ARCHIVED BLOG POSTS

2014 

Two young girls died after a man broke into their second-story Cleveland apartment and set it afire. This was after the man forced the 55-year-old babysitter (the children’s’ aunt) into a bathroom, where she remained—until she began smelling smoke. Then she fled to outside and later reported that...
01/15/2014
Mallorie’s Android phone was acting odd, like it was possessed. The thing had a mind of its own, sending garbled texts and gambling. Ghost? Or hacked? Mallorie locked down the phone when it was charging so it wouldn’t purchase poker chips. One day she forgot to lock it and it went on a shopping b...
01/13/2014
Defenses of a U.S. government agency were duped by an experimental scam created by security experts. The “scam” involved Emily Williams, a fictitious attractive woman with a credible online identity (including a real photo that was allowed by a real woman), posing as a new hire at the targeted ag...
01/12/2014
When employees improperly use mobiles, they put their companies at risk for data breaches. This includes leaving lots of sensitive data on the devices—which can pave the way to leakage of data, plus other issues. Mobile device use in workplaces is increasing—and so is its associated security risk...
01/11/2014
Tech devices are rapidly evolving from those you carry around with you in a pocket to those you wear on an arm, and they seem to be getting smaller and smaller. We have the laptop as the progenitor, culminating in the smartphone and tablet. And beyond: Google Glass, a computer you wear, freeing y...
01/11/2014
The Internet has become an essential tool for most of us and a part of our everyday lives. We rely on it to send/receive emails, post/share photos and messages on social networking sites, shop for clothes, search for information, etc. But how do all these online activities affect your privacy? Yo...
01/10/2014
If your home is full of valuables, why not add one more valuable: a home security system? A mansion in La Habra Heights (California) was ransacked by 16 teenagers; they made off like bandits with over $1 million worth of property. It all began when some local teens noticed that the mansion was va...
01/09/2014
As we wind down the year, it’s a time to reflect, but also to look forward. Some of us may be thinking about resolutions and what we need to do in the upcoming year—exercise more, eat better, have better work/life balance, etc. Others of us will be thinking about how we’re going to ring in the Ne...
01/09/2014
Shopping online can be just as dangerous to your security as leaving your car unlocked in the mall parking lot. Consumer Reports notes the following: Don’t judge a website by its cover. A malicious website can look legitimate, even though it aims to nab your personal data, even identity, or sell ...
01/07/2014
A thief got a hold of woman’s debit card information and raided her bank account. This true story is described in a recent St. Louis Post-Dispatch article. Thieves can wire money over the Internet and get the cash by showing a false ID, says the article. This kind of fraud is more common than peo...
01/05/2014
Rainmaker
917,664

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
*