Finextra Research
Sign in
Sign up
  • News
    • Latest news
    • Company updates
    • Long reads
  • TV
  • Research
  • Events
    • All
    • Conferences
    • Webinars
    • Popular
  • Community
    • Community latest
    • Latest expert opinions
    • Groups
    • Search members
  • Jobs
  • APIs
Sign in
Sign up
  • News
    • Back
    • News
    • Latest news
    • Company updates
    • Long reads
  • TV
  • Research
  • Events
    • Back
    • Events
    • All
    • Conferences
    • Webinars
    • Popular
  • Community
    • Back
    • Community
    • Community latest
    • Latest expert opinions
    • Groups
    • Search members
  • Jobs
  • APIs
  • payments
  • markets
  • retail
  • wholesale
  • wealth
  • regulation
  • crime
  • crypto
  • sustainable
  • startups
  • devops
  • identity
  • security
  • cloud
  • ai

Community

  • Your feed
  • Latest expert opinions
  • Groups

Join the Community

23,409
Expert opinions
42,310
Total members
272
New members (last 30 days)
166
New opinions (last 30 days)
29,114
Total comments
Join Sign in
Follow Unfollow

Robert Siciliano

Security Analyst
Safr.me
Member since
04 Feb 2009
Location
Boston
Followers
8
Following
0
Opinions
855
Long reads
0
Followed by John Sims, Martha Boyle and 5 others you follow
View Robert Siciliano's full profile

Robert's opinions

clear
Robert Siciliano

10 most dangerous Facebook Scams

Twenty percent of the world’s population is “on” Facebook—that’s well over a billion people Top 10 Most Popular Facebook Scams Profile visitor stats. It’s all about vanity. It doesn’t take long for any new Facebook user to see an ad offering to reveal how many people are viewing your profile. You can even find out who’s viewing. It must make a l...

20 September 2014 /security

Robert Siciliano

Is private NSA proof E-mail possible?

You can buy encryption tools to prevent people from reading the contents of your e-mails should they intercept them. But what about those who have NSA-caliber resources and skills? The problem is that encryption services usually leave wide open the e-mail’s metadata: e.g., sender, recipient, subject line and timestamp. But a new service, ShazzleM...

18 September 2014 /security

Robert Siciliano

Identity proofing proves who You are

Identity proofing is proof of whom you are. Proving one’s identity starts with that person answering questions that only they themselves can answer (even if the answers are fictitious), such as their favorite movie, mother’s maiden name or name of their high school. Since most people provide real answers (that can be found online) rather than “Poi...

16 September 2014 /security

Robert Siciliano

Are All Hackers Bad?

The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about hackers stealing data from large companies and the government. Hackers are the bad guys. But are they? Tesla just recently announced they are hirin...

09 September 2014 /security

Robert Siciliano

How to Secure Your iCloud

By now you’ve heard that Jennifer Lawrence’s (and other celebs’) cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the “Find My iPhone” app. Someone anonymously posted nude photos of Jennifer Lawrence and Kate Upton to the 4Chan site, and the stars confirmed the photos w...

03 September 2014 /security

Robert Siciliano

Family Identity Theft is Ugly

Identity theft isn’t just the stuff of exciting movie and TV dramas; this happens in real life—and often. In fact, that Target breach that made headlines, Neiman Marcus, those 1. 2 Billion records the Russian cyber gang hacked: all identity theft. In 2012, according to one research firm, 12.6 million people in the U.S. alone were victims of ID fr...

29 August 2014 /security

Robert Siciliano

Best Way to Destroy a Computer Virus

Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many different kinds of computer viruses (such as worms, Trojans, spyware) are called malware: malicious software. In general, security software comes with i...

27 August 2014 /security

Robert Siciliano

How to tell if your Computer has a Virus

Your computer probably has a virus if you can answer “Yes” to any of the questions below: Is your computer running quite slowly? A virus often causes a computer to run slowly. But realize that this symptom can also mean that a computer needs more memory, or that the hard disk needs defragmenting. It can also mean spyware or adware is present. Are...

25 August 2014 /security

Robert Siciliano

Prepaid Cards risk of Fraud

Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire money for that new car or vacation package is most probably a rip-off. And the crooks behind these rackets are figuring out ways to overcome the incr...

22 August 2014 /security

Robert Siciliano

Beware of 5 Summertime Scams

The Better Business Bureau says beware of big summertime scams: five in particular. “Wow, it’s a steal!” No, that’s not necessarily from the customer; it’s from the crook who entices the consumer with an irresistible deal involving airfare and room and board. If you see a deal that seems too good to be true, do an online search of the associated...

17 August 2014 /security

  • 1
  • 2
  • 3
  • 5
  • 6
  • 10

Robert writes about

  • artificial intelligence
  • security
  • payments
  • regulation & compliance
  • retail banking
  • identity

Robert's opinion archive

  • 2025 (2)
  • 2024 (3)
  • 2023 (10)
  • 2020 (5)
  • 2019 (11)
  • 2018 (21)
  • 2017 (7)
  • 2016 (28)
  • 2015 (73)
  • 2014 (71)
  • 2013 (51)
  • 2012 (43)
  • 2011 (72)
  • 2010 (129)

Robert reads

  • Twitter
  • LinkedIn
  • YouTube
  • My Website
ShowHide similar members

Similar members

Alon Refaeli

Alon Refaeli
Security Analyst at Secured Zones Technologies Ltd.

Follow Unfollow

Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.

Please read our Privacy Policy.

Accept
Finextra

Finextra

  • About

Community

  • Rules
  • Contact the community team

News

  • Guidance
  • Contact the news desk

Sales

  • Media pack
  • Contact the sales team

Get involved

  • Finextra Live@
  • Webinars
  • Finextra TV
  • Research
  • Finextra.jobs

Events

  • Sustainable Finance Live
  • NextGen Nordics
  • EBAday
  • NextGen:AI
Join the community Register for news alerts
Apple App Store Google App Store

© Finextra Research 2025

Terms of usePrivacy PolicyCookie Centre