Feeds & Podcasts

Consumer Blogs

Meet the Bloggers

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

Robert Siciliano

Join Robert Siciliano in his fight against identity theft. See how he applies two of his personal and professional tenets — be proactive and know your options — to the latest research on criminal exploits. Learn the story behind the statistics to keep your computer and your identity protected.

Posts in Robert Siciliano

How To Steal A Car: Hack It!

Wednesday, January 25, 2012 at 6:52am by Robert Siciliano
Robert Siciliano

No more jimmying doors with a Slim Jim, bricks through windows, extracting lock cylinders with a dent puller, or hot-wiring ignitions. Automobiles today are being built to include wireless capabilities that allow for remote unlock, remote start, and of course, there’s global positioning systems (GPS) and services like OnStar and ATX, which offer “telematics,” or Read more…

Tags: , , , , , , , ,

Phishing Scammers Target Macs

Friday, January 20, 2012 at 6:51am by Robert Siciliano
Robert Siciliano

On Christmas Day, 2011, Apple product users were targeted by a major phishing attack. The Mac Security Blog reported, “A vast phishing attack has broken out, beginning on or around Christmas day, with emails being sent with the subject ‘Apple update your Billing Information.’ These well-crafted emails could fool many new Apple users, especially those Read more…

Tags: , , , , , , , , , , , , , , , , , ,

5 Digital New Year’s Resolutions For Parents

Wednesday, January 18, 2012 at 5:49am by Robert Siciliano
Robert Siciliano

McAfee recently distributed a press release and the line that caught my eye was, “Now is the time for parents to model good behavior and etiquette.”  This wasn’t something you’d normally expect to see from a major security company, so intrigued, I read on. Instruction in etiquette and good behavior is something we could all probably Read more…

Tags: , , , , , , , , , , , , , ,

Cross-Device Security Means “All Access”

Friday, January 13, 2012 at 6:21am by Robert Siciliano
Robert Siciliano

You may have a laptop, desktop, netbook, notebook, Ultrabook, tablet, Mac, or mobile phone. You might be single, married, or have ten kids. Either way, you probably have at least one, if not six or more, devices requiring comprehensive security. My family of four has 12 devices, all of which I do my best to Read more…

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Safe Banking On Your Mobile Device

Wednesday, January 11, 2012 at 6:00am by Robert Siciliano
Robert Siciliano

Mobile banking has experienced rapid growth over the last three years, in the U.S., more than doubling from 5% of online adults in 2007 to 12% by June 2010. Furthermore, Forrester predicts that one in five–or 50 million–U.S. adults will be using mobile banking by 2015. However, identity theft is a major concern and studies Read more…

Tags: , , , , , , , , , , ,

Beware of Malicious Mobile Apps

Friday, January 6, 2012 at 10:17am by Robert Siciliano
Robert Siciliano

Criminal hackers are targeting mobile phones in record numbers, and one increasingly popular technique is to corrupt legitimate applications. Approximately 200 of these maliciously modified apps have been discovered thus far. The amount of malware targeted at Android devices has jumped nearly 37% since last quarter, which made 2011 the busiest in mobile and general Read more…

Tags: , , ,

Security Beyond the Desktop

Wednesday, January 4, 2012 at 2:44pm by Robert Siciliano
Robert Siciliano

A defensive posture no longer suffices for the protection of the devices and data that have become ubiquitous in today’s digital world. Rather than simply rushing to install defenses on computers, in networks, and in the cloud, we urgently need to step back and take a broader view of the security landscape, in order to Read more…

Tags: , , , , , , , , ,

2012 Threats: Are You Ready?

Tuesday, December 27, 2011 at 10:13pm by Robert Siciliano
Robert Siciliano

History is said to be a good indicator of what might come in the future. If you follow trends in how things are done and what tends to gain momentum then you can get a pretty good idea of what’s ahead. McAfee Labs™ is made up of security professionals who spend all their waking hours Read more…

Tags: , , , , , , , , , , ,

Securing New Digital Devices

Tuesday, December 6, 2011 at 9:00pm by Robert Siciliano
Robert Siciliano

Laptops, desktops, Macs, mobiles, and tablets are on many people’s wish lists this holiday season. Once these shiny new devices are connected to the Internet, they will be under siege by malware created by criminals in order to steal identities.  According to a recent McAfee survey, 60% of consumers now own at least three digital Read more…

Tags: , , , , , ,

Secure Mobile Shopping This Holiday Season

Monday, November 28, 2011 at 4:59pm by Robert Siciliano
Robert Siciliano

Mobile shopping isn’t something I ever thought I’d do. I mean, come on! Why in the world would I use a tiny screen to make big purchases that often require lots of research? But I have found that as I become more dependant on my mobile phone whenever I’m away from my home/office wireless connection, Read more…

Tags: , , , , , , ,