How much do we reveal about ourselves by simply going online? Keep reading to learn the surprising amount of data leaked by software programs and mobile phone apps — and how easy it is for someone else, from the government to cybercriminals, to get access to this information.
Do you think your home wireless network is secure? That’s what Barb Angelova thought, until she got the scare of her life. What happened to Barb isn’t unusual. What’s more, it should be a wakeup call for anyone who uses home WiFi.
Have you ever thought about how many times you’ve given out your Social Security number without thinking about the consequences? Or why so many organizations say they need it? If you haven’t, you’re not alone. Social Security numbers are the most important piece of information a cybercriminal needs to commit identity theft. Yet many consumers don’t worry about handing over their most valuable identity asset until it’s too late.
AT&T has warned customers of a security breach in which three contracted workers accessed personally identifiable information like customer names and Social Security numbers.
“Never do anything you wouldn’t want to share with everyone on public WiFi,” warns CNN’s Laurie Segall in an eye-opening look at online stalking, geotracking, and the risks of surfing online without a VPN in a wireless hotspot.
While law enforcement believes they were able to hunt down and destroy all instances of both GameOver Zeus and Cryptolocker — two of the most notorious web viruses operating today — there is no way to know for sure. Even if they did destroy all copies of both viruses, there will certainly be more of this kind of malware released by other hackers in the future. Keep reading to learn things you can do to protect yourself from botnets and ransomware.
Fifteen years ago, Mark Goldstein and his family were victims of medical identity theft. It was 1999 and not much was known about the repercussions of such fraud and the rise of cybercrime. As Goldstein describes it, the landscape for criminals was evolving.
Kids almost always have clean credit ratings, and parents aren’t likely to monitor their credit scores. Learn more about why both of these things make children’s Social Security numbers and sensitive personal information very valuable to identity thieves. Plus, 10 steps you must take if your child has had their identity stolen or compromised, including sample letters and links to help you today.
In what is one of the largest data breaches in history, eBay has gone public with the news that they have been the victims of a data breach that resulted in 145 million customer records being exposed.
Click to find out whether the user information exposed — perhaps even your personal information — had been encrypted by eBay.
When most people think of identity theft, they probably think of having their credit card information stolen or an account opened in their names.
In reality, there are many types of identity theft as a result of a stolen Social Security number or someone fraudulently filing for your government disability, your health insurance benefits, and even your tax return.
When we are traveling, there’s nothing more convenient than hotels offering WiFi so we can check our email and possibly even get a little work done. Since we usually pay a premium to access the hotel’s WiFi network, many of us probably assume that it must be secure.
Malicious insiders and criminal attacks are a growing concern for businesses, especially when we consider how persistent data has become in the age of cloud and mobility. After all, a data breach can result in enormous damage to a business that goes way beyond the financials. At stake is customer loyalty and brand reputation.