A man pretending to be Microsoft co-founder Paul Allen has been arrested on credit card fraud, and experts say there is no reason to assume that a public figure like Allen is any less susceptible to identity theft.
Monthly Archive: March 2012
Mobile devices have revolutionized the workplace by making near-instant response times possible outside of normal work hours. Who among us hasn’t worked into the night during a hotel stay or answered company email at Starbucks? But when employees use unsecured devices such laptops, tablets and smartphones to do that, they greatly increase the risk to company networks and their sensitive data.
The types of scams thieves can utilize are virtually limitless, and the prevalence of social networking and the ever-increasing use of technology in everyday lives have made these scams all the more simple to perpetrate. If you have fallen victim to a scam, or even if you’ve only been targeted but were quick enough to spot the scam for what it was before volunteering your personal information, there are a few quick steps you can take to properly report the scam, in the hopes that the thief will not be able to victimize more unsuspecting consumers in the future.
Kudos to Time magazine for explaining how to correct the multiple layers and headaches involved with identity theft fraud.
As CEO Kent Lawson has said, the Private WiFi software solution began because every IT department in a large company offers virtual private networks to employees who travel or spend some time working in their local coffee shops, and he felt it was time to offer a sophisticated yet simple consumer product that offered the same protections.
It’s nice to be recognized for being that simple solution — many thanks to the team at Tech Goes Strong for its recent recommendation of Private WiFi software as the best personal VPN solution for non-techy folks!
Here’s what they had to say about our product:
It’s a relatively easy and violence-free crime that is growing exponentially.
But did you know that before tax fraud spread to the wider public, electronic tax fraud had its roots in prisons?
You may remember an article I wrote last summer about “hack-in-a-box” tools that allowed novices to buy an off-the-shelf product that allowed them to hack wifi networks by simply flipping a switch.
One of the products I talked about is called WiFi Pineapple. As I wrote in last year’s post, WiFi Pineapple has only one purpose: to hack into unsecured wifi communications. They even admit it on their website:
An underground epidemic? A new CNN investigation into identity theft and tax fraud calls it a “scary proposition” due to just how easy it is for scammers to steal tax refunds from hard-working American citizens.
How easy is it?
Are you pinning? Since the rise of Pinterest earlier this year, pinning is the new craze in social media. But what are the privacy implications of this network? Read more to find out.
In true phishing fashion, a fake email tries to dupe recipients into clicking on the embedded links in an attempt to obtain sensitive information like credit card account numbers and passwords.
Now, smishing has come along and it combines the name of the technology used for text messaging (SMS, or short message service) with the word phishing.
Maybe you have heard about identity theft in the news. Perhaps you even know someone who has become a victim. However, identity theft still remains one of those things that always happens “to someone else”. If you have wondered if it could happen to you then here is a quick quiz to gauge how at risk you are for becoming a victim of identity theft. Answer the questions below and add up the corresponding numbers to get your score: