Tagged: cybercrime

mobileidentitythefts

Identity Protection: 5 Tips to Stay Mobile Secure in 2015

Living a mobile lifestyle does not come without risk, especially where your identity is concerned. But staying mobile secure doesn’t have to be complicated. Consider this: 94.2% of identity victims say they are still highly engaged online and via their mobile devices despite having had their personally identifiable information stolen, according to a recent study from The Identity Theft Resource Center.

So how do we stay safe? Just follow these five tips!

HolidayGifts

Holiday Shopping Goes Mobile: Be Cyber Secure [INFOGRAPHIC]

As the holiday shopping bustle approaches, don’t just think about buying the perfect gift and getting a great deal. For a happy and healthy season, remember that being cyber secure when you make your holiday purchases online is just as important!

This year PRIVATE WiFi has teamed up with the National Cyber Security Alliance to help consumers be safe online when using their mobile devices are they shop. Check out our infographic learn more about the the threats of holiday shopping on the go and follow our five tips for cyber secure shopping.

Screen-Shot-2014-10-31-at-3.10s

CNN Meets With PRIVATE WiFi to Understand Public WiFi Exploits, Privacy Dangers

CNN International, arguably the world’s largest and most dominant cable news channel, sat down with PRIVATE WiFi this week to better understand the exploits and dangers on public WiFi networks.

CNN aired its “Walk in the Park” segment to showcase various hacking scenarios and the vulnerabilities of public WiFi – whether in a public park setting, hotel, airport, or similar location offering “free” WiFi.

identitythefthandprints

ITRC Victim Impact Survey Findings LIVE Event

On Wednesday, October 29, learn about the ITRC’s most recent survey report, “Identity Theft: The Aftermath.” A panel of experts will discuss the survey’s key findings, with a special emphasis on the emotional impact of identity theft on victims, and ways in which the industry as a whole can leverage this information to better serve victims and consumers.

Can’t make it to the event in Washington, DC, but want to be involved? Join in live on Twitter and follow along with the hashtag #IDTheftImpact. Keep reading for more details about this very important event.

computer-researchs

University of Maryland Professors to Study WiFi Hotspot Behavior

Two University of Maryland professors, David Maimon, an expert in online criminal behavior, and Jonathan Katz, the Maryland Cybersecurity Center director, recently received a $200,000 grant from the National Science Foundation to study how people access and use public WiFi hotspots.

Find out what the duo plans to do with the funds — including looking into why some users may be assuming that it’s safe to access sensitive information on public WiFi hotspots at “upscale” places.

WiFi Survey Experian

Experian Survey: We Understand WiFi Dangers but Don’t Protect Ourselves from Identity Theft

October is National Cyber Security Awareness Month, and in part to raise public awareness of the dangers of identity theft, Experian, a global information services company, has published a new survey regarding U.S. attitudes toward this serious problem. Check out the results — including why so many people still fail to take actions to protect themselves online.

Telus-Wifi-Bus-Photo-2s

Canadian Transit Systems to Get Free WiFi

You would think Canadians would be a little wary of using public WiFi after a spy agency was accused of using airport WiFi networks to track travelers. But Canadian cities are rapidly installing free public WiFi on their transit systems, including three Metro Vancouver buses that began offering free WiFi earlier this month. Keep reading to find out where else this convenience is expanding (and how to protect your online privacy!).

hacker-WiFis

How Hackers Protect Themselves When Using Public WiFi

Every year, thousands of hackers and security experts descend on Las Vegas for two of the world’s largest annual hacker conventions: Defcon and Black Hat. Security researchers present their latest findings and security exploits.

Keep reading to find out what types of hacking they are doing at these events and ways to protect yourself!