided to block all customer transactions. This actually happened. In many recent interviews I have been a...
02/11/2014
It’s time to know all the ways you can make sure you’re safe when in mobile space to prevent identity theft. It’s 10 pm; do know where the malware is? Malware is stealthy and hides in places you least expect, like search engines, tech-related sites, entertainment sites and web ads. Malware can ev...
02/11/2014
The AmberAlert GPS, is "The Intelligent Way to Keep Families Connected and Safe", today unveiled an infographic that explains how Smart Locators make it easier for families to stay connected and protected. In the course of raising a family, over 90% of parents will at some point lose track of a c...
02/11/2014
The Good: Your mobile phone number is almost as good as your fingerprint: very unique to you, and as a second factor authentication device via text message, acts as access control through which to access certain web sites. SMS two factor authentication as it’s know is the sending of unique one ti...
02/09/2014
That very newsworthy data breach that’s still in the news struck 110 million customers, not the more commonly reported 40 million; that’s one-third of the U.S. population. There was also another, but less publicized, breach of huge proportions that occurred to a major retailer in mid-December of ...
02/09/2014
Ever consider the idea that a home intruder may force you to turn off your home alarm? Ever think that there’s a way you could secretly signal this to the authorities when you turn off the alarm while your captor is watching? There is: the alarm duress code. This code is entered on the keypad, se...
02/09/2014
A recent poll of 1,000 Internet users reveals that they’re very concerned about security threats to their personal and financial information. Users also believe that the feds should step up more to protect them. 80% are concerned that hackers will get into information they share. 16% are on edge ...
02/07/2014
A deep analysis into security (security analytics programs) unveils some riveting areas that need to be addressed if business users are serious about reducing threats of data breaches. Reveal data leaks. Convinced your business is “data leak proof”? See what stones that security analytics turn ov...
02/04/2014
They’re back, and they’re scarier than fangy blood sucking ghosts: tech support scammers. They want to suck you dry of your last penny.   A tech support scam may go as follows: You receive a call from someone informing you that your computer is infected with a really bad virus and needs prompt at...
02/04/2014
Rainmaker
896,892

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*
Spam prevention