User Blogs

User Blogs

A short description about your blog
Aug 28
2015

Meet the FBI's most wanted Hackers

Posted by Robert Siciliano in Hackers , ethical hacker , Criminal Hackers

Robert Siciliano

Want to earn up to $4.2 million? Then find the hackers on the FBI’s most wanted list. Or at least give the FBI information leading to their arrest and/or conviction. These snakes have stolen hundreds of millions of dollars. Here is the list from the hackernews.com:

Aug 27
2015

Want Mobile Privacy? Read

Posted by Robert Siciliano in mobile security , mobile risks , mobile privacy

Robert Siciliano

If you don’t want your smartphone to know more about you than you do, here are top choices, as detailed on gizmodo.com:

Aug 26
2015

What's the difference between VPNs and Proxies and which is secure?

Posted by Robert Siciliano in VPN , proxy server , proxy

Robert Siciliano

If you are overseas somewhere and want to access your Facebook page…don’t be surprised if you can’t do this. In fact, you won’t even be able to get onto the Facebook site (or YouTube, for that matter), depending on what country that you are visiting. This is because some countries limit website access for their citizens.

Aug 25
2015

Zeus Malware Gang take-down

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Zeus is no longer a god of malware; he’s been taken down by law enforcement agencies spanning six European nations. Five people were recently arrested—believed to have infected tens of thousands of computers across the globe. There have been 60 total arrests pertaining to this cybergang.

Aug 20
2015

UL to launch Cybersecurity Cert

Posted by Robert Siciliano in cyber invasion , cyber fraud , cyber crime

Robert Siciliano

UL in this case stands for Underwriters Laboratories. An article on darkreading.com notes that a UL official, Maarten Bron, says that they are taking part in the U.S. government’s plan to promote security certification standards.

Aug 18
2015

How to stop Browser Tracking

Posted by Robert Siciliano in Online Security , online privacy , Browser Security

Robert Siciliano

Maybe you don’t mind the ads for that bicycle rack following you around in cyberspace after you visited a site for all things bike, but browser trackers (“cookies”) also create a profile of you that gets sold to other advertisers and third parties.

Aug 14
2015

Company for sale includes your Data

Posted by Robert Siciliano in data theft , data security , data privacy , data breach

Robert Siciliano

When you subscribe to an online service, be careful of how much information you give out about yourself.

Aug 12
2015

Beware of these 10 Nasty Scams

Posted by Robert Siciliano in phishing scams , online scams

Robert Siciliano

Let’s look at the top 10 scams (random order).

Aug 11
2015

Hacker isn't a bad Word

Posted by Robert Siciliano in home burglar , hacker , cyber criminals

Robert Siciliano

Did you know that the original meaning of hacker, as far as computers, was that of a person who built codes into computers? In fact, the bad guy was called a “cracker.” Somehow, “cracker” didn’t catch on. But the mainstream folk out there hears “hacker,” and right away, they think of a digital thief, often someone who breaks into governmental computer systems or Russian “hacking rings” that steal credit card numbers.

Aug 07
2015

Passwords in Real Life: Don't be Lazy

Posted by Robert Siciliano in password security , password manager , password

Robert Siciliano

It’s tough being responsible sometimes. And managing responsibilities for what is precious in your life usually takes a little extra thought.  Let’s say you’ve just welcomed a beautiful set of triplets into the world.  Lucky you . . . and lots to managed! But, you wouldn’t give all these babies the same name simply to make it easier to remember, right?

Aug 05
2015

Private Investigator faces Jail for Hacking

Posted by Robert Siciliano in hacking , hacker

Robert Siciliano

What a disgrace: A private investigator, Eric Saldarriaga, 41, got nailed for hacking into peoples’ e-mails. He may get six months in the can. Is six months reasonable for this, though?

Aug 04
2015

A look into Cyber Weapons of the Future

Posted by Robert Siciliano in Cyber Security , cyber invasion , cyber crime

Robert Siciliano

Remember the good ‘ol days when you thought of a finger pushing a button that launched a Russian missile that then sped at seven miles per second towards the U.S. to blow it up?

  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  6 
  •  7 
  •  8 
  •  9 
  •  10 
  •  Next 
  •  End 
  • »

Subscribe via Email

 Your Email:
Banner

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps atm safety ATM scams atm security ATM Skimming Audit authentication Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches Browser Security BS 25999 burglar burglary Business Continuity BYOD card fraud change management cheating children pictures Cloud Cloud Security Cobit collaboration Community discussion Compliance computer failure Consumer Fraud Consumer IT Tips consumer privacy consumer scams contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud criminal Criminal Hackers Criminal Identity Theft Cross-Device Security customer privacy cyber crime cyber criminals cyber fraud Cyber gangs cyber invasion cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersafety cybersecurity cyberwise data Data Backup data breach Data Breaches data privacy data security Data Storage data theft DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport email and web security EMV Endpoint Security entity theft Epsilon ERM ESI ethical hacker Ethics Events Facebook Facebook privacy facebook safety tips facebook scam FCC FCPA FDIC Federal Government FFIEC Financial Crisis financial fraud firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming google alerts Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs hacked hacker Hackers hacking Hackproof Hacktivism holidays home burglar home invasion home security Hotspot HotSpot Shield VPN HP IAM iCloud id ID Theft identity fraud identity proofing identity protection Identity theft identity theft prevention identity theft protection Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety internet tracking investment fraud iOS app iovation IP address iphone iphone apps iPhone security IRS IRS Scams ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger kids privacy kids safety laptop security license linkedin scam Litigation lottery scam Malware malware phishing marathon master password mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile phone security mobile privacy mobile risks mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog netgear Network Security New Years NFC NFC app Online Backup Online Banking online dating online fraud online gaming online identity online privacy online safety online scams Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport password password alert password manager password security passwords PCI Performance Management personal data personal device Personal Security pheasting phishing phishing alert Phishing email phishing scams Policy predator Privacy privacy and security privacy issues privacy policy Prize Draw protecting kids online proxy proxy server public WIFI QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management router RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping Shoulder Surfers shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media Social Media privacy social media safety social media scams Social Media security social network Social Security SOX spam spammers spokesman Spyware SSDs ssn Standards strangers Strategy tablets tax fraud tax return scams tax scam tax scams Tech tech support technology Threat Management Tokenization TQM trojan Twitter typosquatting Virus viruses VPN wallet web Webcast Q&A Wi-Fi WIFI wifi hacking WiFi password Wifi security wireless Worms
Banner

air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher air max pas cher air max 90 pas cher nike air max pas cher air max pas cher nike tn pas cher nike air max pas cher nike tn nike tn pas cher tn pas cher louboutin pas cher chaussure louboutin pas cher louboutin soldes air max pas cher air max pas cher nike air max pas cher doudoune moncler pas cher doudoune moncler barbour paris barbour paris pas cher hogan outlet hogan outlet online scarpe hogan outlet tiffany outlet tiffany outlet italia air jordan air jordan pas cher jordan pas cher air jordan site officiel