Finextra Research
Sign in
Sign up
  • News
    • Latest news
    • Company updates
    • Long reads
  • TV
  • Research
  • Events
    • All
    • Conferences
    • Webinars
    • Popular
  • Community
    • Community latest
    • Latest expert opinions
    • Groups
    • Search members
  • Jobs
  • APIs
Sign in
Sign up
  • News
    • Back
    • News
    • Latest news
    • Company updates
    • Long reads
  • TV
  • Research
  • Events
    • Back
    • Events
    • All
    • Conferences
    • Webinars
    • Popular
  • Community
    • Back
    • Community
    • Community latest
    • Latest expert opinions
    • Groups
    • Search members
  • Jobs
  • APIs
  • payments
  • markets
  • retail
  • wholesale
  • wealth
  • regulation
  • crime
  • crypto
  • sustainable
  • startups
  • devops
  • identity
  • security
  • cloud
  • ai

Community

  • Your feed
  • Latest expert opinions
  • Groups

Join the Community

23,453
Expert opinions
42,331
Total members
299
New members (last 30 days)
174
New opinions (last 30 days)
29,126
Total comments
Join Sign in
Follow Unfollow

Robert Siciliano

Security Analyst
Safr.me
Member since
04 Feb 2009
Location
Boston
Followers
8
Following
0
Opinions
855
Long reads
0
Followed by John Sims, Martha Boyle and 5 others you follow
View Robert Siciliano's full profile

Robert's opinions

clear
Robert Siciliano

Criminal Hackers: The Soldiers of the Web Mob

Today’s criminal hackers are very different than those who hacked for fun and fame a decade ago. Every week, I see stories about more criminals in faraway lands, making millions from various scams, emptying the bank accounts of small businesses or draining the financial reserves of entire towns. High-tech crimes can be committed by lone individual...

11 November 2010 /security /regulation

Robert Siciliano

Botnets Turn Your PC into A Zombie

A botnet is a group of Internet-connected personal computers that have been infected by a malicious application, which allows a hacker to control the infected computers without alerting the computer owners. Since the infected PCs are controlled remotely by a single hacker, they are known as bots, robots, or zombies. Consumers’ and small businesses...

06 November 2010 /security /regulation

Robert Siciliano

Spear Phishers Know Your Name

“Spear phishing” refers to phishing scams that are directed at a specific target. Like when Tom Hanks was stranded on the island in the movie Cast Away. He whittled a spear and targeted specific fish, rather than dropping a line with bait and catching whatever came by. When phishing attacks are directed at company officers or senior executives, it...

05 November 2010 /security /regulation

Robert Siciliano

Identity Theft Part 2 5 More Identity Theft Myths Unveiled

#1 Publically available information is not valuable to an identity thief. If I was an identity thief I’d start with the phone book. All information about you is of value to an identity thief. The bad guy gathers as much intelligence about you as possible. Once they get enough data to become you they are off and running. The breadcrumbs we leave be...

03 November 2010 /security /regulation

Robert Siciliano

Part 1 of Identity Theft 5 Identity Theft Myths Unveiled

#1 You can’t protect yourself from identity theft. Some, not all Identity theft is preventable. There are many things people can do to minimize their risk, both online and offline. Shred anything that has names and account numbers or any other data that can be used to con someone else into divulging even more information. Keep financial records p...

01 November 2010 /security /regulation

Robert Siciliano

Top Ten Most Dangerous Places to Leave Your SS Number

Universities/Colleges are the Riskiest Cases of identity theft are skyrocketing, and 32% of all ID theft victims had their social security number compromised according to Javelin’s 2010 Identity Fraud Survey Report. In honor of National Identity Protection week, McAfee set out to reveal the most dangerous places to leave your social security numb...

01 November 2010 /security /regulation

Robert Siciliano

Mobile Phone Security Under Attack

As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for content creators’ latest innovations, which often require more and more device access. As applications and other content are more widely distributed, security breaches will be inevitable. The s...

01 November 2010 /security /regulation

Robert Siciliano

5 Sneaky Credit Card Scams

#1 Phone Fraud. The phone rings, a scammer poses as your banks fraud department. They may have your entire card number stolen from another source. They ask about a charge made and you deny the charge, but in order for the charge to be removed, they need your 3-4 digits CVV number off the front or back of the card. A variation may be they only hav...

01 November 2010 /security /regulation

Robert Siciliano

Five Ways Identities Are Stolen Online

Cybercrime has become a trillion dollar issue. In a recent survey, hundreds of companies around the world estimated that they had lost a combined $4.6 billion in intellectual property as a result of data breaches, and spent approximately $600 million repairing the damage. Based on these numbers, projections are that companies lost more than a tril...

27 October 2010 /security /regulation

Robert Siciliano

7 Ways to Combat Scareware

You may have seen this before, it goes like this: a pop-up pops and it looks like a window on your PC. Next thing a scan begins. It often grabs a screenshot of your “My Computer” window mimicking your PCs characteristics then tricking you into clicking on links. The scan tells you that a virus has infected your PC. And for $49.95 you can download ...

19 October 2010 /security /regulation

  • 1
  • 3
  • 4
  • 5
  • 6
  • 13

Robert writes about

  • artificial intelligence
  • security
  • payments
  • regulation & compliance
  • retail banking
  • identity

Robert's opinion archive

  • 2025 (2)
  • 2024 (3)
  • 2023 (10)
  • 2020 (5)
  • 2019 (11)
  • 2018 (21)
  • 2017 (7)
  • 2016 (28)
  • 2015 (73)
  • 2014 (71)
  • 2013 (51)
  • 2012 (43)
  • 2011 (72)
  • 2010 (129)

Robert reads

  • Twitter
  • LinkedIn
  • YouTube
  • My Website
ShowHide similar members

Similar members

Alon Refaeli

Alon Refaeli
Security Analyst at Secured Zones Technologies Ltd.

Follow Unfollow

Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.

Please read our Privacy Policy.

Accept
Finextra

Finextra

  • About

Community

  • Rules
  • Contact the community team

News

  • Guidance
  • Contact the news desk

Sales

  • Media pack
  • Contact the sales team

Get involved

  • Finextra Live@
  • Webinars
  • Finextra TV
  • Research
  • Finextra.jobs

Events

  • Sustainable Finance Live
  • NextGen Nordics
  • EBAday
  • NextGen:AI
Join the community Register for news alerts
Apple App Store Google App Store

© Finextra Research 2025

Terms of usePrivacy PolicyCookie Centre