Identity Theft

Showing page 2 of 16 pages.

  • Think Twice Before Wiring That Money—An Impostor May Be on the Other Side

    Impostor scam complaints filed with the federal government soared as more and more crooks seek to separate Americans from their dollars with a simple phone call. That’s one of the findings of the Federal Trade Commission’s (FTC) annual Consumer Sentinel Network data book released earlier this year. The report’s authors warned, “The rise in impostor […] Read more

  • Frontier Airline’s Grizwald the Bear Can’t Comfort Employees After Data Loss

    Grizwald the Bear has his work cut out for him if he wants to boost morale at company headquarters. Frontier Airlines recently notified all headquarters employees of a serious data breach created by one of their co-workers. It’s a far-too-typical story in the workplace these days: a worker views or steals personal information then shares […] Read more

  • Hacked in Just 9 Minutes: The Story of Data Dump Misuse

    When the Federal Trade Commission (FTC) staff set out to measure how rapidly data can be misused, they didn’t expect it to happen so fast. An experiment conducted by FTC’s Office of Technology Research and Investigation (OTECH) turned up some very busy hackers who wasted no time trying to gain financially from the data set […] Read more

  • Risky to Bank on the Go

    Mobile malware is growing in prevalence. According to a new 2017 Mobile Banking Malware report from Javelin Research, roughly 7.7 million mobile banking users have downloaded phone apps from unofficial or third party app stores. Why is this a problem? Unofficial apps often contain malicious advertising or code. This malware could give cyber criminals access […] Read more

  • New Grads: Don’t Turn a Blind Eye to Data Risks with Job Search

    The road to a successful career after college is littered with land mines that can snag an unsuspecting graduate. Job applications, payroll firm data leaks, phishing emails, and other unsuspected data sources can spread your personally identifiable information (PII) well beyond your ability to control it. Applications Ask It All When was the last time […] Read more

  • Don’t Laugh at Social Security’s New Plan to Guard Personal Data

    Two-factor authentication or two-step authentication is slowly gaining traction in many online systems. Nowhere is such a boost more needed than with the Social Security Administration (SSA) which guards your Social Security number (SSN) and your wage data. Second Time’s the Charm? It’s not the first time that SSA has attempted to add layers of […] Read more

  • Celebrities Risk Losing Face After Plastic Surgery Clinic Photo, Data Theft

    We’ve stressed the risk of medical records data breaches before, but a new breach could be the most memorable and damaging in recent history. Dr. Zain Kadri’s private plastic surgery clinic on Rodeo Drive in Beverly Hills experienced a data breach that included the loss of 15,000 customer records along with “before and after” photos. […] Read more

  • Travelers Beware: Your Data is at Risk

    “Attention. Attention. Your flight has been delayed for three hours.” The first thing most travelers do, when faced with such an announcement, is reach for their smartphone, then grab the charging cord. Wait! That available electronics outlet could be compromised and plugging in could start data flowing into or out of your phone without your […] Read more

  • WannaCry Ransomware Can Be Stopped, But Don’t Delay

    The globe is roiling with reports of WannaCry malware locking down PCs and demanding money for access return. Cases of this fast-moving attack have now been documented in over 100 countries. Here’s what we know so far: Over 20 different hospitals in the U.K. were hit by the ransomware late last week, shutting down access […] Read more

  • Define Privacy to Secure It

    The concept of privacy has different meanings. For a teen, it can mean, “Get out of my room.” For an adult, it can mean, “I need to see your Facebook to know you’re safe.” For each individual, privacy can be an elusive, changeable concept but there are two things to agree on: privacy is important, […] Read more

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Follow us on Twitter

Follow us on LinkedIn