679 Results
Robert Siciliano Security Analyst at Safr.me
It seems that almost every site on the Web requires a password. At least twice a week, I get an email from someone who wants me to join yet another site, which requires yet another username and password. You can cop out and use the same username and password combination, but that’s always possible since some sites let you use numbers and symbols in...
07 March 2013 /security
Time isn’t just money. Time is what you spend with your family, on a vacation or watching a kid’s dance recital. Time can be gained or lost based on how efficiently or inefficiently you use and implement mobile technology. First and foremost, your mobile phone is a communication tool. It should be set up to access and communicate with everyone in y...
A good friend of mine called me recently to ask what I knew about scams from online sales. He had placed an ad on CraigsList for something he was trying to sell and had asked for $150 for the item. He had received a call from a woman and she offered to send him a check for the item. Shortly thereafter, he received a $2,400 check from a major chemi...
05 March 2013 /security
Congress and the Federal Trade Commission (FTC) have taken special steps to ensure that children under 13 years of age don’t share their personal information on the Internet without the express approval of their parents. Congress passed the Children’s Online Privacy Protection Act (COPPA) in 1998 and the FTC wrote a rule implementing the law. The ...
19 February 2013 /security
In 2012, security challenges we faced were often the ribbon cuttings and business plans that startup criminal organizations launched. In 2013, those criminal enterprise business plans will come together—and we need to be ready. Social media is high on criminal hackers radar. Criminals scan social media looking for people who they can scam. One such...
04 February 2013 /security
It’s funny to me that when having conversations about technology people still don’t see the parallel between their smartphone and their computer. Today, smartphone are connected to the Internet and have much of the same information as the personal computer, if not more. Now Androids and other smartphones have become little mini handheld computers. ...
25 January 2013 /security
It has long been believed that elderly, which depending on your definition, are people over the age of 60 years old, are targeted by scammers due to their generations naïve upbringing. But from my perspective, a 65 year old grew up in the 60’s and there’s nothing naïve about the Vietnam war/Woodstock generation. My dad’s one of them, and we have t...
With the holiday shopping season and after holiday season sales over, it’s time to review our credit card statements and make sure that everything that is on there was something you purchased. With most of us using our card a lot more during this time, there’s more chance of fraud or identity theft. When most of us think of identity theft and bein...
17 January 2013 /security
There’s a ton of new devices flooding the market and it has been predicted by the North Pole there have been many good boys and girls this year who will be receiving them. Out of Santa’s sack will come computers, tablets, smartphones, and gaming consoles. But if you happen to get one of these new devices, you should know that the first step in enj...
08 January 2013 /security /regulation
We’ve all been there. You search your pockets, your belt clip, jacket pockets, every draw, cabinet, bag, couch, and floor, every crevice of your car and dog house. You wonder if you left it in the bar last night or over your friend’s house. You’d text all your buddies to see if they have it but, well, you can’t. It’s that horrible feeling that co...
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.