Okay, so you’re 18 or 19 and in college, and are stressed because you have to be 21 in order to gain entry to a night club or bar where you’d like to drink up a storm and mingle with a “more mature” crowd. Or really, you just want to meet someone.
Life sure is tough, isn’t it? You have to wait till you’re 21, but by then…you may be graduated from college (and a lot more mature, and thus, getting plastered would no longer have appeal). What a bummer, dude! The time to…Continue
Added by Robert Siciliano on October 29, 2015 at 3:30pm — No Comments
Imagine that Chris wants to buy a house and needs a mortgage. He applies online and is sent an email by an intern asking to schedule time to discuss his interest. The intern conducts the initial screening…Continue
There are numerous subspecialties within the booming cybersecurity field[i]. Here are some of the most in-demand professions:
Cybersecurity Engineer: This is the all-around, jack-of-all-trades, go-to guy or gal of cybersecurity. For all intents and purposes, a cybersecurity engineer is a hacker – but a good one. Using their advanced knowledge of malware, viruses, theft, DDoS attacks and other digital threats, cybersecurity engineers…Continue
Added by Robert Siciliano on October 28, 2015 at 3:07pm — No Comments
It can be tough being a responsible adult sometimes, and managing these responsibilities isn’t always a chore that I want to deal with. Can you relate? Managing life takes focus and effort, and managing your online life is no different. Most of us are lazy with our online accounts, especially when it comes to our passwords. It is easy to use the same password for every account, but this also makes it very easy for hackers to access your passwords.
You Need a…Continue
Added by Robert Siciliano on October 27, 2015 at 3:47pm — No Comments
Companies that cut corners by giving cybersecurity training only to their technical staff and the “big wigs” are throwing out the welcome mat to hackers. Cyber criminals know that the ripe fruit to pick is a company’s sales staff. Often, the sales personnel are clueless about the No. 1 way that hackers “get in”: the phishing e-mail. Salespeople are also vulnerable to falling for other lures generated by master hackers.
Added by Robert Siciliano on October 27, 2015 at 3:46pm — No Comments
If I wanted to crack one of your passwords, I could probably make a series of educated guesses and get pretty close. Why? Because people tend to stick with simple, easy to remember passwords, but these are the passwords that are easy to hack. According to Bill Carey, VP Marketing for the RoboForm Password Manager “Users need to take personal responsibility for their passwords and not assume that companies will keep…Continue
Added by Robert Siciliano on October 26, 2015 at 2:52pm — No Comments
There are many reasons someone might right-click on your image and “Save image as…”
Porn, Sex and Dating Sites
Added by Robert Siciliano on October 25, 2015 at 4:20pm — No Comments
There’s a problem on the home front: security lapses in the computers of the Secret Service and Immigration and Customs Enforcement, says a report on townhall.com. These departments were recently audited, and weaknesses were revealed.
Recently, hackers got into the White House, State Department and the Office of Personnel Management, among other entities. And this has caused the public to wonder about just how strong cybersecurity is for the U.S. government. So thus,…Continue
Added by Robert Siciliano on October 25, 2015 at 4:19pm — No Comments
If you have made the decision to use a password manager for your personal cybersecurity, which I highly recommend, you will quickly find that you online world is safer, easier and more secure than ever before.
According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager, 63% of respondents reported forgetting a password, or had a password become…Continue
Added by Robert Siciliano on October 24, 2015 at 3:54pm — No Comments
Added by Enrique Suarez on October 24, 2015 at 2:06am — No Comments
One difference between a credit card and a debit card is that if there’s an unauthorized charge on your credit card, you just get a little sting. It’s a hassle to straighten out. But no money is taken from you.
But if someone gets ahold of your debit card information, the second they use it, depending on the nature of the transaction, your bank account will be drained. And in some cases, you can kiss that money goodbye; you got scorched. More than ever, crooks are…Continue
Added by Robert Siciliano on October 22, 2015 at 3:53pm — No Comments
There are many prominent cybersecurity companies, including FireEye and Symantec. These companies “focus on blocking or detecting intrusions as they occur or responding to attacks after the fact,” …Continue
Added by Steven Minsky on October 20, 2015 at 9:30pm — No Comments
You’ve seen TV commercials and print ads about identity theft, and the “victim” is always an adult. That’s not realistic. The actor-portrayal should be that of a child. Yes, a kid.
Children are 51 times more likely than adults to have their identity stolen, says research from Carnegie Mellon University’s CyLab.
Crooks want kids’ Social Security numbers. And crooks like the fact that kids are debt-free. Wow, with no debt to the child’s name, the thief could…Continue
Added by Robert Siciliano on October 20, 2015 at 3:35pm — No Comments
Added by Enrique Suarez on October 20, 2015 at 2:48am — No Comments
Added by Enrique Suarez on October 20, 2015 at 2:30am — No Comments
Added by Enrique Suarez on October 19, 2015 at 5:34pm — No Comments
If you are like me, you have several online accounts, each with a user name and password. Though it is tempting to use one password for every account, this can be troublesome as it is a huge security risk. So, what is your only option? To use a password manager.
According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager:
Added by Robert Siciliano on October 19, 2015 at 3:56pm — No Comments
Who has time to think about identity protection when planning a wedding? And why, for that matter? Well, there’s good reason: Marriage begets a change in identities. The months preceding the big day should be when the couple starts taking action to avoid identity theft.
Added by Robert Siciliano on October 18, 2015 at 4:00pm — No Comments
Consider a keychain for a moment. For most of us, a keychain holds all of our necessities such as home keys, car keys, work keys and even forgotten keys, that we aren’t quite sure what to do with. Now, think about this. What if your keychain had keys that look identical, but each key only opens one door.
If you are like most people, this key scenario is almost identical to the way you treat your account passwords online. What happens when you want to use a key, but…Continue
Added by Robert Siciliano on October 17, 2015 at 4:18pm — No Comments
Nobody likes surprises in business. Using a risk-based approach to identify your organization’s likely vulnerabilities is highly recommended and vital to short-term and long-term success. Expanding regulations make compliance increasingly complex and expensive, and increases in deficient internal audit controls have heightened scrutiny of companies by the SEC,…Continue
Added by Steven Minsky on October 16, 2015 at 5:00pm — No Comments