Join the Community

21,471
Expert opinions
43,727
Total members
354
New members (last 30 days)
124
New opinions (last 30 days)
28,521
Total comments

Latest expert opinions

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Children Heading Back to School Face Identity Theft Risk

This isn’t rocket science. We have millions of children registering for schools in person, online, over the phone, via email and through the mail. All of these transactions involve personal identifying information including names, addresses and Social Security numbers. All of these exchanges of data can be breached in some way by those on the insi...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Making a Case for Mobile Payment

Mobile payment can transform your shopping experience, making it more convenient and easy—and it’s secure, too! Forbes reports, “Shopping has become very impersonal. Few people have a relationship with a salesperson who knows their style and preferences and can direct them to the right items at the right prices as soon as they walk in the door. Bu...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

You are an Internet Celebrity

The quote “15minutes of fame” is about the short-lived media publicity or the celebrity of an individual or phenomenon. The expression was coined by Andy Warhol, who said in 1968 that: “In the future, everyone will be world-famous for 15 minutes.” Unfortunately, that has evolved into daily fame for many people that, frankly, is bad for public cons...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Why it is Critical to Protect Data on Digital Devices

When devices are lost or hacked and your data is exposed, not only is this a pain to deal with, but you could become a victim of identity theft. Not only do victims of identity theft suffer loss of time but they also lose money that may not be able to be recovered . In McAfee’s recent study, they found on average that people have over $35,000 wor...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What Does it Mean to Have a Connected Home?

The internet-connected TV, PC, mobile and tablet are all connected to the home in ways like never before. All of these appliances are talking to one another in various ways. For example, many of us share media, display photos on various devices, or use different devices remotely for home security, HVAC control, access control, and on/off administr...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What are My Risks with My Mobile Device?

Mobile technology is the new frontier for fraudsters. Today, there are more wireless devices than American people. Mobile devices connect to the Internet and have much of the same information and capability as a personal computer. Your device and the private data it holds are very, very attractive to thieves. Yet, most of us don’t protect our smart...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Is That Mobile Application Invading My Privacy?

Facebook now offers “Home.” Facebook says “With Home, everything on your phone gets friendlier. From the moment you turn it on, you see a steady stream of friends’ posts and photos. Upfront notifications and quick access to your essentials mean you’ll never miss a moment. And you can keep chatting with friends, even when you’re using other apps. C...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Beware of Credit Card Micro Charges

Micro charges are charges ranging from 20 cents to $10 and either are fraudulent, legitimate or fall into the category of “grey charges,” which describe sneaky recurring or unwanted charges. These charges often go undetected because they are so small. Nine out of 10 credit card holders don’t scrutinize their statements carefully, allowing these sca...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How Hackers Use Our Information Against Us

We hear an awful lot about hackers breaking into systems and taking down networks or stealing millions of data records. The general understanding we have for hacking is bad guys want to disrupt things to make a point or to make money. But how do they really use our personal information against us? Whether you realize it or not, you expose a lot of...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What is a Drive-By Download

Gone are the days when you had to click to “accept” a download or install a software update in order to become infected. Now, just opening a compromised web page could allow dangerous code to install on your device. You just need to visit or “drive by” a web page, without stopping to click or accept any software, and the malicious code can download...

/security /regulation

Now Hiring