Americans were taken aback recently when it was announced that the National Security Agency had obtained years of electronic data from calls made by cell phone customers. The person allegedly behind the leak has been identified as 29-...Read More
Zendesk, a company that offers online tech support to more than 25,000 clients, announced a security breach on Feb. 21. Hackers accessed support records for three of its customers: Twitter, Pinterest and Tumblr, according to...Read More
Losing some excess flab should be at the top of the list of New Year’s resolutions for your small to medium-sized business.
Not you, owner and proprietor. You look great. I's the reams of data...Read More
Data breaches happen with startling regularity, but they rarely occur on the scale of the 2011 Sony PlayStation breach. When hackers cracked open the PlayStation Network, 77 million users were affected-their passwords, credit card information, security answers, physical addresses and more were all in the hands of thieves. It was a nightmarish scenario for those users and for Sony, but it...Read More
Because most people now spend an enormous amount of time online, businesses and organizations are eager to find ways to use that activity to their advantage. In many cases, that means tracking user habits, which they use to tailor and target advertisements. On social media sites and even some retail sites, user information is logged and tracked, which has led to increased concern about...Read More
Brides and grooms are busy people in the months leading up (and even following) their weddings. There are flowers to be arranged, photographers and caterers to be hired, dresses to be purchased and honeymoons to be booked. But with all of that activity comes the risk of identity theft, which can put the brakes on marital bliss in a hurry.
Both before and after the wedding...Read More
Getting a basketful of chocolate eggs is an Easter treat that anyone would love. But having a basketful of passwords stolen is a nightmare that no one wants to deal with. Protecting yourself from identity theft involves a number of steps, and being smart...Read More
Unfortunately, it isn't very hard for a person with bad intentions to gather bits of personal identifying information and create fake accounts in a victim's name. And often, the victim's behaviors could lead to the identity theft in the first place.
Pay attention to how you're handling your personal identification numbers. If you have any of the following five bad habits,...Read More
In the latest celebrity hacking scandal, the personal data and financial details of several public figures including Jay-Z, Beyoncé, Michelle Obama, and Hillary Clinton was illegally posted to a Russian website.
The FBI and Los Angeles Police Department are investigating several cases of doxxing, a new cybercrime in which information about a person is obtained or discovered...Read More