While ordering a hot cup of caffeine and hooking up to free internet has obvious advantages, many consumers aren’t aware that they’re in potentially dangerous “hot zones” for identity theft. Read on to learn more ways hackers harvest your personal information through your internet connection.
Category: Thought Leadership
Let’s just admit it: the passwords we use online are not very good. And we probably use the same one over many different online accounts.
Maybe you have had your accounts hacked in the past (who among us has not had their Facebook account hacked?), or maybe you haven’t, but it’s good to remember that our online security is only as good as our weakest password. Read on for information on “brute force” hacking and more tips to implement today.
Just because you’re in the halls of justice doesn’t mean your sensitive information is secure when you use a WiFi hotspot there.
Courts around the country that offer free WiFi are warning users they should be aware of the risks. Find out what you need to know to protect your personal data when you use their free wireless networks on jury duty.
American consumers love tablets and so do hackers. The 2013 Javelin Strategy & Research Identity Fraud Report found that tablet users in the U.S. are far more likely to be victims of identity fraud than all consumers.
That could be because tablets aren’t secure; and most tablet users make matters worse by not using security software. Find out what you can do to make sure your tablet doesn’t get you into trouble when you connect to Wifi hotspots.
The call center at the Identity Theft Resource Center is a busy place.
Our small group of Victim Advisors handle calls from all over the United States, dealing with everything from email account takeovers to medical identity theft and everything in between.
That being said, the same misconceptions come up again and again. We thought it would be a great idea to dispel some of these myths surrounding the issue of identity theft and replace them with the facts.
It was privacy bill that Congress debated (and ultimately defeated) last year. Well, don’t look now, because it’s back.
CISPA (Cyber Intelligence Sharing and Protection Act) allows private businesses and the government to share information about cyberthreats to prevent and defend against network and Internet attacks. Click to find out what this bill could mean for your online privacy.
Recently, Robert Grimes published an article on InfoWorld that detailed the most likely reasons that we end up being a target for hackers. Click to find out the top four reasons he identified — and learn the top ways to keep your sensitive online information safe and avoid becoming a victim of a hacker.
Facebook has always had issues when it comes to privacy. Each time the social media giant comes out with a new feature, it seems there is an uproar by privacy advocates about the implications and potential security issues. This took place with the Timeline switch, the sponsored stories debacle, and now one of Facebook’s newest features, Graph Search, is in the hot seat.
Let’s take a closer look at this new tool and find out what it is, why you would use it, and how to protect yourself from its prying eyes.
Ask the Expert: Is the Government Really Trying to Get Access to Websites for Surveillance Purposes?
The FBI is requesting back-door access to social media sites, as well as web email providers, and VoIP companies like Skype. Is it legal? Could it also open the door to hackers? Click to read the entire article and find out why the FBI wants an “easy” way to wiretap some online communications.
Identity theft related tax fraud remains a significant problem, despite the IRS preventing an alarming $20 billion of fraudulent refunds in 2012. This is a large increase in protection of refunds, $6 billion more than in 2011.
Click to find out more about what the IRS is doing for both fraud prevention and victim assistance.
In the latest installment of Ask the Expert, CEO Kent Lawson explains how different modes of information transmission are treated differently by the law. For example, the government needs a court order to look at your email, but not at your phone records or texts.
Click to read more and find out just what sensitive personal information Google may be handing over to the government about you. Best to assume you are being listened to or watched when doing anything online, indeed.
In 2011, the technology world was all abuzz with news of a new payment system which could turn your smartphone into a virtual wallet. Google was the first to come forward with their Google Wallet and they partnered with Visa and MasterCard to produce Near Field Communication systems in a limited number of smartphones.
Find out what the FDIC and other experts have to say about this service.