Monthly Archive: April 2014

That Shared Family Tablet Could End Up Costing You Plenty

Consumers love their tablets. Their big touch screens and extreme portability make them ideal for browsing, apps, email, and a host of other online activities. So it’s not surprising that over half of users say tablets are their favorite device, according to Adobe data.

Unfortunately, tablets are also the favorite device of identity thieves, who love to hack them.

Hackers Steal Data from Microsoft and the Army

If companies like Microsoft can’t safeguard their own proprietary information, how well can they protect your information? Keep reading to find out what hackers allegedly did with popular video games such as “Call of Duty” and “Gears of War 3” as well as other software systems.

The Heartbleed Calls That Never Came

On April 7, all of the daily email blasts we received had the same word in the subject line. That word was Heartbleed. Keep reading to learn how to take measures to protect yourself and your information because Heartbleed (whether everyone knows it or not) is a serious bug, but there are security steps you can take today. After all, a bug in your computer is not unlike a bug in your body, and an ounce of prevention is worth a pound of cure.

CSID Recommends Using a VPN to Stop Man-in-the-Middle Attacks

CSID, a company that offers identity protection for businesses, released a white paper entitled “When Good Technology Goes Bad: Evolution of Mobile Technology,” which describes how our culture has been completely transformed by mobile technology and public WiFi networks. So what can you do to stay safe? Check out the advice and tips from CSID.

Sophos’ Warbiking Campaign Shows Insecurities In Wireless Connections

IT firm Sophos wanted to find out whether people were connecting to wireless networks securely and identified 72,000 wireless networks around San Francisco in a matter of days. How did these networks fare when it comes to WiFi security? Who is using the best security? And HOW many connected to Sophos’s fake public WiFi network?

Identity Theft Anyone? How the ITRC Call Center and Other Resources Help Victims In Need

The ITRC has been educating consumers about the real risk of identity theft since 1999. One of the notions that the general public has is that identity theft can’t or won’t happen to them. There are a variety of reasons that people will cite, such as “I don’t have good credit,” “my identity isn’t worth stealing,” and “I don’t make enough money to be an attractive target.” While these sound like logical reasons, the fact is that your identity can be valuable outside of just the financial realm.

Google Says Collecting Data From Unencrypted WiFi Networks Isn’t Illegal

Do you think it’s legal to collect data transmitted over unencrypted WiFi networks?  Google does. That’s why it has gone to the highest court in the land to get a final decision on one of the most hotly debated legal issues of our time. The stakes couldn’t be higher for Google and for WiFi users everywhere.

Heartbleed: A Message From PRIVATE WiFi’s CEO

Let’s start with the good news: you are still safe. The latest Heartbleed situation — which is a software bug, not a virus — has not endangered the privacy and security of our customers’ communications.

But one of our industry’s most respected security analysts claims “catastrophic” is the right word for Heartbleed, because “on the scale of 1 to 10, this is an 11.”

Digital by Design: Your Secret Consumer Scores and How They Are Used Against You

How likely are you to lose your job? What are the odds that you will take that medication your doctor prescribed to you? Are you the kind of person who will take your business to a competitor?

These are not just abstract questions. They are actual secret “consumer scores” that big data compiles on you and every adult in the U.S. to help companies and the government predict your behavior.