Robert Siciliano, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.
Robert's “tell it like it is” style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Robert Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment’s notice on breaking news.
Connect With Robert
Posts by Robert Siciliano:
December 26th, 2018
Should You Post Pictures Of Children Online?
Most people give no thought whatsoever to posting pictures of their children online.
They are proud of their kids, they love them…so why not show the world how wonderful they are so others can enjoy each milestone [...]
August 15th, 2018
Kids And Smartphones: How Old?
How old is old enough for a kid to have a smartphone?
Right out of the gate, I’m saying 16, and I know there’ll be some backlash from that. Some will say it all depends on the kid; others will argue there’s no [...]
September 18th, 2014
What Is Scareware?
When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves.
One of these tricks is to scare us into thinking that our computers or smartphones have become infected with malware to [...]
September 12th, 2014
Would You Use Facebook To Catch A Bad Guy?
In Oklahoma, the OK state, an elderly couple was home invaded and held at knifepoint, and the woman was knocked to the ground.
During the ensuing abuse, their home was robbed and the predator got away. Not OK.
The police [...]
September 5th, 2014
Fighting The Bad Guy…And Winning
If someone were to jump on you and start whacking away, what would you do?
Would you fight back? Run? Curl up into a ball and beg for mercy?
Do you have a plan? Have you even thought about what your reaction would be? [...]
August 29th, 2014
5 Rules For Using Coffee Shop WiFi
In order to compete with the likes of the chain coffee shops and now fast food joints, just about every coffee shop or small restaurant is supplying its clients with free WiFi.
Unfortunately, there are people who don’t [...]
August 22nd, 2014
Prepare Now For Device And Data Theft
Digital device theft is a big problem.
I’ve seen numerous stories about iPhones being stolen right from a person’s hand while the user was talking on it. Others have reported sitting in a coffee shop while having [...]
August 8th, 2014
Unsecured Wireless Video Baby Monitors Hackable
Baby monitors have evolved from simple one-way radio communications based on older radio waves to highly evolved IP based, internet-connected cameras that can be viewed on a smartphone or tablet.
Back in the day, when [...]
August 6th, 2014
High-Tech vs. Low-Tech Locks
High technology doesn’t necessarily mean better, stronger or faster.
It does usually mean more convenient, as the word technology is defined as “including the use of materials, tools, techniques, and sources of power [...]
July 25th, 2014
11 Easy and Simple Home Security Tips
Occasionally it’s good to be reminded of the fundamentals of home security.
Print this out and stick it on your bulletin board at work or on your refrigerator as a reminder to everyone in your family.
Daytime burglaries: [...]
July 18th, 2014
6 Tips On Securing Your Home From Those You ‘Trust’
There are going to be times in your life when you will need to simply trust people who you let into your home for various reasons.
People such as:
House cleaners: House cleaners get in the nooks and crannies of your [...]
July 11th, 2014
Selling Your Smartphone? Beware Of Stowaway Data
Upgrading your mobile device?
It has become standard practice to upgrade to a newer device every one to three years. And when doing so, people often sell, donate or discard the old one. The goal is often to sell the [...]
July 3rd, 2014
Passwords: Fingerprint, Heartbeat Or Brainwaves?
There is no such thing as a truly secure password; there are only more secure or less secure passwords.
Passwords are currently the most convenient and effective way to control access to your accounts. But passwords [...]
July 3rd, 2014
Streamlined ‘Passpoint’ WiFi Coming
WiFi connects us everywhere, such as in parks, subways, airplanes, coffee shops and public WiFi hotspots.
The WiFi Alliance says there are more than a million hotspots worldwide, and a report by market research company [...]
June 20th, 2014
I Really Want My Phone to Be My Wallet. Don’t You?
Seriously. Mine hurts my butt when I sit down. I have to remember to take it with me, and then I’m always afraid of losing it. There’s nothing fun about it. And…well…it’s dirty. It really is—money [...]
June 16th, 2014
NFC App On Androids Facilitates Automation
Near field communications (NFC) is the exchange of information between two devices via wireless signal.
For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. In [...]
June 13th, 2014
5 Home Security Tactics Of The Uber Rich
The uber rich have many reasons to invest in uber security.
I met a woman who won a $300 million lottery, and she had some unfortunate stories about how low people go to get at and to moneyed individuals. So to protect [...]
June 4th, 2014
New App Stores House Or Car Keys Online. Is It Safe?
Ever lock yourself out of your car or home? I’ve done each at least once this year; that’s about my average.
After the last time I got stuck on the cold side of my front door, I decided to go with keyless locks for [...]
May 9th, 2014
7 Scary Privacy Issues To Be Aware Of
We are all too aware of the National Security Agency breaking encryption.
The NSA has frequently been known to be implanting back doors on various servers, networks and within numerous social sites, email providers, [...]
May 2nd, 2014
Hackproof Your Facebook Account
With over one billion people connected to Facebook, we have to assume that many of them are criminals. (Criminals are people with friends too!)
But the criminals we need to be concerned about are the ones who create [...]
April 25th, 2014
Good Heavens! Churches are Big Targets for Burglars
Is nothing sacred? Well, no. Not even churches. Really, especially churches.
The problem with churches, like any public place, is that by design, they are open for anyone to come in and worship at any time. But in the [...]
April 18th, 2014
Why Mobile Security is a Must
Smartphone use continues to increase.
More than one third of Americans have dropped landlines and only use mobiles. It is very possible that within the next 10 years, the landline will be obsolete and we will all be [...]
April 11th, 2014
12 Biggest Home Security Mistakes
We all make mistakes; the key is to make them once or twice and learn from them.
If you keep making them, bad things happen—and home security mistakes are not ones you want to repeat. Here are a dozen mistakes that [...]
April 4th, 2014
Scammers Use Online Calendars To Phish Victims
You’ve been here before: You’re at work, you get a notification via a popup, then an email, then a text reminding you of an appointment on your calendar.
For most busy professionals, this is pretty normal because [...]
March 28th, 2014
Apple Makes Life Harder For iPhone Thieves
You probably know that iPhones are high on the wish list of thieves all over the country
—so much so that data from the New York City Police Department reveals that iPhone and iPad thefts have soared 40 percent compared [...]
March 21st, 2014
Socint: Disseminating Cybercrime Through Social Intelligence
People talk—A LOT. They can’t stop talking. Talking, getting something off your mind and out there feels good.
Talking takes the pressure off one’s mind; our mouths are like relief valves for our heads. The problem [...]
March 14th, 2014
Laptop Theft Leads to Identity Theft
Ever lose a mobile device? Have one stolen?
Know someone who has? Device loss and theft is a common issue when it comes to identity theft and results in data breaches. Some studies have shown as many as 2.5 million laptops [...]
March 7th, 2014
Standard Door Frames Make Burglary Easy
Stop what you are doing. Walk over to your front or back door. Open it.
Look down at the doorjamb where the holes are—you know, where your doorknob and deadbolt locks (hopefully they are Schlage) go into the frame. [...]
February 28th, 2014
Mobile, Wearable And Now…Implantable Technology?
It began with the laptop.
The laptop was the first portable internet-connected device that freed up millions to create a mobile workforce. Next was the smartphone, which didn’t really take off until Apple opened it [...]
February 21st, 2014
Cellular Base Station Range Extenders Vulnerable to Attack
Low-powered cellular base stations are often found in residential homes and small businesses where mobile coverage is scant.
The device, which also known as a femtocell, connects to DSL or cable connections and extends [...]
February 14th, 2014
Top 5 Home Security System Scams
When a home security salesman comes a-knockin’, beware, pay attention and know what you are getting into.
He might not be who he says he is, or he might have tactics under his belt that will cost you big time.
February 7th, 2014
Mirror Mirror Online, Who Is the Most Dangerous Celebrity of Them All?
We all do it. We probably all just don’t admit it.
Well I admit it—I’ve searched for that elusive picture of Kimye’s baby North (who I thought would be called Kadence, but I’m not in the know, which is why [...]
January 30th, 2014
Identity Thieves Go After the Deceased
There are a reported 2.5 million cases of identity theft among the deceased every year.
Theft of deceased people’s identity happens partly because of the availability of public records coupled with the time it takes [...]
January 27th, 2014
4 Ways To Share Paid Hotspots
There are a number of scenarios you might be in where friends, family and colleagues need to jump on a (read: your) wireless connection, but they’d rather not pay a connection fee.
So if you have the goods right in [...]
January 3rd, 2014
What’s The Point Of $1 Million In Insurance For Identity Theft?
Honesty is the best policy, right?
I’ve spent my life being honest, and do you know what is the most important lesson I’ve learned is? The truth hurts. And when you (meaning me too) says it like it is, someone somewhere [...]