Items Tagged with "Identity Theft"
August 08, 2011 Added by:Kelly Colgan
An interesting Appellate Court opinion was recently issued that requires us to acknowledge the expanding realm of our own identity footprints and the need for evolving views of how we define identity theft. The case stemmed from a Juvenile Court case in Kings county California...
July 26, 2011 Added by:Kelly Colgan
At the national level, representatives from government, business, nonprofits, legal services and victim advocacy organizations explored the nature, prevention and resolution of identity fraud that target children, particularly foster youths...
July 26, 2011 Added by:Headlines
The report indicates that, at a total estimated cost of £21bn, over three-quarters of the economic impact of cyber crime in the UK is felt by business. In all probability, and in line with worst-case scenarios, the real impact of cyber crime is likely to be much greater...
July 23, 2011 Added by:Headlines
Manhattan District Attorney Cyrus R. Vance, Jr., today announced the guilty plea of HAO “HOWIE” WANG, 28, for stealing more than $1.1 million from JPMorgan Chase and stealing the identities of four victims. WANG pled guilty to Grand Larceny, Identity Theft, Falsifying Records, and Forgery...
July 20, 2011 Added by:Kelly Colgan
In order to sign up for identity theft protection services, you have to hand over a lot of vital data about yourself. Do you really want to give this to a company you’ve never done business with before—especially one that’s offering you something for free?
July 19, 2011 Added by:Robert Siciliano
Once criminal hackers get a person’s username and email address, they can begin to launch a targeted spear phish scam. Scammers copy the design of each breached entities outgoing email campaign and blast the breached list with “account update” or other ruses...
July 16, 2011 Added by:Robert Siciliano
Over the years, many have interpreted the to allow Social Security numbers, to be posted online. I’ve seen Social Security numbers for Jeb Bush, Colin Powell, former CIA Director Porter Goss, Troy Aiken, and Donald Trump, all published on the Internet...
July 13, 2011 Added by:Headlines
"Child identity fraud poses complex challenges to consumers, businesses and regulators. Unfortunately, minors' identities are particularly appealing to fraudsters because their personal data is untainted, legitimate and less likely to be monitored for misuse..."
July 12, 2011 Added by:Mark Baldwin
I am sure you all have received an email purportedly from a wealthy person overseas who needs your help transferring money. The reasons vary, but they always promise a large sum in return for help. Recently I received the following email that was an attempt at advance fee fraud...
July 11, 2011 Added by:Brian McGinley
Data breaches are an everyday occurrence affecting millions of Americans each year. Just ask crafters who shop at Michael’s Stores, Sony PlayStation Network gamers, and investors at Morgan Stanley. They’re all vulnerable to identity theft because their information (PII) was exposed...
July 10, 2011 Added by:Robert Siciliano
McAfee’s most unwanted criminals include pickpockets, Trojans, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. The key is awareness, vigilance, and investing in products and services that are designed to protect you...
July 07, 2011 Added by:Kelly Colgan
A day doesn’t go by when we read news of a data breach at a major company, healthcare facility or financial institution. Epsilon, Sony and now Morgan Stanley, are a good examples. What do you do when a data breach notification letter lands in your mailbox? The short answer: Don’t panic...
July 06, 2011 Added by:Robert Siciliano
There are now multiple breach lists, and not all define a data breach the same way. According to the Identity Theft Resource Center, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers...
June 28, 2011 Added by:Robert Siciliano
Device fingerprinting coupled with the device’s reputation and risk profile helps identify the bad guys in the acquisition channel, so you don’t have to rely on other fraud detection tools that drive up the cost to decision an application...
June 15, 2011 Added by:Headlines
The bad news is that the cost of remediating an identity theft event increased by sixty-three percent over the same time period, and the incidence of "friendly fraud" - identity theft by an acquaintance of the victim - rose seven percent...