It’s believed that Goodwill stores in as many as 21 states may have been hacked for the credit card data of consumers who’ve shopped at the thrift stores. Some signs have led investigators to believe these cybercrimes may have begun as early as May of 2012. But what would make someone stoop so low as to attack a charity whose purpose is to restore a sense of pride in people who are in need, mostly by providing them with training and skills to find better jobs?
Tagged: identity theft
While the Internet initially provided a platform for the powerless, governments and big business are now using the power of the Internet to collect unprecedented amounts of data about us. How has this happened?
It might be hard to envision life before the convenience of portable devices emerged on the market. Providing everything from instant connectivity and access to information, tablets and smartphones can feel like we’re carrying a portable personal assistant everywhere we go.
But one trend emerging in the mobile device market does have its critics raising the alarm for personal security, and that’s the high numbers of consumers who use health and fitness apps. These apps, which track our healthy habits and exercise information, seem like a great way to foster a healthy lifestyle, but the reality has industry experts a little concerned.
No one doubts that biometric identification is a powerful tool with many possible applications. But there’s a downside to this technology: in essence, our faces can now be used for government tracking and surveillance that was not possible until now. And there are few safeguards currently in place to curb excessive use of this tool.
We are always excited to read new reports on issues relating to identity theft, but the 2014 Trustwave Global Security Report is of special interest to us here at the ITRC. These reports help us to understand what the people who call our victim assistance center may be experiencing and improve our ability to help them.
Have you ever thought about how many times you’ve given out your Social Security number without thinking about the consequences? Or why so many organizations say they need it? If you haven’t, you’re not alone. Social Security numbers are the most important piece of information a cybercriminal needs to commit identity theft. Yet many consumers don’t worry about handing over their most valuable identity asset until it’s too late.
AT&T has warned customers of a security breach in which three contracted workers accessed personally identifiable information like customer names and Social Security numbers.
FTC Commissioner Maureen Ohlhausen has spent her entire career focused on Internet privacy, data protection, and cybersecurity practices. An accomplished attorney, public speaker, and “big data” expert, she also finds time to maintain an active social media presence on Twitter.
Fifteen years ago, Mark Goldstein and his family were victims of medical identity theft. It was 1999 and not much was known about the repercussions of such fraud and the rise of cybercrime. As Goldstein describes it, the landscape for criminals was evolving.
When most people think of identity theft, they probably think of having their credit card information stolen or an account opened in their names.
In reality, there are many types of identity theft as a result of a stolen Social Security number or someone fraudulently filing for your government disability, your health insurance benefits, and even your tax return.
Have you heard about the Digital Shadow tool, a promotion for the game Watch Dogs? The folks behind Digital Shadow allege that “you are not an individual, you are a data cluster” which is certainly scary enough to make you think a little bit more about your online privacy settings and what you’re sharing on the “love to hate it” social network.
“Access your digital shadow and see what we see” is the tag line for Digital Shadow. Read more now.
The United States has successfully resisted chip and pin technology for nearly a decade, and we’ve got the data breaches to prove it. Find out why transitioning away from cards with magnetic strips could be a lengthy process, even though better credit card security is long overdue.