Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Posts Tagged ‘hacker’

Protect Your Mobile from Hackers

Wednesday, July 19th, 2017

If you are like most of us, you probably have a password, antivirus program, and a firewall for your home computer to protect it from hackers. Are you doing the […]

Hire an Ethical Hacker NOW!

Tuesday, May 30th, 2017

You might think it’s crazy to actually hire a hacker, but if you don’t have an ethical hacker on your security team, you could be playing a dangerous game. Ethical […]

Malware Hack Attacking the Grid…BIGLY

Tuesday, May 16th, 2017

For more than four years, malware has been posing as legitimate software and infecting industrial equipment across the globe. The malware, which looks just like the Siemens control gear software, […]

Second Hand and Discarded Devices Lead to Identity Theft

Wednesday, May 10th, 2017

A new study was just released by the National Association for Information Destruction. What did it find? Astonishingly, about 40% of all digital devices that are found on the second-hand […]

Researchers Say Office of Personnel Management Hack Leads to Ransomware

Monday, March 27th, 2017

In June, 2015, it was revealed by an anonymous source that the Office of Personnel Management was hacked. This office, which administers civil service, is believed to have been the […]

How to protect your Mobile Phone from Hackers and Thieves

Thursday, September 1st, 2016

Let’s cut to the chase: Regularly back up the phone’s data! If this is done every day, you won’t have to worry much about losing important information if something happens […]

Phishing attacks Two-Factor Authentication

Thursday, July 28th, 2016

Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail. How a hacker circumvents two-factor authentication: First […]

Phone Account of FTC Chief Technologist hijacked

Thursday, July 14th, 2016

An impostor posed as Lorrie Cranor at a mobile phone store (in Ohio, nowhere near Cranor’s home) and obtained her number. She is the Federal Trade Commission’s chief technologist. Her […]

TeamViewer Clients Victims of other Hack Attacks

Friday, July 8th, 2016

Get an account with TeamViewer, and you will have a software package that enables remote control, online meetings, desktop sharing and other functions between computers. But recently, customers of TeamViewer […]

Hacking Humans is Painfully Easy

Tuesday, June 28th, 2016

Hackers can take over someone’s life in a matter of hours. Just ask Patsy Walsh. Though she is not a tech savvy person, the grandmother of six did have a […]

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in