A recent Good Morning American segment featuring PRIVATE WiFi begins with a startling truth: “Everyone is at risk; public WiFi can leave your most private information wide open.” While these public hotspots are widespread and convenient, the free connection comes at a hidden price.
With a man-in-the-middle attack, your app thinks it is communicating with the app’s web server, but in fact, all of your personal information is being sent directly to the hacker’s computer. Keep reading for details on the two kinds of SSL vulnerabilities that FireEye found in some of the most popular Android apps — and how to protect yourself today.
No one doubts that biometric identification is a powerful tool with many possible applications. But there’s a downside to this technology: in essence, our faces can now be used for government tracking and surveillance that was not possible until now. And there are few safeguards currently in place to curb excessive use of this tool.
Privacy expectations have been evolving or changing for several years. As younger generations become more comfortable sharing personal information with less expectation that it will remain private, it’s no secret that our online privacy expectations are fading fast.
A shocking two thirds of us (64%) have little or no concern about connection to public WiFi networks, despite the fact that everything we do on these networks can be viewed and stolen by others. Check out a study by Zone Alarm, which highlights three of the biggest risks on public WiFi: man-in-the-middle attacks, rogue WiFi networks, and packet sniffers.
We are always excited to read new reports on issues relating to identity theft, but the 2014 Trustwave Global Security Report is of special interest to us here at the ITRC. These reports help us to understand what the people who call our victim assistance center may be experiencing and improve our ability to help them.
How much do we reveal about ourselves by simply going online? Keep reading to learn the surprising amount of data leaked by software programs and mobile phone apps — and how easy it is for someone else, from the government to cybercriminals, to get access to this information.
Do you think your home wireless network is secure? That’s what Barb Angelova thought, until she got the scare of her life. What happened to Barb isn’t unusual. What’s more, it should be a wakeup call for anyone who uses home WiFi.
Have you ever thought about how many times you’ve given out your Social Security number without thinking about the consequences? Or why so many organizations say they need it? If you haven’t, you’re not alone. Social Security numbers are the most important piece of information a cybercriminal needs to commit identity theft. Yet many consumers don’t worry about handing over their most valuable identity asset until it’s too late.
AT&T has warned customers of a security breach in which three contracted workers accessed personally identifiable information like customer names and Social Security numbers.
While law enforcement believes they were able to hunt down and destroy all instances of both GameOver Zeus and Cryptolocker — two of the most notorious web viruses operating today — there is no way to know for sure. Even if they did destroy all copies of both viruses, there will certainly be more of this kind of malware released by other hackers in the future. Keep reading to learn things you can do to protect yourself from botnets and ransomware.
Fifteen years ago, Mark Goldstein and his family were victims of medical identity theft. It was 1999 and not much was known about the repercussions of such fraud and the rise of cybercrime. As Goldstein describes it, the landscape for criminals was evolving.