Automotive Cybersecurity: Don’t Bank on Untrained “Drivers”
Would you send your newly licensed 16-year-old out to drive on the interstate without spending months teaching them safety skills...
Read MoreAnonymous vs Russia (Ironically) for Ukraine
Who thought that Anonymous vs Russia would be the top billing cyber event of the Russian invasion of Ukraine? We...
Read MoreHackers Hot for Hotspots: Protect Your Remote Workforce
Your remote workforce is only as strong as its weakest link — which, believe it or not, may be a...
Read MoreFace Computers: Privacy Violation by Pupil Dilation?
Smartwatches, holograms, self-driving vehicles — we may have just rung in the year 2022, but here on Earth, we’ve started...
Read MoreRansomware Attacks in 2022: What You Need to Know
Every company is vulnerable to cyber attack — and I mean every company, small and large. Are you responsible for...
Read MoreRansomware Attack: What if this were your Billion $ mistake?
No one has ever heard of your company. Let’s call it, COMPANY X. And you like it that way. In...
Read MoreNew iPhone Setting Stops Apps & Ads from Stalking You (App Tracking Transparency)
Apple App Tracking Transparency is Finally Here! With the release of iOS 14.5, Apple has given us the most powerful...
Read MoreFacebook Breach: Zuckerberg Karma & Your Stolen Cell #
The Facebook Breach Might Not Be What You're Thinking How many Facebook user records were just breached? The answer might...
Read MoreSolarWinds Hack: What Vladimir Putin Wants Every Business To Ignore
Summary of the SolarWinds Hack Russian hackers inserted malicious code into a ubiquitous piece of network-management software (SolarWinds and other...
Read MoreNancy Pelosi Laptop Stolen for Sale to Russia by Capitol Rioter
And my prediction about the hidden risk in the capitol riot appears to be coming true... "There are growing concerns that...
Read MoreIs WhatsApp Privacy a Big Fat Facebook Lie? What You Need to Know.
WhatsApp Privacy: Facebook's New "Data Use" Policy I have been getting a ton of questions on the privacy of your...
Read MoreThe Massive U.S. Capitol Attack We’re Ignoring
Capitol Attack Could Go Way Beyond a Physical Breach When Trump supporters occupied the US Capitol last week, hundreds of...
Read MoreTwitter Hack Reminds Us That David Can Still Fell Goliath
The twitter hack began as a quiet scheme to steal and sell unusual user names, which carry high currency in...
Read MoreWere Lebron’s Darkest Secrets Exposed by Hackers?
Grubman Shire Hack: REvil Scores a Blackmail Slam Dunk How much is basketball megastar Lebron James brand worth to hackers? ...
Read MoreDon’t Be Naive: Obama/Biden “Twitter Hack” Not What It Seemed
I'm betting that the recent Twitter hack of prominent political and celebrity Twitter accounts was politically motivated and nation-state operated....
Read MoreCybersecurity Experts Fight for Your Encryption Rights
Cybersecurity experts and privacy advocates like myself are stepping up to protect strong encryption standards, which are facing an all-out...
Read MoreiPhone Security Crash Course: 13 Hacker-proofing Tips
iPhone Security In the Mid/Post-Pandemic World We are no longer just addicted to our iPhones; we are officially in a...
Read MoreCoronavirus Scammers Use Fake Sites to Steal Your Stimulus
Coronavirus Scammers Are After Your Stimulus Check Scammers and cybercriminals love to exploit the headlines. COVID-19 isn't the only pandemic...
Read MoreZoom Security in 7 Steps (Video + Graphic)
Since this video was recorded, Zoom has issued several security updates. Learn more at the Zoom Security web page and...
Read MoreCybersecurity for Your Home or Virtual Office
Cybersecurity Virtual Office Key Links from the Webinar: ZOOM Sileo Security Video Password Managers Review Data Backup Physical/Cloud Backup ZOOM...
Read MoreCoronavirus Cyberscam Alert: Protect Your Digital Health and Safety During a Pandemic.
Hey, this is a bit of a solemn and serious video today. First of all, my heart goes out to...
Read MoreTelemedicine: Are Virtual Doctor Visits a Cyber & Privacy Risk?
The Trump administration has relaxed privacy requirements for telemedicine, or virtual doctor visits: medical staff treating patients over the phone and...
Read MoreAre Hackers Targeting Your Association? Here’s How to Stop Them.
Are hackers targeting your association? The recent revelation that Chinese hackers penetrated the internal computer network of the National Association...
Read MoreDemocracy @ Stake: 2020 Election Interference DejaVu
What you need to know about Russia's 2020 election interference Last week, the director of national Intelligence (DNI), a Republican...
Read MorePrivate Eyes Are Watching You: What it Means to Live (and Be Watched) in the Surveillance Economy
What it is the Surveillance Economy How do you feel about the fact that Facebook knows your weight, your height,...
Read MoreSmall Business Cybersecurity: 5 Steps to Stop Cybercrime
Small Business Cybersecurity Gone Terribly Wrong On August 12, 2003, as I was just sitting down to a tea party...
Read MoreData Integrity Attacks: How Cybercriminals Manipulate Rather Than Steal Your Info
You're rushed to the hospital after a serious car accident. Doing her job, the admitting physician verifies your blood type...
Read MoreThe Unlikely Weapon in Cybersecurity: Going Analog
Rule #1: Technology is highly unpredictable when it's new & untested. And even worse when it's insecure. All of us have...
Read MoreTop Cybersecurity Trends 2020 & the Perils of Prediction
(i.e., Cybercriminals read the same articles as cybersecurity experts) Oh how we love to predict the future. Who will win...
Read MoreGoogle Buys Fitbit
Google Isn’t Just Buying Fitbit, They’re Tracking Your Donut Habit You’re heading to the gym for a workout when you...
Read MoreGoogle Isn’t Just Buying Fitbit, They’re Tracking Your Donut Habit
Spinning Wildly on the Hampster Wheel of the Surveillance Economy You’re heading to the gym for a workout when you...
Read MoreWhat if Putin Had an Army of Killer Artificial Intelligence Robots?
The New Frontier: How Science Fiction Distorts Our Next Move on Artificial Intelligence and Cybersecurity It’s been 51 years since...
Read MoreDisinformation Campaigns Are Coming for Your Bottom Line
The rise of disinformation campaigns could put the reputation of your company at risk Imagine waking up to find the...
Read MoreGoing Analog: Tom Kellermann Emerging Cyberthreats
John speaks with Tom Kellermann, Chief Cybersecurity Officer at Carbon Black, about emerging cyberthreats and what we can do to protect...
Read MoreHow to Turbocharge your Cybersecurity Awareness Training
Security awareness training can’t be a boring afterthought if it’s going to work. Own it. Secure it. Protect it. Those...
Read MoreDeepfakes: When Seeing May Not Be Believing
How deepfake videos can undermine our elections, the stock markets and our belief in truth itself Last weekend, attendees at...
Read MoreHow to Protect Your College Student from Identity Theft on Campus
Five tips for better data and device security habits at college This fall, roughly 19.9 million college students will attend...
Read MoreRussian Election Interference Coming to Your Vote in 2020
What will it take for Americans, especially our politicians, to care about Russian election interference? That’s a question I’ve been...
Read MoreIs Document Shredding Still a Thing in This Digital Age?
Document shredding seems to have fallen out of favor. I recently received some questions from a client wondering if, in...
Read MoreFaceApp is Fun, But Putin Will Own Your Privacy
FaceApp quite literally owns your face forever (or atleast the image of your face). It’s funny how we spend billions...
Read MoreBREACHED! Customer Data from Quest Diagnostics & Lab Corp
Within just a few days of each other, both Quest Diagnostics and Lab Corp, two of the largest blood testing...
Read MoreJust Wait for the Cavity: Dental Cyber Security
Dental Cyber Security is kind of like, well, being a dentist. You’re in your patient’s mouth. The red flags are...
Read MoreRobbinHood Ransomware Attack Brings Down Baltimore
Since May 7, Baltimore has been dealing with a ransomware attack that brought many city systems to a standstill. Hackers...
Read MoreSecurity Awareness Programs Like Mushy Overnight Oats?
To diagnose your under-performing cyber security awareness programs, all you need to do is look at my breakfast today. My...
Read More12 Days to a Safe Christmas: Day 12 – Holiday Security Tips All Wrapped up Together
There is no better gift to give yourself, your loved ones and your friends than peace of mind during the...
Read More12 Days to a Safe Christmas: Day 11 – Is that Holiday Email Really a Lump of Coal?
Don’t be fooled by the holiday email pretending to bear goodwill or gifts.
Read More12 Days to a Safe Christmas: Day 10 – Beware the Phony Santa Claus Comin’ to Town
Because of the power of social media holiday scammers like to make you think you are giving to a charitable...
Read More12 Days to a Safe Christmas: Day 9 – I’m getting Nuttin’ (But Scams) for Christmas
You might get nuttin' for Christmas if you don't outsmart the thieves! Protect those packages you order online.
Read More12 Days to a Safe Christmas: Day 8 – What to Give the Person Who has Everything (and Wants to Keep it!)
Looking for a great holiday gift? Forget the fruitcake and buy them something that will make their life calmer and...
Read More12 Days to a Safe Christmas: Day 7 – It’s a Wonderful Life—Let’s Keep it That Way
Want to know how to catch fraudulent purchases on your credit and debit card accounts before they land you in...
Read More12 Days to a Safe Christmas: Day 6 – Don’t Let the Grinch Steal Your Party!
Holiday parties can be a major source of identity theft. While the hosts are off making merry, the guests are...
Read More12 Days to a Safe Christmas: Day 5 – Don’t Tell Facebook You Won’t Be Home for the Holidays
Data Scrooges regularly visit social media profiles to take advantage of our charity during the holidays. Give graciously, but not...
Read More12 Days to a Safe Christmas: Day 4 – Holiday Shopping Quiz – Is Credit or Debit Smarter?
Do you realize that one form of payment is MUCH riskier than another regardless of whether you shop online or...
Read More12 Days to a Safe Christmas: Day 3 – Stopping Hackers When You’re Shopping on Wi-Fi
Did you know that the free Wi-Fi hotspot you are using to do your holiday shopping while sipping coffee is...
Read MoreMarriott Data Breach: 500 Million Accounts Compromised
If you have stayed at one of Marriott’s Starwood hotels in the past few years, chances are you have been...
Read More12 Days to a Safe Christmas: Day 2 – It’s Beginning to Look a Lot Like Christmas- at the Mall!
Identity thieves and scammers take advantage of distracted shoppers, especially on Black Friday and Cyber Monday. Here are some helpful...
Read More12 Days to a Safe Christmas: Day 1 – Prevent Holiday Identity Theft
This holiday season, Sileo.com would like to offer the gift peace of mind to our readers. Here are 12 tips...
Read MoreSextortion Scams & Cyber Blackmail on the Rise
Sextortion scams are on the rise, and cyber criminals are using our discomfort in talking about this subject to continue...
Read MoreAre Alexa, Google & Siri Eavesdropping on You?
Amazon and Google have both come out with wildly popular digital assistants that are loosely known as smart speakers. Amazons is...
Read MoreHow to Delete Your Facebook Account
Now, more than ever, I am being asked how to delete a Facebook account. It’s totally understandable given the massive amount...
Read More6 Ways Your Facebook Privacy Is Compromised | Sileo Group
One billion people worldwide use Facebook to share the details of their lives with their friends and may be unaware...
Read MoreDelete Your Facebook After Cambridge Analytica?
I’ve written A LOT about Facebook in the past. What not to post What not to like What not to...
Read MoreMake Your Kid’s Internet of Things Toy Story a Safe and Happy One
What do IOT Toys have to do with your kids? Remember when the most dangerous thing a parent had to...
Read MoreDon’t Get Juice Jacked at the Airport
Do you know those USB phone charging stations at the airport? Did you realize that they can be hijacked by...
Read MorePassword Managers Protect the Organization
We hear all the time about stupid things people do when it comes to creating passwords; the most commonly used...
Read MoreCatching Credit Card Thieves in the Act through Automatic Account Alerts
While we don't have a sure-fire way of knowing who may get and use your credit card information, we do...
Read MoreHow to Stop Wi-Fi Hotspot Hackers
Nearly everyone offers free Wi-Fi these days, including lots of cyber criminals. They've become so good at mimicking legitimate hotspots...
Read MoreJohn Sileo Receives CPAE Hall of Fame Award
DENVER, /PRNewswire/ -- Just a decade before stepping on stage to receive the speaking industry's most prestigious award, John Sileo thought he might be...
Read MoreDon’t Let Data Thieves Spoil Your Vacation
Nothing… spoils a hard-earned vacation, or a critical business trip faster than fraud. Hotel theft, ATM skimming, pick pockets. Do...
Read MoreIs Your Free Wi-Fi Hotspot Being Hacked?
Don’t you just love the convenience of free Wi-Fi hotspots? You can access your bank account, send emails, browse in...
Read MoreDon’t Get Hooked by Phishing Scams
Have you ever wondered how cyber criminals install malware on your computer? I’m going to show you and give you...
Read MoreA Smarter Solution for Thief-Proof Passwords
Don't you find it nearly impossible to remember all of those passwords you have to create for your online accounts?...
Read MoreIs Your Fitness Tracker Sharing Your Vital Statistics?
I'm out here in Vancouver. I just took a run and it reminded me of a question that someone...
Read MoreSecuring the Smartphone Supercomputer in Your Pocket
What do you call this thing? A phone, right? That’s exactly where all the trouble starts. When we call it...
Read MoreAre You a Victim of Credit ID Theft & Don’t Know it?
Here’s something you might not know. Twenty-five percent of you have already been victims of identity theft and you don't...
Read More3 Secrets of Hack-Proof Passwords
All right be honest with me. You’re still creating passwords on your online accounts that use your dog’s name or...
Read MoreThreat Alert: Ransomware Becoming Rampant
One of the very greatest threats you face in terms of cyber crime is something called ransomware. It's a...
Read MoreHow to Bulletproof Against a Stolen Smartphone
I’d just come off stage in San Diego and was headed to NYC for another speech when my cell rang....
Read MoreRoomba Selling, I Mean Sharing our Home Data?
What a difference a word makes. On July 24, Reuters published a story about an interview with Colin Angle, the...
Read MoreEquifax Data Breach Protection Tips
How to Protect Yourself from the Equifax Data Breach Equifax, one of the three major consumer credit reporting agencies disclosed...
Read MoreBeware Disaster Scams in the Wake of Hurricane Harvey
Identity thieves are already on the prowl as Hurricane Harvey wreaks havoc on Texas. Take these important steps to protect...
Read MoreTrump Russia Investigation Update: Did Campaign HELP Russians Plot Disinformation Strategy?
The Trump Russia Investigation seems to be getting stickier - so which parts matter and which don't?
Read MoreIs Russian Hacking of U.S. Nuclear Power Plants a Reality?
Can Russian hacking lead to a mass power-grid outage, the release of radioactive materials, a pre-strike military attack?
Read MoreCyber Security Experts: NotPetya isn’t Ransomware – It’s Cyber Warfare
Cyber security experts have come to the conclusion that the NotPetya ransomware attack wasn't about the ransom, but about political...
Read MoreInvestigate Russian Hacking for Security, Not Politics (and get on with governing)
As they say, sunlight is the best disinfectant, and I'm certain that the administration has nothing to hide. But doing...
Read More7 Steps to Prevent Identity Theft
Preventing identity theft can be easy when you take a few crucial steps. Start now and stop worrying about how...
Read MoreHappy About the Election Hacking of Your Presidential Vote?
Do you feel violated by the election hacking scheme successfully conducted by Vladimir Putin and the Russian government? Regardless of...
Read MoreSafe Online Shopping on Cyber Monday
Cyber Monday can be a huge shopping convenience, or a nasty digital disaster. Make sure you protect your accounts and...
Read MoreInternet Providers Lose Right to Sell Your Privacy (But Facebook & Google Still Can)
Federal regulators have approved new broadband privacy rules that require internet service providers like Comcast and Verizon to ask for...
Read MoreStop Credit Card Thieves in the Act
Setting Up Account Alerts Can Help Protect You From Fraud. Did you realize that you can have your credit card...
Read MoreCan Size of Trump’s Hands Explain DNC Hack?
The DNC hack is a prime example of a very popular type of cyber espionage - political profiling. The DNC's...
Read MoreZuckerberg Hacked: How Not to Be Like Mark
Zuckerberg Hacked: Why does a social media titan not follow his own advice? Because knowing something (passwords need to be...
Read MoreSome Simple Steps to Social Media Privacy
When was the last time you checked your privacy settings on your social media profiles? We’ve outlined some of the...
Read MorePanama Papers a Lesson in Cyber Security
The Panama Papers are a leaders lesson in good cyber security. Don't make the same mistakes they did.
Read MoreRansomware: Cyber Security Expert’s Next Big Threat
Ransomware is a type of malware that will lock the contents of your computer and force you to pay a...
Read MoreApple vs FBI: Why the iPhone Backdoor is a Necessary Fight
In the Apple vs FBI iPhone backdoor hacking conversation, do you favor one side over the other? What if your...
Read MoreDon’t Get Hooked With Phishing Scams
Just as fishing is one of the oldest occupations around, phishing is one of the oldest scams around. Ever since...
Read MoreSafe Online Shopping During the Holidays!
3 Quick tips to keep your online shopping out of the hands of criminals and hackers.
Read More