Join Our Breach Prevention Program 

Start with a Free Dark Web Scan and Baseline Security Assessment. Your Protection is on Us!

IT Specialist Blogs

rss

News, Topics and Opinions on Information Technology


Robert Siciliano
Robert Siciliano

Personal & Business Cybersecurity Expert

Specify Alternate Text

Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT. A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access ...

Specify Alternate Text

Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace. Bank of America got back about ...

Specify Alternate Text

It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate. Passwords Being that cyber crime has been a fixture of modern living for over a decade, you’d think that everyone and his brother would know to use strong, ...

Specify Alternate Text

When making goals, it’s important to emulate people who have already mastered what you’re trying to learn. So in this case, what do super secure people do to stay safe online? Intel Security has the answer—here are the 5 habits of practically unhackable people: Think before ...

Specify Alternate Text

Billions and billions—it’s only a matter of time before this becomes the number of hacking incidents in a single year, because just in 2014, over one billion records were hacked out of 1,500 different hacking incidents, says a recent report.  Some other findings from the report: A ...

Specify Alternate Text

If you’ve ever watched virtually any spy flick or James Bond movie you’re familiar with “bugs” – those little dime-sized metallic things that the bad guys would secretly stick under someone’s desk to record any conversation in the room—picked up by a receiver in their car. Or, the phone ...

Specify Alternate Text

These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year. While a lot of information, including creative materials, financials ...

Specify Alternate Text

Does your Lenovo computer have Superfish VisualDiscovery adware (a.k.a. spyware) installed? It’s possible if you purchased a Lenovo PC any time in September of 2014 and thereafter. This Superfish software intercepts the Lenovo user’s traffic so that the user sees ads displayed that reflect their browsing habits. The problem with ...

Specify Alternate Text

Recently a settlement was obtained between 2 companies with the FTC. The charge was that these organizations failed to secure their mobile apps, which put consumer’s private data at risk. The FTC says that these companies disabled the SSL certificate validation. This default process confirms that an application’s communications are ...

Interested in submitting content for publication and syndication on the IT Specialist Network?

As a contributing writer on IT Specialist.com, you can quickly gain exposure as an opinion leader or subject matter expert in information technology with our large audience of technical professionals located around the world. And as an added benefit, our website supports multi-lingual textual translation via Google. We welcome new and established authors that specialize in one or more sectors of the IT industry. Once your article(s) is approved for publication, it will be selectively syndicated on our broader IT Specialist Network or platform. Contact us for details.