Digital Privacy

Showing page 2 of 10 pages.

  • Child ID Theft and the Statute of Limitations

    Identity theft is far too common for youngsters. It’s often not discovered until years after the theft occurs. It can be tough to help your child recover from a case of stolen identity, but your state’s laws on the statute of limitations can help. Researchers at Carnegie Mellon in 2011 documented that children were 50 […] Read more

  • Yahoo Support Scams Multiply

    Do you long for the good old days when you could chat with a support person on the phone to resolve problems? Well, scammers hope so because they’re busy publishing bogus tech support numbers that offer assistance with last year’s biggest tech headache—Yahoo. Every one of these numbers is fake. The Federal Trade Commission (FTC) […] Read more

  • Hacking Key Fob-Activated Cars

    For years, there have been rumors and puzzling reports of keyless cars being mysteriously broken into in some unknown manner. Last month, the National Insurance Crime Bureau (NICB) released study results showing one major way thieves have been successful in unlocking these push button vehicles and even driving them away. NICB purchased what it termed […] Read more

  • 2017: The Year of Reviewing Freely

    Got a gripe with a business? Starting this year, you’ll be free to post that negative review online despite your contract’s fine print. This week, President Obama signed the Consumer Review Fairness Act of 2016 into law. It prohibits companies from issuing fines to users who post bad press and comes in response to a […] Read more

  • Top 5 Security Resolutions For 2017

    Everybody’s making lists this week. Lose weight. Walk more. Shun that red wine. Folks at ID Watchdog don’t like to brag, but our Top 5 list can help you shrink your risk of identity theft. You probably haven’t studied these risk factors before, but what you don’t know could cause major headaches. Set up an […] Read more

  • Halt Package Pirates!

    It’s that time of year again. Time to order gifts online and (perhaps) have your carefully selected gifts stolen from your front porch or apartment lobby. These thieves have earned the name Package Pirates and home videos show how they openly follow an Amazon or UPS truck as it stops to make deliveries then quickly […] Read more

  • Who’s Watching You?

    Before FBI director James Comey triggered an election eve firestorm last month, he made waves in another way—by hiding a potential information source hackers have been known to exploit. In a speech to students at Kenyon College in Ohio several months ago, Comey revealed that he employs an inexpensive anti-surveillance device of his own; he […] Read more

  • Update Early, Update Often

    In our hack-a-day world, it pays to be on guard. That includes being alert when it comes to software updates for your computer. Microsoft still offers security patches on the second Tuesday of each month. With newer models, you can set them to auto-update and forget about the hassle of doing the updates yourself. Adobe […] Read more

  • Huge Hack of Student Emails Uncovered

    From a desk thousands of miles away, a Phoenix, AZ man allegedly tried to compromise thousands of university student accounts. He succeeded at several East Coast institutions. For students involved, this theft of their data could create new, unfamiliar risks and some sleepless nights. Jonathan Powell was taken into custody November 2 and charged with […] Read more

  • Another Massive Breach Hits Adult Network

    As we predicted, the massive MySpace breach of over 359 Million user files did not retain its “Top Of The Breached” crown for long. LeakedSource this week reported receiving evidence of a FriendFinder Networks data breach topping 412 Million user records. That makes it one of the largest documented breach in recording history. That’s bad […] Read more

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Follow us on Twitter

Follow us on LinkedIn