iOS app Android app

Robert Siciliano
GET UPDATES FROM Robert Siciliano

Robert Siciliano is the author of four books, including The 99 Things You Wish You Knew Before Your Identity Was Stolen. He is also a corporate media consultant and speaker on personal security and identity theft. Find out more at

Entries by Robert Siciliano

How the Internet of Things Can Go Very Wrong

(0) Comments | Posted November 25, 2014 | 6:48 AM

The Internet—one of history’s greatest inventions—is also one of history’s greatest platforms for crime. Here are ways things can go very wrong with the Internet of Things.

Med-hacking. Researchers have hacked many medical devices. Though it apparently hasn’t happened in the real world, yet,...

Read Post

How Your Webcam May Be Spying on You

(1) Comments | Posted November 12, 2014 | 2:57 PM

Remember that song from 1984, “Somebody’s watching me?” It was a great foreshadowing of things to come: These days, people really CAN watch you while you go about your business at home…through your computer. So if someone confides in you that “they’re spying on me through my computer,” don’t be...

Read Post

Keanu Reeves two Intruders in two Days

(1) Comments | Posted October 30, 2014 | 9:11 AM

Keanu Reeves recently had a home intruder: a woman. It was 4:00 am when she got into his home and plopped in a chair. The 40-something nut-job told the movie star she was there to meet with him. He nonchalantly called 911. Police took the woman into custody.

Read Post

The King of Credit Card Fraud

(3) Comments | Posted October 13, 2014 | 2:50 PM

This guy made credit card crime look so easy that it can tempt a financially strapped, law-abiding citizen into repeating the same kind of crimes -- if he had the intelligence to do so. But too bad for cyber crook Albert Gonzalez, because despite his technical wizardry, he wasn't bright...

Read Post

USB Drives Have Serious Security Flaws

(0) Comments | Posted September 30, 2014 | 5:16 PM

That little thing that you stick in your computer to store or transfer data can also mean very bad news.


The USB device or “flash drive” can be reconfigured to work like a little thief, for instance, being made to mimic a...

Read Post

Bolster Your Belongings on TV and This Is What Happens

(0) Comments | Posted September 26, 2014 | 8:47 AM

How did a burglar know that Theresa Roemer had a 3,000 square foot, three-level closet that was crammed full of very pricey items including jewels and furs? Well, apparently, he caught wind of the “she cave” on TV, then perhaps Google Earthed it and (believe it or not) the evening...

Read Post

Psychopath Vs. Sociopath: What's The Difference?

(15) Comments | Posted September 24, 2014 | 3:41 PM

Warning: this post contains graphic language and content.

The term "sociopath" has a distinct meaning from "psychopath," "psychotic" and other "psych" names that get tossed around in the media, by forensic specialists and on TV shows about murderers.

But there are differences that distinguish sociopathy from psychopathy. Both are a...

Read Post

How to Secure Your iCloud

(0) Comments | Posted September 8, 2014 | 5:56 PM

By now you’ve heard that Jennifer Lawrence’s (and other celebs’) cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the “Find My iPhone” app.

Someone anonymously posted nude photos of Jennifer Lawrence and...

Read Post

Botnets Here, Botnets There, Botnets EVERYWHERE

(0) Comments | Posted September 8, 2014 | 4:35 PM

What are these “botnets” you keep hearing about? Botnets (think roBOT + NETwork—gets you “BOTNET”) are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software—controlled by a solitary hacker or cybercrime ring.


Hackers use botnets to execute...

Read Post

4 Identity Protection Habits Every College Student Should Have

(0) Comments | Posted September 8, 2014 | 2:07 PM

For some of us, fall is about to begin and the graduates of the class of 2014 are heading off to colleges across the country. It’s an exciting time -- there’s a reason so many people call college the best four years of their lives. You learn so much about...

Read Post

Researchers say your Mobile Carrier's Network isn't all that Secure

(0) Comments | Posted September 8, 2014 | 9:08 AM

Gee, even the tools that update your smartphone’s operating system over the air have holes that hackers can slip into.


It’s estimated that as many as two billion handsets are vulnerable, and in some instances, security patches haven’t even been released.


Read Post

Child's Honesty Nabs Robbers

(3) Comments | Posted September 4, 2014 | 1:49 PM

A 4-year-old girl witnessed two young men break into her home to commit a robbery. You’d think this would cause some kind of post-traumatic stress disorder, or at least at a minimum, nightmares.


But it looks like instead, Abby Dean...

Read Post

Majority of Executives Believe Attackers Will Overcome Corporate Defenses

(0) Comments | Posted August 30, 2014 | 8:29 AM

Many technology executives don’t have a favorable outlook on their ability to sideswipe cybercriminals, according to research conducted by McKinsey and World Economic Forum.


The research also shows that both big and small businesses lack the ability to make sturdy decisions,...

Read Post

Family Identity Theft Is Ugly

(1) Comments | Posted August 29, 2014 | 2:50 PM

Identity theft isn’t just the stuff of exciting movie and TV dramas; this happens in real life—and often. In fact, that Target breach that made headlines, Neiman Marcus, those 1. 2 Billion records the Russian cyber gang hacked: all identity theft.



Read Post

Best Way to Destroy a Computer Virus

(14) Comments | Posted August 28, 2014 | 9:33 AM

Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many different kinds of computer viruses (such as worms, Trojans, spyware) are called malware: malicious software.

Read Post

Cybersecurity Insurance Still Requires Cybersecurity

(0) Comments | Posted August 24, 2014 | 9:28 PM

OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced: One allows criminals to run an arbitrary code on a vulnerable computer/device, and the other allows man-in-the-middle attacks. A more famous openSSL vulnerability that made headlines earlier this year is the Heartbleed bug.

Read Post

Before Getting Rid of Your Old Printer, Say 'Goodbye' to Lingering Data

(0) Comments | Posted August 22, 2014 | 5:07 AM

In the security business, there’s a lot of talk about protecting your smartphones and computers from malware and viruses, as well as loss and theft. It makes sense. Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names,...

Read Post

6 Survival Tips for Being Lost in the Woods

(0) Comments | Posted August 20, 2014 | 3:51 PM

Some may remember the James Kim case out of Oregon in December 2006. Kim inadvertently chose an old logging road while driving home, getting lost in the woods. He left his wife and two young kids in the vehicle while he sought help, promising to return by early...

Read Post

Beware of the Lottery Scam

(0) Comments | Posted August 19, 2014 | 9:21 AM

“You have won!” Yippeeee! NOT! Let’s see if you’re in that percentage of the population who will fall for this lottery scam. The alert can be an e-mail, snail mail or phone call, claiming you won a bundle of money. But keep this alert a secret due to some “mix-up...

Read Post

8 Ways to Bullet Proof Your Social Accounts

(0) Comments | Posted August 12, 2014 | 3:19 PM

There are ways to keep the hackers at bay—for the most part, anyways, since no protection is 100 percent efficient.


#1 Password protect.

A device lost or stolen puts all your accounts at risk. Even simply placing your devices on your desk,...

Read Post