Join the Community

21,471
Expert opinions
43,727
Total members
354
New members (last 30 days)
124
New opinions (last 30 days)
28,521
Total comments

Latest expert opinions

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What to do in the Aftermath of an Attack

Can you hack cleaning up the mess a hacker makes after infiltrating your computer? Would you even know the first thing to do? And yes, YOU’RE computer CAN be hacked. After the attack, locate the portal through which the crumb-bag entered. This could be the e-mail program or browser. This may be easier said than done. Give it a shot. Next, this po...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

10 most dangerous Facebook Scams

Twenty percent of the world’s population is “on” Facebook—that’s well over a billion people Top 10 Most Popular Facebook Scams Profile visitor stats. It’s all about vanity. It doesn’t take long for any new Facebook user to see an ad offering to reveal how many people are viewing your profile. You can even find out who’s viewing. It must make a l...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Identity proofing proves who You are

Identity proofing is proof of whom you are. Proving one’s identity starts with that person answering questions that only they themselves can answer (even if the answers are fictitious), such as their favorite movie, mother’s maiden name or name of their high school. Since most people provide real answers (that can be found online) rather than “Poi...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Are All Hackers Bad?

The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about hackers stealing data from large companies and the government. Hackers are the bad guys. But are they? Tesla just recently announced they are hirin...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How to Secure Your iCloud

By now you’ve heard that Jennifer Lawrence’s (and other celebs’) cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the “Find My iPhone” app. Someone anonymously posted nude photos of Jennifer Lawrence and Kate Upton to the 4Chan site, and the stars confirmed the photos w...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Best Way to Destroy a Computer Virus

Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many different kinds of computer viruses (such as worms, Trojans, spyware) are called malware: malicious software. In general, security software comes with i...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Prepaid Cards risk of Fraud

Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire money for that new car or vacation package is most probably a rip-off. And the crooks behind these rackets are figuring out ways to overcome the incr...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Make Information Security a Priority

Just about everyone has private information that should be protected. Let’s begin with something you’ve surely heard of: antivirus protection. But this isn’t enough to guard your personal data. A free antivirus service may not even update automatically, and this is very important to keep up with rapidly evolving technology. Your protection is wor...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How to Prevent Summertime Scams

Summertime is here…and that means sunshine and vacations. Most people love summertime, including scammers! Hackers can use this time to take advantage while we are planning vacations or on vacation or just enjoying fun in the sun. Here are some key scams to watch out for this summer: Family or Friend Requests Money You receive an email from a f...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How to Prepare a Storage Device for Resale

If you want to sell a storage device, first back everything up on it with a flash drive, external drive or automated backup service. For Android or iOS, activate the Google Auto Backup service or Apple’s iCloud. Next, wipe the device. No, not with a rag, but wipe out the data, completely. Reformatting the hard drive can still leave data. Hitting ...

/security

Now Hiring