How Secure Is Your Home WiFi Network?
If you read this blog, you are probably aware about the security problems inherent to public WiFi networks. But what...
If you read this blog, you are probably aware about the security problems inherent to public WiFi networks. But what...
The United States has successfully resisted chip and pin technology for nearly a decade, and we’ve got the data breaches to prove it. Find out why transitioning away from cards with magnetic strips could be a lengthy process, even though better credit card security is long overdue.
The Department of Justice recently released a report on identity theft victims for 2012 entitled Victims of Identity Theft. In just one year, 7% of the population — that’s more than 16 million U.S. residents age 16 or older — were victims of identity theft. Losses from identity theft came to an astounding $24.7 billion.
Consumers love their tablets. Their big touch screens and extreme portability make them ideal for browsing, apps, email, and a host of other online activities. So it’s not surprising that over half of users say tablets are their favorite device, according to Adobe data.
Unfortunately, tablets are also the favorite device of identity thieves, who love to hack them.
If companies like Microsoft can’t safeguard their own proprietary information, how well can they protect your information? Keep reading to find out what hackers allegedly did with popular video games such as “Call of Duty” and “Gears of War 3” as well as other software systems.
On April 7, all of the daily email blasts we received had the same word in the subject line. That word was Heartbleed. Keep reading to learn how to take measures to protect yourself and your information because Heartbleed (whether everyone knows it or not) is a serious bug, but there are security steps you can take today. After all, a bug in your computer is not unlike a bug in your body, and an ounce of prevention is worth a pound of cure.
CSID, a company that offers identity protection for businesses, released a white paper entitled “When Good Technology Goes Bad: Evolution of Mobile Technology,” which describes how our culture has been completely transformed by mobile technology and public WiFi networks. So what can you do to stay safe? Check out the advice and tips from CSID.
IT firm Sophos wanted to find out whether people were connecting to wireless networks securely and identified 72,000 wireless networks around San Francisco in a matter of days. How did these networks fare when it comes to WiFi security? Who is using the best security? And HOW many connected to Sophos’s fake public WiFi network?
The ITRC has been educating consumers about the real risk of identity theft since 1999. One of the notions that the general public has is that identity theft can’t or won’t happen to them. There are a variety of reasons that people will cite, such as “I don’t have good credit,” “my identity isn’t worth stealing,” and “I don’t make enough money to be an attractive target.” While these sound like logical reasons, the fact is that your identity can be valuable outside of just the financial realm.
Do you think it’s legal to collect data transmitted over unencrypted WiFi networks? Google does. That’s why it has gone to the highest court in the land to get a final decision on one of the most hotly debated legal issues of our time. The stakes couldn’t be higher for Google and for WiFi users everywhere.
Let’s start with the good news: you are still safe. The latest Heartbleed situation — which is a software bug, not a virus — has not endangered the privacy and security of our customers’ communications.
But one of our industry’s most respected security analysts claims “catastrophic” is the right word for Heartbleed, because “on the scale of 1 to 10, this is an 11.”
How likely are you to lose your job? What are the odds that you will take that medication your doctor prescribed to you? Are you the kind of person who will take your business to a competitor?
These are not just abstract questions. They are actual secret “consumer scores” that big data compiles on you and every adult in the U.S. to help companies and the government predict your behavior.