It’s easy to scam someone who did something wrong by telling them they need to fix their mistake. This is why thousands of people get scammed into paying back taxes to the IRS—the IRS has nothing to do with these scams, of course, but the predators prey on peoples’ fear of Uncle Sam. It all begins with the fraudster making a phone call, pretending to be an IRS employee.
They have other tricks up their sleeve too, such as making the caller ID show a number that…Continue
Added by Robert Siciliano on March 31, 2015 at 4:27pm — No Comments
I remember my teachers always telling me there are no stupid questions. When it comes to identity theft, this is especially true. The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft.
What is identity theft?
Identity theft is when a person pretends to be you to access money, credit, medical care, and other benefits. They acquire…Continue
Added by Robert Siciliano on March 30, 2015 at 8:42pm — No Comments
Developing a schedule needs to be approached with success in mind. Dividing the project or portfolio into smaller manageable pieces called sub-projects is a good principle, a strategy acceptable and…Continue
Added by RUFRAN C. FRAGO on March 30, 2015 at 1:30am — No Comments
Give me a break! In the next month, students will get the week off for spring break—a much needed reward after months of hard work and, for some, gnarly winter weather. Spring break means free time, family vacations, trips with friends, and timeless memories.
But, spring break can pose some risks to your online reputation and your identity. So whether you are going to party it up in the Caribbean or you are taking the kids to Disney World, here are some tips to keep…Continue
Added by Robert Siciliano on March 29, 2015 at 9:28pm — No Comments
Here’s good advice from a sheriff’s office about how to protect your house.
Burglars and home invaders don’t give a flying hoot if you keep thinking, “It can’t happen to me and this is a safe neighborhood.” In fact, the issue isn’t how safe your neighborhood is or how watchful your neighbors are. The issue is how easy it is to simply break into your home.
Think of the other safety precautions you take daily even though the odds of an unfortunate outcome are…Continue
Added by Robert Siciliano on March 28, 2015 at 3:35pm — No Comments
In the event of an attack, new smartphone applications can be used to send an alarm to a pre-chosen person. And the potential victims location can then be tracked.
But is this faster and more secure than a woman whipping out pepper spray and blasting a drunken buffoon who has her cornered in a parking garage at night?
Apps meant for personal security are simply one layer of protection but in no way should be relied upon for personal protection. I…Continue
Added by Robert Siciliano on March 27, 2015 at 3:20pm — No Comments
Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into your wife’s Facebook account to see if she’s cheating on you.
However, there’s at least one hackmaking site that matches hackers to clients who want to infiltrate a network for personal gain or even revenge. The site, Hacker’s List, is a good idea,…Continue
Added by Robert Siciliano on March 26, 2015 at 3:44pm — No Comments
There’s the war on drugs, the war on terrorism, the war on cancer and the war on cyber threats. In fact, more people are vulnerable to cyber attacks than they are to the first three threats combined.
So pervasive is this threat that President Obama fully recognizes that everyone is at risk. He even signed an executive order recently in the hopes of promoting the sharing of more cybersecurity related data between the government and the private sector.
Added by Robert Siciliano on March 25, 2015 at 3:39pm — No Comments
Added by Enrique Suarez on March 25, 2015 at 5:25am — No Comments
Added by Enrique Suarez on March 25, 2015 at 12:00am — No Comments
There’s only one entrance to the house: a steel door two feet thick. If someone from the outside touched the door—even with a battering ram—they’ll get an electric shock. No bad guys could get through, right?
Well, suppose the bad guy tricks the homeowner into opening the door…and once open, the bad guy strangles the homeowner. Do you see what happened? All that security is worthless if the homeowner can be tricked. And the same goes for passwords. You can have the…Continue
Added by Robert Siciliano on March 24, 2015 at 3:48pm — No Comments
Intel Security has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the chief way that the cybercriminals do this is via phishing scams—that are designed to take your money.
The fact that two-thirds of all the emails out there on this planet are phishy tells me that there’s a heck of a lot of people out there who are easily duped into giving over their money. I’m…Continue
Added by Robert Siciliano on March 23, 2015 at 3:27pm — No Comments
The Global Competitiveness Report 2014-2015 assesses the competitiveness landscape of 144 economies, providing insight into the drivers of their productivity and prosperity. The report remains the most comprehensive assessment of national competitiveness worldwide, providing a platform for dialogue between government, business and civil society about the actions required to improve economic prosperity. Competitiveness is defined as the set of…Continue
Added by Enrique Suarez on March 22, 2015 at 1:00am — No Comments
Added by Enrique Suarez on March 21, 2015 at 6:56pm — No Comments
Global Inequality: The World’s 400 Richest Billionaires Get Richer, Adding $92bn in 2014
Added by Enrique Suarez on March 21, 2015 at 3:21pm — No Comments
“In prison, illusions can offer comfort.” – Nelson Mandela…Continue
Added by Enrique Suarez on March 21, 2015 at 1:00pm — No Comments
Added by Enrique Suarez on March 20, 2015 at 6:03am — No Comments
This blog from Pete Cook about aiming to fail 50% of your projects each quarter is so right in the context of risk and decision making. All my research, whether it is McKinsey Global Surveys or academic research such as the work of Professor…Continue
Added by Bryan Whitefield on March 19, 2015 at 1:26am — No Comments
Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It’s possible if you purchased a Lenovo PC any time in September of 2014 and thereafter.
This Superfish software intercepts the Lenovo user’s traffic so that the user sees ads displayed that reflect their browsing habits. The problem with this targeted advertising scheme is that it comes with a vulnerability that makes it easy for hackers to attack.
Added by Robert Siciliano on March 18, 2015 at 7:55pm — No Comments
Just when you think it was safe to believe your Social Security number can’t get stolen…news breaks of the Anthem data breach. Over 80,000,000 patient records were compromised, including SSNs and home addresses. Like a meteor striking the earth, a disastrous ripple effect is underway, with patients getting hit up with phishing e-mails.
If you ever suspect your SSN has been stolen, some suggest contacting the IRS and Social Security Administration and notify them of…Continue
Added by Robert Siciliano on March 17, 2015 at 3:50pm — No Comments