Quantcast
Channel: Articles
Browsing latest articles
Browse All 54 View Live

School Year Poses Identity Theft Concern?

For parents across the country, registering their children for preschool, kindergarten or a new school system is a necessary part of making sure those kids get the education they need. But at the same...

View Article



Do Not Track Becoming More Popular

In the near future, it may soon come to pass that most major Web browsers come with a relatively new feature that allows consumers to avoid having their online habits tracked by advertising companies...

View Article

Most Data Breaches Caused by Workers

When many people hear the word data breach, they picture it as being the result of a hacking attack or other kind of intentional attempt to steal sensitive information, but that's not usually the case....

View Article

Anthem Settles Recent Data Breach Case

A health insurance provider in California recently agreed to the terms of a settlement with the state attorney general regarding its role in a data breach earlier this year. Anthem Blue Cross suffered...

View Article

It's National Protect Your Identity Week

From October 20-27, it's National Protect Your Identity Week in the U.S., and therefore serves as an excellent opportunity for you to brush up on your skills when it comes to making sure no one can get...

View Article


Voting Technology Still Needs Major Overhaul

Though technology has improved significantly in the last several years, particularly where data security is concerned, the fact remains that in many cases, the machines used for Americans' voting...

View Article

Credit Monitoring Bureaus Suffering Data Losses

In the past several years, hackers have focused many of their attacks on credit rating agencies because of the wealth of information these companies keep on consumers, and experts say it's becoming a...

View Article

After South Carolina Breach, States Prepare

South Carolina's well-known data breach, which exposed sensitive details including Social Security numbers for more than 3.6 million people, seems to have highlighted the problem that many state...

View Article


Twitter Users Forced to Reset Passwords

Millions of users of the popular microblogging social network Twitter may have inadvertently been affected by the site's effort to deter a potential security threat. A large number of Twitter users...

View Article


SEC Data Breach Prompts Major Hire

The U.S. Securities and Exchange Commission recently suffered a security breach, and now the New York Stock Exchange has hired the former head of the U.S. Department of Homeland Security to make sure...

View Article

Major Online Privacy Problems Still Linger

Though the vast majority of consumers say that they're aware of just how fragile their online privacy may be when they surf the Web, most don't do nearly enough to protect themselves from the threats...

View Article

Image may be NSFW.
Clik here to view.

Green Beret Warns Retirees: Leave No IDs Behind

When Richard Barnhill travels to the Southwest for winter, he takes steps to protect his main residence: Relatives and neighbors drop by to make sure everything is secure. Despite this, thieves...

View Article

Instagram Privacy Changes Prompts User Exit

The wildly popular photography application Instagram recently went through a bit of a row with its users when its parent company changed the language of its privacy policy. Facebook, which owns the...

View Article


Disney Faces Privacy Concerns over Plan

Consumers worried about their privacy might soon think Disney World is no longer the Happiest Place on Earth once the theme park's new MyMagic+ system is rolled out this spring. The system will allow...

View Article

Expert Calls for Java Security Overhaul

Many within the tech industry have said for some time that there are numerous security flaws in all kinds of popular and widely-used programs that could pose significant security problems, and one...

View Article


Hacker Sentenced in Massive Subway Breach

One man behind a massive hacking attack that went undetected for years and cost thousands of consumers a combined total of millions of dollars were recently sentenced for his role in the crimes. Cezar...

View Article

Data Breaches More Problematic in 2012

Hundreds of millions of pieces of personal information are exposed in data breaches every year, and unfortunately for those who are victimized by such incidents, it seems that nearly all of them were...

View Article


Image may be NSFW.
Clik here to view.

‘The Woman With 90 Names’ Finally Crosses One Off Her List

For most of us, $60 buys a nice dinner out, maybe with enough left over to split a dessert. For Tomas Alvarez*, it bought a new life. Or more accurately, it stole one. In 1997, Alvarez slipped $60 to...

View Article

Hacker Exposes Bush Private Photos

A hacker recently gained access to email accounts of people associated with Presidents George H.W. Bush and George W. Bush, which led to private emails and photographs being distributed online.  This...

View Article

Image may be NSFW.
Clik here to view.

An Ohio Contractor Rebuilds After Identity Theft

It should have been just another trip to Lowe’s for Don Brown. When his corporate credit card was turned down at the register, the self-employed contractor discovered that his credit card company had...

View Article

Facebook, Apple Computers Hacked

The world's largest social media website recently fell victim to a data breach after an employee visited a mobile developer that was compromised. While at this developer, Facebook employees' laptops...

View Article


Video Game Focuses On Data Hacking

Recent data breaches occurring at government agencies and social media giants have made the issue a major topic of conversation.  With the announcement of Ubisoft's Watch Dogs for Play Station 4, the...

View Article


How to Avoid Tax-Time Identity Theft

Still haven't filed your taxes this year? This fact will get you moving: Tax refund theft is the fastest-growing crime in the country, according to a government report. It happens when crooks use your...

View Article

Image may be NSFW.
Clik here to view.

Fraud Files: Identity Theft Grips Entire Neighborhood

Tucked in a pocket of northeast Ohio, not far from Lake Erie, is a little piece of the American dream. Two-story homes of brick and stone stand in front of big backyards, surrounded by a community of...

View Article

Air Travel Security Changes Include Collection Of Additional Personal...

Airport security is making news these days. A hot topic under discussion this week is how screeners will identify risk-based travelers. It has civil liberty groups worried about the security of...

View Article


Image may be NSFW.
Clik here to view.

Woman Battles ID Thieves Who Keep Coming Like Zombies

Carole Stuber, a Long Island, N.Y., retiree, isn’t much of a gamer. So when she spotted a $400 charge from an online video game seller on a 2010 credit card statement, it stood out. Next came charges...

View Article

Are Your Electronic Communications Private? Think Twice Before You Send

You probably consider your emails and direct Twitter and Facebook messages to be private communications-something between you and the receiver. They aren't available for anyone else to read unless you...

View Article

Privacy Concerns Pit Parents Against New York Education Department

Privacy-minded parents are clashing with the New York State Education Department (NYSED) over the development of a data cloud that will contain the personal information of millions of New York public...

View Article

Image may be NSFW.
Clik here to view.

Retired Teacher Gets Tested By Tax Fraud

An accountant rarely rings at 8 a.m. with good news. Sure enough, when Paige Brown* took the call, she found out the IRS had rejected her tax return because someone already had filed in her name and...

View Article



Parents Use Apps To Mobilize Against Child ID Theft

More kids than ever are accessing the Internet through mobile devices, and more children than ever are having their identities stolen. With child identity theft and Internet security concerns...

View Article

Fame And Fortune Are No Defense Against Identity Theft

Celebrity, wealth and a battalion of body guards might seem like things that would deter identity thieves. But even the rich and famous can fall prey to identity theft. High-profile Americans from the...

View Article

BYOD Puts Employees, Employers At Risk of ID Theft

Employees using personal smartphones or iPads for office work might seem like a win-win all around. Workers don't have to keep track of multiple devices or transfer data between devices, and they have...

View Article

Cyber Security Giant: Attacks on Small Business 'Threaten All of Us'

Small businesses are the new darlings of cyber criminals. Business identity theft and cyber attacks are a rapidly growing problem with far-reaching ramifications for not only the companies targeted,...

View Article


Tax ID Theft Against Seniors Sparks Worry, Action Among Feds

Just when you think identity thieves can't sink any lower than robbing children by using their clean credit profiles for criminal purposes, news emerges of an escalating form of identity theft: tax...

View Article

Security Advice for Mobile Device Users

With 87 percent of American adults owning cellphones (according to Pew Research Center), 45 percent possessing smartphones, 26 percent toting e-book readers and 31 percent owning tablet computers, it's...

View Article

GAO: Flaws In IRS Controls Led To Invalid Refunds to Dead Taxpayers

It's a sad statistical fact that when data breaches or business identity theft occur, a failure of internal safeguards is often to blame-partially or entirely. Often, organizations or companies leave...

View Article


Image may be NSFW.
Clik here to view.

When a Soldier Comes Home to Identity Theft

Norman Rockwell painted soldiers coming home to open-armed relatives, hot meals and hard-earned rest. Rick Martinez’s homecoming wasn’t so heartwarming. The National Guardsman returned from an...

View Article


Steps Toward Tracking And Managing Your Digital Footprint

Even if you're not ecologically inclined, you've probably heard the term "carbon footprint"-a phrase that refers to the amount of excess carbon an individual, family or organization contributes to the...

View Article

What Medicare Fraud Means To You

Americans spend decades protecting their Social Security numbers - not carrying their cards in their wallets, carefully parsing who they share the number with, monitoring their Social Security...

View Article

Image may be NSFW.
Clik here to view.

Old School Scams Make a Comeback

Scammers don’t need to be master hackers to bust into your bank account. A pen and paper can be enough—especially if the paper comes from a lost or stolen checkbook. Cyber crimes may rule the...

View Article

Image may be NSFW.
Clik here to view.

Q&A: Everything You Need to Know About Social Bots

Social bots are programmed to appear as real people on social networks—tweeting and retweeting, amassing followers, even having matching Facebook accounts. Filippo Menczer, an Indiana University...

View Article


Image may be NSFW.
Clik here to view.

This Casanova Was An Imposter

Raul Siqueiros knows his way around Facebook. He frequently updates his own personal page, and as a Realtor, he also runs his company page to attract new clients. He's a social guy. But he had no idea...

View Article

Image may be NSFW.
Clik here to view.

Shut Out Hackers with Vulnerability, Penetration Testing

By Mark McCurley Many companies inadvertently give hackers an easy way into their networks by failing to stay on top of vulnerabilities, or weaknesses in their software, hardware or network...

View Article


Image may be NSFW.
Clik here to view.

Four Steps to Stronger Vendor Security

Four Steps to Stronger Vendor Security By Deena Coffman When it comes to entrusting your company’s sensitive information to suppliers and contractors, out of sight shouldn’t be out of mind. Consider...

View Article

Image may be NSFW.
Clik here to view.

Four Do's and Don'ts After a Breach

Companies aim for greater revenues, profits and brand loyalty. They never wish for data to be lost or stolen because a data breach takes away from these three important goals. But the reality is that...

View Article


Image may be NSFW.
Clik here to view.

10 Questions Executives Should Be Asking About Data Security

  The phone rings, and it’s your information security officer—or worse, law enforcement—with bad news. Your company appears to have experienced a data breach. Information that is protected by law or...

View Article

Image may be NSFW.
Clik here to view.

Avoid These Six Common Breach Scenarios

  By Deena Coffman A short list of trigger events are responsible for a large percentage of data breaches. The majority of exposures can be greatly minimized by focusing first on these areas. Also,...

View Article

Image may be NSFW.
Clik here to view.

5 Ways to Keep Your Office Copier Data Safe

When it comes to your business security, the office photocopier may be the last thing that comes to mind. But today’s generation of machines are networked, multi-functioning devices that can print,...

View Article

Image may be NSFW.
Clik here to view.

Case Study: Thieves Use Stolen Identity for Retail Therapy

Katie Smith* was living an upright life—working for a large manufacturer, saving for retirement and being a good neighbor—when she received a voicemail from Kohl’s department store about activity on...

View Article


Image may be NSFW.
Clik here to view.

How HR Can Safeguard PHI

By Deena Coffman Human resource departments are collecting a growing amount of protected health information (PHI) on employees and their dependents for health benefits on a daily basis. Yet many of...

View Article

Browsing latest articles
Browse All 54 View Live




Latest Images