Blog Posts Tagged with "Identity Theft"

F29746c6cb299c1755e4087e6126a816

FTC Panel: How to Protect Your Kids

July 26, 2011 Added by:Kelly Colgan

At the national level, representatives from government, business, nonprofits, legal services and victim advocacy organizations explored the nature, prevention and resolution of identity fraud that target children, particularly foster youths...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

UK Cabinet Office Report: The Cost of Cyber Crime

July 26, 2011 Added by:Headlines

The report indicates that, at a total estimated cost of £21bn, over three-quarters of the economic impact of cyber crime in the UK is felt by business. In all probability, and in line with worst-case scenarios, the real impact of cyber crime is likely to be much greater...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

JPMorgan Chase Banker Pleads Guilty to ID Theft

July 23, 2011 Added by:Headlines

Manhattan District Attorney Cyrus R. Vance, Jr., today announced the guilty plea of HAO “HOWIE” WANG, 28, for stealing more than $1.1 million from JPMorgan Chase and stealing the identities of four victims. WANG pled guilty to Grand Larceny, Identity Theft, Falsifying Records, and Forgery...

Comments  (2)

F29746c6cb299c1755e4087e6126a816

Not All Free Identity Theft Services are Created Equal

July 20, 2011 Added by:Kelly Colgan

In order to sign up for identity theft protection services, you have to hand over a lot of vital data about yourself. Do you really want to give this to a company you’ve never done business with before—especially one that’s offering you something for free?

Comments  (0)

37d5f81e2277051bc17116221040d51c

Spear Phishing Leaves a Bloody Wound

July 19, 2011 Added by:Robert Siciliano

Once criminal hackers get a person’s username and email address, they can begin to launch a targeted spear phish scam. Scammers copy the design of each breached entities outgoing email campaign and blast the breached list with “account update” or other ruses...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Judge Says Its OK to Post Social Security Numbers

July 16, 2011 Added by:Robert Siciliano

Over the years, many have interpreted the to allow Social Security numbers, to be posted online. I’ve seen Social Security numbers for Jeb Bush, Colin Powell, former CIA Director Porter Goss, Troy Aiken, and Donald Trump, all published on the Internet...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Over 140,000 Children Victims of Identity Fraud Yearly

July 13, 2011 Added by:Headlines

"Child identity fraud poses complex challenges to consumers, businesses and regulators. Unfortunately, minors' identities are particularly appealing to fraudsters because their personal data is untainted, legitimate and less likely to be monitored for misuse..."

Comments  (0)

6648b1abd4a9b964566c3690613f20a6

Case Study: Advance Fee Scams

July 12, 2011 Added by:Mark Baldwin

I am sure you all have received an email purportedly from a wealthy person overseas who needs your help transferring money. The reasons vary, but they always promise a large sum in return for help. Recently I received the following email that was an attempt at advance fee fraud...

Comments  (3)

E9e4b2893895604b1b913b7b02e6640b

Six Tips to Protect Your Personal Data After a Breach

July 11, 2011 Added by:Brian McGinley

Data breaches are an everyday occurrence affecting millions of Americans each year. Just ask crafters who shop at Michael’s Stores, Sony PlayStation Network gamers, and investors at Morgan Stanley. They’re all vulnerable to identity theft because their information (PII) was exposed...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Phishers, Shoulder Surfers and Keyloggers

July 10, 2011 Added by:Robert Siciliano

McAfee’s most unwanted criminals include pickpockets, Trojans, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. The key is awareness, vigilance, and investing in products and services that are designed to protect you...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

What to Do When You Get a Data Breach Letter

July 07, 2011 Added by:Kelly Colgan

A day doesn’t go by when we read news of a data breach at a major company, healthcare facility or financial institution. Epsilon, Sony and now Morgan Stanley, are a good examples. What do you do when a data breach notification letter lands in your mailbox? The short answer: Don’t panic...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Data Breaches Are Up While Lost Records Are Down

July 06, 2011 Added by:Robert Siciliano

There are now multiple breach lists, and not all define a data breach the same way. According to the Identity Theft Resource Center, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Fraudulent Credit Applications Start with the Device

June 28, 2011 Added by:Robert Siciliano

Device fingerprinting coupled with the device’s reputation and risk profile helps identify the bad guys in the acquisition channel, so you don’t have to rely on other fraud detection tools that drive up the cost to decision an application...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twelve Tips for Combating Identity Theft

June 15, 2011 Added by:Headlines

The bad news is that the cost of remediating an identity theft event increased by sixty-three percent over the same time period, and the incidence of "friendly fraud" - identity theft by an acquaintance of the victim - rose seven percent...

Comments  (1)

F29746c6cb299c1755e4087e6126a816

Five Ways to Keep Your Kids’ Identity Safe

June 12, 2011 Added by:Kelly Colgan

In a recent study of 42,000 children, Carnegie Mellon found that 10.2 percent of their Social Security numbers had been misused—more than 50 times the rate for the adults studied...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Top 10 Threats to Security and Privacy for Business

June 10, 2011 Added by:Bill Gerneglia

It is difficult to remain 100% confident in your organizations security policies and procedures, but we must remain 100% committed to diligence in constant upgrades and feedback from attempted breaches to our networks and systems...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »