Items Tagged with "Identity Theft"


37d5f81e2277051bc17116221040d51c

Criminal Hackers Responsible For Most Data Breaches

March 04, 2011 Added by:Robert Siciliano

According to the ITRC, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers, and 26% involved credit or debit card data. The majority of these attacks were malicious hacks or insider theft...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Social Security Numbers Easily Cracked

March 02, 2011 Added by:Robert Siciliano

Researchers at Carnegie Mellon have developed a reliable method for predicting Social Security numbers using information from social networking sites, data brokers, voter registration lists, online white pages, and the publicly available Social Security Administration’s Death Master File...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

College Suffers from Digital Identity Theft

February 28, 2011 Added by:Headlines

Problems surrounding the protection of a digital identity are not just a matter of concern for individuals, as businesses and private organizations are also subject to the threat of "identity theft" by criminal enterprises...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Online Credit Applications Ripe For Fraud

February 24, 2011 Added by:Robert Siciliano

Fraudulent credit card applications are the most lucrative form of credit card fraud. Identity thieves love credit cards because they are the easiest accounts to open, and they allow thieves to quickly turn data into cash...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Six Types of Identity Theft

February 18, 2011 Added by:Robert Siciliano

Identity Cloning encompasses all forms of identity theft. The thief is actually living and functioning as the victim on purpose. They may be hiding in plain sight due to the fact they are running from the law, evading child support or they could be mentally ill...

Comments  (3)

44fa7dab2a22dc03b6a1de4a35b7834a

Identity Fraud Cases and Costs Plummeted Last Year

February 17, 2011 Added by:Bill Gerneglia

A report by Javelin said the decline in victims and amount of identify fraud, which slid 34 percent from $56 billion to $37 billion, was probably due to the steep drop in reported data breaches, which were down from 604 cases in 2009, with 221 million records exposed, to 404 cases in 2010...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Privacy Legislation May Advance in 2011

February 08, 2011 Added by:David Navetta

Federal privacy legislation may see the light of day in 2011. Democratic supporters of the legislation show no signs of slowing down. Of course, the key to the success of federal privacy legislation lies in the House, and there Republicans have voiced support for a privacy bill as well...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Small Romanian Town Has Become Cyber Crime Central

February 03, 2011 Added by:Headlines

A fascinating article explores how a small Romanian town has evolved to become an international center for cybercrime operations. In Râmnicu Vâlcea, a remote village in the Southern Carpathian foothills, online predatory networks have brought a flood of new wealth to the once agrarian community...

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee's Ten Tips for Securing New Devices in 2011

January 23, 2011 Added by:Robert Siciliano

Use software that backs up smart devices and use strong discretion when storing, saving or editing personal information on your smartphone or device. Don’t keep all of your personal passwords on your device, and avoid using it to store financial information like credit card and bank account numbers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Criminal Networks Thrive in Online Black Markets

January 21, 2011 Added by:Headlines

PandaLabs researchers have discovered that criminal networks are selling stolen credit card information for as little as $2.00. For a mere $700.00, someone can purchase account credentials that guarantee access to balances of at least $80,000.00 - just pennies on the dollar for the potential yield...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Faux Paux Reveals Private Data

January 18, 2011 Added by:Headlines

The pop-up now includes a request for permission to access the user's address and cell phone number. The change is subtle enough that most Facebook users are apt to allow the application to access this data without even noticing...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EMC Engineer Stole Nearly $1 Million in Hardware

January 10, 2011 Added by:Headlines

Kevin Kelly, a former test engineer with EMC, has plead guilty to making off with almost one million dollars worth of equipment. Kelly concealed the hardware in a duffel bag and then he sold it on the internet. Most of the stolen goods were sold to BL Trading, a Massachusetts-based reseller...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Inside The Nigerian 419 Scam

January 10, 2011 Added by:Robert Siciliano

This is a simple but vicious scam that can easily take you by surprise. This scam can have many different twists and varieties, and you must avoid being taken in by any of them. The simplest solution is to never send money, for any reason, to anyone, in response to a phone call or email...

Comments  (2)

37d5f81e2277051bc17116221040d51c

Hacking Wireless for Identity Theft

January 02, 2011 Added by:Robert Siciliano

Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-time high. Wireless Internet is amazing. But is it safe?

Comments  (0)

37d5f81e2277051bc17116221040d51c

Typosquatting Scams in Social Media

December 30, 2010 Added by:Robert Siciliano

Typosquatting, or URL hijacking, is a form of cybersquatting that targets Internet users who accidentally type a website address into their web browser incorrectly. Some typosquatters have begun using these domains to advertise deceptive promotions, offering gift cards or iPads to lure visitors...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Twelve Scams of Christmas and Other Attacks

December 24, 2010 Added by:Robert Siciliano

Identity Thieves and Cybercriminals Take Advantage of the Holiday Season, Aiming to Steal Consumers’ Money, Identities and Financial Information. As cybercriminals begin to take advantage of the holiday season, be cautious....

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »