Whether you plan to travel now or in a year, you should take steps to protect yourself from identity theft and credit card fraud while you’re on vacation. Tourists are often victims of theft, including passport and credit card theft—both of which can compromise personal information. Thieves can gain data by physically taking belongings the old-fashioned way or by...Read More
The 2017 filing season could be the worst yet for tax-related crime. With widespread confusion about the new tax law, IRS budget cuts, and a record-breaking year for data compromises, there’s an opening for fraud that should be serious cause for alarm, but doesn’t seem to be.
The bottom line: You should be concerned.
Last tax year, ...Read More
If you think 2017 was bad, hold on for dear life because 2018 is going to be the worst yet when it comes to cyberattacks. The astounding amount of personal information "out there" coupled with criminal innovation will allow cyber incursions of unprecedented scale and sophistication.
There is a confluence of intractable forces informing this prediction.
First, the headline-grabbing data...Read More
While there are a thousand resolution-worthy action items out there, the time is always now for the things that need to change in our lives. Never were truer words spoken when it comes to our potential vulnerability to hackers.
The number of breaches and the granular nature of the data exposed in those attacks over the past year are both unprecedented. ...Read More
Scammers make a killing during the holiday season. While you spend your time thinking of ways to bring holiday joy to others, they spend their time thinking up ways to steal from you. The saddest part about this is that the ghosts of Christmases past keep visiting Christmas present.
With that, I give you this year’s 12 scams of Christmas.The Gift Card Scam
While definitely a ghost of...Read More
The Supreme Court is hearing a case this month, Carpenter v. the United States, that represents an opportunity for the country to move in the right direction on privacy. It’s only fitting that a conviction for a series of armed robberies involving the theft of smartphones may determine the way investigators and prosecutors can use cellphone data in the future.
Timothy Ivory Carpenter was convicted of planning, supplying guns...Read More
Keeping up with news alerts about cybersecurity flaws in consumer electronics is a lot like picking up spilled jelly beans one at a time with a plumber’s wrench. Even if you figure out how to do it and have endless patience, a few will skitter out of sight.
Assume for the moment that, unlike most people, you think a lot about cybersecurity and you do your homework before buying a connected device. (I know. This is a truly...Read More
How would you feel if the digital “you” were deleted? The common wisdom in cybersecurity circles is that if you think it can’t happen to you, it probably will. Consider Mat Honan’s story.
“First my Google account was taken over, then deleted,” Honan wrote. “Next my Twitter account was compromised, and used as a platform to...Read More