User Blogs

User Blogs

Discussions and Blogs
Nov 07
2013

Cellular Base Station Range Extenders Vulnerable to Attack

Posted by Robert Siciliano in VPN

Robert Siciliano

Low-powered cellular base stations are often found in residential homes and small businesses where mobile coverage is scant. The device, which also known as a femtocell, connects to DSL or cable connections and extends cellular coverage to a functional level where cell towers simply don’t reach. Some cellular base stations can accommodate up to 16 devices indoors or outdoors. The benefits of deploying a cellular base station include better voice quality and stronger wireless internet connections over 3G or 4G.

Nov 04
2013

It’s Even Easier Now For Regular Folks To Conduct Cybercrime

Posted by Robert Siciliano in cybercrime

Robert Siciliano

Here’s a late night infomercial for you: How’s that burger flipping going? That cubicle working out? Anyway, I’m sure your boss is such a nice guy. Guess what! If you’re interested in a career in criminal hacking, you don’t even need a computer! This (scary) special, one-time offer comes to you right now from the Internet! Get your credit card ready!

Nov 04
2013

Leave a Comment What’s the Point of $1 Million in Insurance for Identity Theft?

Posted by Robert Siciliano in id , entity theft

Robert Siciliano

Honesty is the best policy, right? I’ve spent my life being honest, and do you know what is the most important lesson I’ve learned is? The truth hurts. And when you (meaning me too) says it like it is, someone somewhere isn’t going to like it. So I’m being honest here: The identity theft protection services offering a $1 million identity theft insurance policy is baloney.

Nov 04
2013

Danger: Wireless Toilets Next on Hackers’ List

Posted by Robert Siciliano in Hackers

Robert Siciliano

Just about anything wireless is hackable today. Everything—from PCs to mobiles to tablets to home automation devices to pacemakers to insulin dispensers and even cars—are hackable.

Nov 01
2013

Cybercriminals Camping Out on Hotel WiFi Using Evil Twins

Posted by Robert Siciliano in cybercriminal

Robert Siciliano

When traveling on business or for pleasure, seeking out a reliable WiFi connection is usually a priority for most travelers. While mobile 3G/4G connections satisfy some, the speed of WiFi for laptops or uploading/downloading larger files doesn’t compare.

Oct 29
2013

What is Business or Commercial Identity Theft?

Posted by Robert Siciliano in Identity theft

Robert Siciliano

Business or commercial identity theft happens when thieves use an existing business’ name to get credit, or they may bill a business’ clients for products and services. Sometimes the Social Security number of a company’s officer or another representative is required to commit business identity theft.

Oct 11
2013

Does Identity Theft Protection Really Work?

Posted by Robert Siciliano in Identity theft

Robert Siciliano

Do identity protection service really work? How effective are their scanning/monitoring methods? Can they truly protect consumers? The answers may vary. Identity theft protection is designed to protect you from new lines of credit being opened in your name—and along with the recovery/restoration component, it’s designed to clean up the mess.

Oct 11
2013

Location-based GPS Services are Risky

Posted by Robert Siciliano in GPS

Robert Siciliano

It’s pretty simple: Your mobile’s global positioning system (GPS) functionality allows location-based services to locate and publish information about your whereabouts on various applications and within the code of photos posted online. Various applications allow you to “check in” using your mobile and share your whereabouts with the world. These applications tap into your device’s GPS longitude and latitude data.

Oct 10
2013

Card Issuers Losing $562 in Costs to Grey Charges

Posted by Robert Siciliano in grey charges

Robert Siciliano

Hey merchants, yes you, BillGuard released a report that examined the grey charge problem among US debit and credit cardholders and the service costs impacting card issuers and retailers. The report revealed 11 types of deceptive ‘grey charges’ that retailers use to mislead consumers in their sales and billing practices.

Sep 14
2013

Consumers Hit With $14 Billion in Unwanted Card Charges

Posted by Robert Siciliano in grey charges

Robert Siciliano

A new report by BillGuard examines the problems credit and debit cardholders are having with grey charges. Every year, millions of American consumers are forced or misled into paying fees and charges they never wanted or intended to pay. These charges, called ‘grey charges’, are typically small in nature, buried in terms of service agreements, and are written in a way that often confuses the average consumer.

Sep 14
2013

5 Tips to Becoming Digitally Secure

Posted by Robert Siciliano in digitally secure

Robert Siciliano

Your digital life and your physical life coexist like land and sky which meet at the horizon all day and night. This means while you are present here on the ground, you also exist online. Coming to terms with this reality will help you make better decisions about securing that online self.

Sep 09
2013

5 ways to Protect Privacy on Mobile Devices

Posted by Robert Siciliano in Mobile Devices

Robert Siciliano

Privacy advocates are working to prevent the worst and most extreme outcomes of personal data collection. They know that without checks and balances—without consumers knowing their rights and actively protecting their own privacy and personal data—that data could be used unethically.


Subscribe via Email

 Your Email:
Banner

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps ATM Skimming Audit Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches BS 25999 burglar burglary Business Continuity BYOD change management cheating children pictures Cloud Cloud Security Cobit collaboration Community discussion Compliance computer failure Consumer IT Tips contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud Cross-Device Security Cyber gangs cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersecurity cyberwise data Data Backup Data Breaches data security Data Storage DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport EMV Endpoint Security entity theft Epsilon ERM ESI Ethics Events Facebook FCC FCPA FDIC Federal Government FFIEC Financial Crisis firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs Hackers Hackproof Hacktivism holidays home invasion home security Hotspot HP IAM iCloud id ID Theft Identity theft Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety iOS app iovation IP address iphone iPhone security ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger laptop security Litigation Malware marathon mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog Network Security New Years NFC NFC app Online Backup Online Banking online dating online gaming online identity online privacy online safety Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport passwords PCI Performance Management personal data personal device Personal Security pheasting phishing Policy predator Privacy Prize Draw QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media social network Social Security SOX spammers spokesman Spyware SSDs Standards strangers Strategy tablets tax scams Tech tech support technology Threat Management Tokenization TQM Twitter typosquatting Virus VPN wallet web Webcast Q&A Wi-Fi WIFI WiFi password wireless