User Blogs

User Blogs

Discussions and Blogs
May 06
2014

Healthcare Data under Attack

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Crooks want your health information. Why?

May 06
2014

15 Tips to Prepare for Big and Small Security Threats

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Businesses that focus on the big security breach may very well be missing the smaller threats that can do serious damage.

May 05
2014

Beware of the Green Dot scam

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Scammers are at it again, this time with green dot cards: a pre-paid debit card available at stores. It can work like this:

May 03
2014

What is Social Engineering?

Posted by Robert Siciliano in Untagged 

Robert Siciliano

No, it’s not some new engineering field to develop social media sites. Social engineering has been around as long as the con artist has been around. The terms stems from the social science world where social engineering is deemed as an act of psychological manipulation.

May 01
2014

Courts side with Consumers in Data Breach

Posted by Robert Siciliano in Untagged 

Robert Siciliano

In general, courts don’t tend to side with consumers in data breach incidents. However, a federal court in Florida is the apple among the oranges. It approved a $3 million settlement for victims whose data was on a stolen laptop in December 2009, that contained personal health information.

Apr 27
2014

The Future of Identity Theft

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Identity theft evolves as technology progresses. The Identity Theft Resource Center explains the future of this crime.

Apr 24
2014

National Retail Federation pushes for Chip and PIN

Posted by Robert Siciliano in Untagged 

Robert Siciliano

The recent major retail breaches have fueled increased interest by the National Retail Federation to push for implementation of a chip and PIN payment card technology. This would make the magnetic strips on payment cards obsolete and no longer a calling card for hackers.

Apr 23
2014

Healthcare Records vulnerable to Criminals

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Just about every kind of healthcare related entity—hospitals, rehab centers, pharma companies, insurance carriers and more—have been and continue to be compromised by cyber criminals.

Apr 21
2014

Data Brokers: What Are They; How to Get Control of Your Name

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Data brokers have lots of personal information about you; here’s what you can do about that.

Apr 17
2014

Financial Services and Retail band together to fight Fraud

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Finally, retailers and banks have agreed to work together to fight data breach incidents, foregoing the finger-pointing of who’s responsible for prevention and recovery.

Apr 16
2014

This Earth Day, “Clean” Your Device Before You Recycle It

Posted by Robert Siciliano in Untagged 

Robert Siciliano

One man’s trash is another man’s new identity? Yes, because that “junk mail” you toss in the garbage contains valuable data about yourself. A crook bent on identity theft can potentially have a field day with your discarded pre-approved credit card applications, bank statements, etc. Using a paper shredder before throwing out letters and documents such as these will help protect you and your family.

Apr 16
2014

Data Security Legislation is inevitable

Posted by Robert Siciliano in Untagged 

Robert Siciliano

A law(s) for data breaching is around the corner. And the time is right, what with the scads of data breaches involving major retailers lately. Details of customers’ addresses, phone numbers, credit cards and other sensitive information have ended up in the hands of hackers. We’re talking many tens of millions of affected consumers.


Subscribe via Email

 Your Email:
Banner

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps ATM Skimming Audit authentication Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches Browser Security BS 25999 burglar burglary Business Continuity BYOD card fraud change management cheating children pictures Cloud Cloud Security Cobit collaboration Community discussion Compliance computer failure Consumer Fraud Consumer IT Tips consumer privacy consumer scams contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud criminal Criminal Identity Theft Cross-Device Security cyber crime cyber fraud Cyber gangs cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersecurity cyberwise data Data Backup Data Breaches data privacy data security Data Storage DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport email and web security EMV Endpoint Security entity theft Epsilon ERM ESI Ethics Events Facebook Facebook privacy facebook safety tips facebook scam FCC FCPA FDIC Federal Government FFIEC Financial Crisis financial fraud firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs hacked Hackers hacking Hackproof Hacktivism holidays home invasion home security Hotspot HotSpot Shield VPN HP IAM iCloud id ID Theft identity fraud identity proofing identity protection Identity theft identity theft prevention identity theft protection Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety internet tracking iOS app iovation IP address iphone iphone apps iPhone security IRS IRS Scams ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger kids privacy kids safety laptop security license linkedin scam Litigation lottery scam Malware malware phishing marathon master password mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile phone security mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog netgear Network Security New Years NFC NFC app Online Backup Online Banking online dating online fraud online gaming online identity online privacy online safety online scams Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport password password manager password security passwords PCI Performance Management personal data personal device Personal Security pheasting phishing phishing scams Policy predator Privacy privacy and security privacy policy Prize Draw protecting kids online public WIFI QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management router RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping Shoulder Surfers shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media social media scams social network Social Security SOX spam spammers spokesman Spyware SSDs ssn Standards strangers Strategy tablets tax fraud tax return scams tax scam tax scams Tech tech support technology Threat Management Tokenization TQM trojan Twitter typosquatting Virus viruses VPN wallet web Webcast Q&A Wi-Fi WIFI wifi hacking WiFi password Wifi security wireless Worms
Banner