User Blogs

User Blogs

Discussions and Blogs
Category >> MyBlog
Mar 30
2015

Frequently Asked Questions About Identity Theft

Posted by Robert Siciliano in Untagged 

Robert Siciliano

I remember my teachers always telling me there are no stupid questions. When it comes to identity theft, this is especially true. The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft.

Mar 26
2015

Hackers for Hire both Good and Bad

Posted by Cinthia Pilar in Untagged 

Cinthia Pilar

Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into your wife’s Facebook account to see if she’s cheating on you.

Mar 25
2015

Everyone is vulnerable to Attack

Posted by Robert Siciliano in Untagged 

Robert Siciliano

There’s the war on drugs, the war on terrorism, the war on cancer and the war on cyber threats. In fact, more people are vulnerable to cyber attacks than they are to the first three threats combined.

Mar 24
2015

Password Security vulnerable to Trickery

Posted by Jessica Hurley in Untagged 

Jessica Hurley

There’s only one entrance to the house: a steel door two feet thick. If someone from the outside touched the door—even with a battering ram—they’ll get an electric shock. No bad guys could get through, right?

Mar 23
2015

Hacking Humans: How Cybercriminals Trick Their Victims

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Intel Security has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the chief way that the cybercriminals do this is via phishing scams—that are designed to take your money.

Mar 18
2015

Attention Lenovo PC Owners: Something’s Fishy with Your Computer

Posted by Robert Siciliano in Untagged 

Robert Siciliano

Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It’s possible if you purchased a Lenovo PC any time in September of 2014 and thereafter.

Mar 17
2015

Stolen Social Security number? Don’t Worry!

Posted by Jessica Hurley in Untagged 

Jessica Hurley

Just when you think it was safe to believe your Social Security number can’t get stolen…news breaks of the Anthem data breach. Over 80,000,000 patient records were compromised, including SSNs and home addresses. Like a meteor striking the earth, a disastrous ripple effect is underway, with patients getting hit up with phishing e-mails.

Mar 14
2015

The White Hat Hacker

Posted by Robert Siciliano in Untagged 

Robert Siciliano

These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year.

Mar 12
2015

Victim overcomes Identity Theft with Art

Posted by Cinthia Pilar in Untagged 

Cinthia Pilar

Does your wallet contain enough information about you for someone to steal your identity and commit crimes under your name? That’s what happened to Jessamyn Lovell when Erin Hart stole her wallet in 2011.

Mar 11
2015

This is what Spy Software looks like

Posted by Robert Siciliano in Untagged 

Robert Siciliano

If you’ve ever watched virtually any spy flick or James Bond movie you’re familiar with “bugs” – those little dime-sized metallic things that the bad guys would secretly stick under someone’s desk to record any conversation in the room—picked up by a receiver in their car. Or, the phone was “tapped” – the device was inside the receiver.

Mar 09
2015

Very effective Social Engineering Scams

Posted by Robert Siciliano in Untagged 

Robert Siciliano

It’s amazing how ingenious cybercriminals are, but the victims also need to take some responsibility for falling for these ruses, especially when the victim is a business that has failed to train its employees in cybersecurity measures.

Mar 07
2015

How the Internet of Things is further killing Privacy

Posted by Jessica Hurley in Untagged 

Jessica Hurley

Privacy used to mean changing clothes behind a partition. Nowadays, say “privacy” and people are likely to think in terms of cyberspace. Stay connected, and you risk losing your privacy.


Subscribe via Email

 Your Email:
Banner

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps atm safety ATM scams atm security ATM Skimming Audit authentication Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches Browser Security BS 25999 burglar burglary Business Continuity BYOD card fraud change management cheating children pictures Cloud Cloud Security Cobit collaboration Community discussion Compliance computer failure Consumer Fraud Consumer IT Tips consumer privacy consumer scams contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud criminal Criminal Hackers Criminal Identity Theft Cross-Device Security customer privacy cyber crime cyber criminals cyber fraud Cyber gangs cyber invasion cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersafety cybersecurity cyberwise data Data Backup data breach Data Breaches data privacy data security Data Storage data theft DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport email and web security EMV Endpoint Security entity theft Epsilon ERM ESI ethical hacker Ethics Events Facebook Facebook privacy facebook safety tips facebook scam FCC FCPA FDIC Federal Government FFIEC Financial Crisis financial fraud firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming google alerts Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs hacked hacker Hackers hacking Hackproof Hacktivism holidays home burglar home invasion home security Hotspot HotSpot Shield VPN HP IAM iCloud id ID Theft identity fraud identity proofing identity protection Identity theft identity theft prevention identity theft protection Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety internet tracking investment fraud iOS app iovation IP address iphone iphone apps iPhone security IRS IRS Scams ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger kids privacy kids safety laptop security license linkedin scam Litigation lottery scam Malware malware phishing marathon master password mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile phone security mobile privacy mobile risks mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog netgear Network Security New Years NFC NFC app Online Backup Online Banking online dating online fraud online gaming online identity online privacy online safety online scams Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport password password alert password manager password security passwords PCI Performance Management personal data personal device Personal Security pheasting phishing phishing alert Phishing email phishing scams Policy predator Privacy privacy and security privacy issues privacy policy Prize Draw protecting kids online proxy proxy server public WIFI QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management router RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping Shoulder Surfers shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media Social Media privacy social media safety social media scams Social Media security social network Social Security SOX spam spammers spokesman Spyware SSDs ssn Standards strangers Strategy tablets tax fraud tax return scams tax scam tax scams Tech tech support technology Threat Management Tokenization TQM trojan Twitter typosquatting Virus viruses VPN wallet web Webcast Q&A Wi-Fi WIFI wifi hacking WiFi password Wifi security wireless Worms
Banner

air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher air max pas cher air max 90 pas cher nike air max pas cher air max pas cher nike tn pas cher nike air max pas cher nike tn nike tn pas cher tn pas cher louboutin pas cher chaussure louboutin pas cher louboutin soldes air max pas cher air max pas cher nike air max pas cher doudoune moncler pas cher doudoune moncler barbour paris barbour paris pas cher hogan outlet hogan outlet online scarpe hogan outlet tiffany outlet tiffany outlet italia air jordan air jordan pas cher jordan pas cher air jordan site officiel