Join the Community

21,471
Expert opinions
43,727
Total members
354
New members (last 30 days)
124
New opinions (last 30 days)
28,521
Total comments

Latest expert opinions

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Top Ten Most Dangerous Places to Leave Your SS Number

Universities/Colleges are the Riskiest Cases of identity theft are skyrocketing, and 32% of all ID theft victims had their social security number compromised according to Javelin’s 2010 Identity Fraud Survey Report. In honor of National Identity Protection week, McAfee set out to reveal the most dangerous places to leave your social security numb...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Mobile Phone Security Under Attack

As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for content creators’ latest innovations, which often require more and more device access. As applications and other content are more widely distributed, security breaches will be inevitable. The s...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

5 Sneaky Credit Card Scams

#1 Phone Fraud. The phone rings, a scammer poses as your banks fraud department. They may have your entire card number stolen from another source. They ask about a charge made and you deny the charge, but in order for the charge to be removed, they need your 3-4 digits CVV number off the front or back of the card. A variation may be they only hav...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Five Ways Identities Are Stolen Online

Cybercrime has become a trillion dollar issue. In a recent survey, hundreds of companies around the world estimated that they had lost a combined $4.6 billion in intellectual property as a result of data breaches, and spent approximately $600 million repairing the damage. Based on these numbers, projections are that companies lost more than a tril...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

7 Ways to Combat Scareware

You may have seen this before, it goes like this: a pop-up pops and it looks like a window on your PC. Next thing a scan begins. It often grabs a screenshot of your “My Computer” window mimicking your PCs characteristics then tricking you into clicking on links. The scan tells you that a virus has infected your PC. And for $49.95 you can download ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Typosquatting for Fun and Profit

Typosquatting, which is also known as URL hijacking, is a form of cybersquatting that targets Internet users who accidentally type a website address into their web browser incorrectly. When users make a typographical error while entering the website address, they may be led to an alternative website owned by a cybersquatter or criminal hacker. Typ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

5 Ways to Prevent Check Fraud Scams

Check fraud is a billion dollar problem. Check fraud victims include banks, businesses and consumers. Our current system for cashing checks is somewhat flawed. Checks can be cashed and merchandise can be purchased even when there is no money in the checking account. There are 5 main forms of check fraud to watch out for: Forged signatures are the ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Women Proved Securest in the Defcon Social Engineering Game

In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon), I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out too much information. All five holdouts were ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Half Billion Records Breached in 5 Years

In the late 90s and early 2000s, hacking had evolved from “phreaking” (hacking phone systems) to “cracking” (breaking into networks). At the time, hackers hacked for fun, for the challenge, and for fame and popularity within the hacking community. But soon enough, the public began spending more time online, shopping, banking, and managing personal...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Social Media is a Criminals Playground

Social media has become a playground for adults, teens, and tweens. And like on any playground, when you hit the jungle gym or horseplay on the seesaw, there is always a chance that you may go home with an egg on your forehead. Or, if you are like me, a broken collarbone. Twitter and Facebook have become the most popular sites for frolicking, and ...

/security /regulation

Now Hiring