User Blogs

User Blogs

Discussions and Blogs
May 01
2013

How Protected is My Tablet on WiFi?

Posted by Robert Siciliano in WIFI

Robert Siciliano

To understand how protected you are, you need to understand how unprotected free public wireless is. This has nothing to do with how secure Apple devices are compared to Android.  By default, free public wireless is open and unencrypted, and the data that travels over it from each device to the router is naked for all the world to see. This is true regardless of what anti-virus (AV) software you do or don’t have on your tablet.

Apr 29
2013

5 Ways to Browse the Web Privately

Posted by Robert Siciliano in web

Robert Siciliano

You’ve probably never even thought that “browsing the web privately” was something that you needed to take extra steps to do. Most people think all web surfing is relatively private and nobody is really paying any attention. Unfortunately, there are many people, particularly in the form of marketers and advertisers, who watch almost every website you visit and record almost every click. Then there is your government. It may or may not be happening in your country, but many oppressive governments watch every move their citizens make.

Apr 27
2013

2013 Boston Marathon: My Best Worst Day Ever

Posted by Robert Siciliano in marathon

Robert Siciliano

Training for a marathon is a taxing, physical, emotional and expensive process. For me personally, that means five cortisone shots, almost a hundred physical therapy appointments and a few arguments with my wife. Why do it? Why climb a mountain? Why be a police officer? Why be an emergency room nurse? Why detonate a bomb in a crowd of innocent people? Not sure. We all make choices others wouldn’t and we justify our decisions based on our interests, options and perspective.

Apr 27
2013

Beware of Credit Card Micro Charges

Posted by Robert Siciliano in credit card

Robert Siciliano

Micro charges are charges ranging from 20 cents to $10 and either are fraudulent, legitimate or fall into the category of “grey charges,” which describe sneaky recurring or unwanted charges.

Apr 27
2013

How Can I Ensure My Social Network Interactions are Secure on Wireless?

Posted by Robert Siciliano in social network

Robert Siciliano

Privacy on social networks seems a little oxymoronic to me. We tell the world about our lives, but we don’t want everyone to knoweverything. I know many people who only want some people to share in their experiences, but those same people often friend people they don’t know. See what I mean? Anyway, it is still a good idea to lock down all your privacy settings and avoid friending people you don’t really know.

Apr 22
2013

What Exactly is a VPN?

Posted by Robert Siciliano in VPN

Robert Siciliano

A Virtual Private Network (VPN) is a network set up to communicate privately over a public network. For example: You occasionally want to or need to work from home and your employer knows that if you do, the data that travels between your PC and an office PC needs to be protected. So your employer installs a program on his server and you install one on your computer that allows your computer to connect to the work computers privately.

Apr 22
2013

How Hackers Use Our Information Against Us

Posted by Robert Siciliano in Hackers

Robert Siciliano

We hear an awful lot about hackers breaking into systems and taking down networks or stealing millions of data records. The general understanding we have for hacking is bad guys want to disrupt things to make a point or to make money. But how do they really use our personal information against us?

Apr 17
2013

Steps to Take When Connecting to WiFi at the Coffee Shop

Posted by Robert Siciliano in WIFI

Robert Siciliano

Consumers are oblivious to the dangers of connecting in a free wireless environment. If they actually knew how vulnerable they are, all that coffee shops would do is sell coffee.Nobody would stick around and connect to the internet.

Apr 17
2013

How NOT to Dispute a Credit Card Charge

Posted by Robert Siciliano in credit card

Robert Siciliano

My wife was searching online for a specialist to take care of a minor medical condition. While browsing, a certain ad caught her eye, so she checked out its website and made a phone call to get more information.

Apr 17
2013

What is a “Drive-By” Download?

Posted by Robert Siciliano in download

Robert Siciliano

Gone are the days when you had to click to “accept” a download or install a software update in order to become infected. Now, just opening a compromised web page could allow dangerous code to install on your device.

Apr 13
2013

10 Tips to Secure Online Banking

Posted by Robert Siciliano in Online Banking

Robert Siciliano

 

Apr 13
2013

Why are Cybercriminals Moving from PCs to Mobile Devices?

Posted by Robert Siciliano in cybercriminals

Robert Siciliano

The number of households in the United States that rely solely on mobile phones continues to increase. As of July 2011, 31% of households had mobile phones and no landlines. Additionally, almost one in six households used mobile phones exclusively or almost exclusively, despite still having a landline.


Subscribe via Email

 Your Email:

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps ATM Skimming Audit Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches BS 25999 burglar burglary Business Continuity BYOD change management cheating children pictures Cloud Cloud Security Cobit collaboration Community discussion Compliance computer failure Consumer IT Tips contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud Cross-Device Security Cyber gangs cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersecurity cyberwise data Data Backup Data Breaches data security Data Storage DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport EMV Endpoint Security entity theft Epsilon ERM ESI Ethics Events Facebook FCC FCPA FDIC Federal Government FFIEC Financial Crisis firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs Hackers Hackproof Hacktivism holidays home invasion home security Hotspot HP IAM iCloud id ID Theft Identity theft Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety iOS app iovation IP address iphone iPhone security ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger laptop security Litigation Malware marathon mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog Network Security New Years NFC NFC app Online Backup Online Banking online dating online gaming online identity online privacy online safety Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport passwords PCI Performance Management personal data personal device Personal Security pheasting phishing Policy predator Privacy Prize Draw QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media social network Social Security SOX spammers spokesman Spyware SSDs Standards strangers Strategy tablets tax scams Tech tech support technology Threat Management Tokenization TQM Twitter typosquatting Virus VPN wallet web Webcast Q&A Wi-Fi WIFI WiFi password wireless
Banner