PRIVATE WiFi and the Identity Theft Resource Center will be hosting a Twitter chat on Thursday, September 4, at 2pm ET, to discuss the hidden dangers and the ways to prevent a personal data breach of your kids’ information. Keep reading to learn some of the most commonly asked questions about children’s identity security, and of course, please join us Thursday to answer any questions you may have.
Tagged: identity theft
Last week brought us the story of a Russian cybergang that hacked into the ownership of 1.2 billion usernames and passwords. Last week also presented me with the most obvious demonstration of aloofness to how people view their personal information.
So just how technologically savvy do you need to be to take one of the strongest measures available to protect your personal information? Well, let’s just say I would bet money that you can do it.
It’s believed that Goodwill stores in as many as 21 states may have been hacked for the credit card data of consumers who’ve shopped at the thrift stores. Some signs have led investigators to believe these cybercrimes may have begun as early as May of 2012. But what would make someone stoop so low as to attack a charity whose purpose is to restore a sense of pride in people who are in need, mostly by providing them with training and skills to find better jobs?
While the Internet initially provided a platform for the powerless, governments and big business are now using the power of the Internet to collect unprecedented amounts of data about us. How has this happened?
It might be hard to envision life before the convenience of portable devices emerged on the market. Providing everything from instant connectivity and access to information, tablets and smartphones can feel like we’re carrying a portable personal assistant everywhere we go.
But one trend emerging in the mobile device market does have its critics raising the alarm for personal security, and that’s the high numbers of consumers who use health and fitness apps. These apps, which track our healthy habits and exercise information, seem like a great way to foster a healthy lifestyle, but the reality has industry experts a little concerned.
No one doubts that biometric identification is a powerful tool with many possible applications. But there’s a downside to this technology: in essence, our faces can now be used for government tracking and surveillance that was not possible until now. And there are few safeguards currently in place to curb excessive use of this tool.
We are always excited to read new reports on issues relating to identity theft, but the 2014 Trustwave Global Security Report is of special interest to us here at the ITRC. These reports help us to understand what the people who call our victim assistance center may be experiencing and improve our ability to help them.
Have you ever thought about how many times you’ve given out your Social Security number without thinking about the consequences? Or why so many organizations say they need it? If you haven’t, you’re not alone. Social Security numbers are the most important piece of information a cybercriminal needs to commit identity theft. Yet many consumers don’t worry about handing over their most valuable identity asset until it’s too late.
AT&T has warned customers of a security breach in which three contracted workers accessed personally identifiable information like customer names and Social Security numbers.
Fifteen years ago, Mark Goldstein and his family were victims of medical identity theft. It was 1999 and not much was known about the repercussions of such fraud and the rise of cybercrime. As Goldstein describes it, the landscape for criminals was evolving.
When most people think of identity theft, they probably think of having their credit card information stolen or an account opened in their names.
In reality, there are many types of identity theft as a result of a stolen Social Security number or someone fraudulently filing for your government disability, your health insurance benefits, and even your tax return.
The United States has successfully resisted chip and pin technology for nearly a decade, and we’ve got the data breaches to prove it. Find out why transitioning away from cards with magnetic strips could be a lengthy process, even though better credit card security is long overdue.