Featuring the new “fingerprint sensor” Touch ID, the Apple iPhone 5s was released last week. Yet only two days after the release of the new phone, Germany’s Chaos Computer Club claims it already cracked the Touch ID system! Although there are positives to using biometric authentication, there are also areas of concern when it comes to your security. Click to learn more.
Category: Thought Leadership
Acxiom, one of the top data brokers in the country, is adding a new layer of consumer awareness and transparency. But even with this new transparency, we are missing the elephant in the room in regards to data brokers. Keep reading to learn how data brokers have been changing the very nature of what constitutes our individual private identity, with little or no input from the general public.
Back to school means more than packing lunches, picking out a new wardrobe, and buying supplies. It also means teaching your kids about the dangers of identity theft. Read on to learn the three important things parents should instill upon their kids as the school year starts.
In the following article, CEO Kent Lawson clarifies how user data is kept private and safe when using PRIVATE WiFi.
The recent revelations about the NSA’s ability to weaken privacy safeguards should remind us that privacy laws and rules need to be protected. We will continue to be a product that considers your privacy its top priority.
How do you think Google (and Facebook) make so much money? You are the product. They track which websites you visit, create a profile based on these sites (and other offline information), and then turn around and sell this information to advertisers.
Click to learn more about two anonymous search engines: DuckDuckGo and Ixquick.
With the open enrollment period for Health Insurance Exchange websites right around the corner — October 1, 2013 — the Identity Theft Resource Center (ITRC) recently issued a scam alert warning consumers to be aware of fake databases. The most frequently asked questions from consumers have been “are the databases safe?” and “is my information secure?”
Read on to discover the ITRC’s assessment of the risk and for tips on how to keep your medical data safe.
Recently, 15,000 hackers and security experts gathered in Las Vegas for DefCon 21, an annual conference where all the new hacking exploits and computer vulnerabilities are discussed.
While attendees learn how to wage new attacks on many systems, the conference also discusses how to prevent these attacks.
Often a vulnerable population from a consumer protection standpoint, the military has a unique set of challenges when engaged in social media as well. In fact, the Army has a division (the Online and Social Media Division in the Office of the Chief of Public Affairs) that recognizes the need for educating its soldiers on the effective and safe use of social media. Additionally, just a few weeks ago, the U.S. Army Criminal Investigation Command, commonly known as CID, warned the Army community to be “vigilant of internet scams and impersonation fraud, especially within popular social networking and dating websites.”
The Identity Theft Resource Center offers up some tips on how military personnel can keep themselves protected against social media scams.
Q: “I just read a shocking article which stated that Google recently told a court that users should not expect privacy when using their services, and that if a user wants privacy, they should use another service. I love gmail and YouTube, but I’m scared about a huge corporation knowing so much about me. Should I be wary of using Google products?”
Click to find out more!
The United States Appeals Court for the Fifth Circuit recently ruled that law enforcement does not have to issue a warrant in order to access historical location data that is stored by cellphone providers.
The court ruled that your location data is a “business record” and is not private information about you protected by the Fourth Amendment. To paraphrase Joe Biden, this is a BFD.
Last week’s Citi Bike data breach caused quite a flurry, exposing 1,174 pieces of user data after a technical glitch; like a hurricane, the story broke, caused confusion and chaos, and then just as quickly died down. In relative terms, the Citi Bike breach is a small one. However, one of the most surprising elements of this breach were the public comments which expressed outrage at the banks, credit card companies, even the government.
But the reality is: this was a business breach and it was the responsibility of NYC Bike Share to protect the information. With all these people up in arms about the financial industry reporting yet another breach, we think it’s important that consumers really know what they are up in arms about. Read on to learn more about where data breaches come from.
Individuals who receive a data breach notification letter are not automatically victims of identity theft. There is, however, a strong correlation between data breaches and identity theft. According to a recent Javelin study, one in four data breach notification letter recipients eventually becomes a victim of identity fraud. However individuals that are not yet victims of identity fraud will not necessarily face the same level of complexity in responding to the issue.
Two of the strongest tools in the arsenal are the Fraud Alert and the Credit Freeze. Below is the explanation of what each action will accomplish, the pros and cons of each, and why timing is also key.