iOS app Android app

Identity Protection

4 Back-to-School Identity Theft Tips to Keep Kids Safe | Posted 08.28.2015 | Parents

Summer is drawing to a close, which means children across the country will be lacing up new sneakers and sitting down in new desks for the start of another school year. Parents have enough to worry about when sending their young ones out into the world without them, but how much does the average parent know about protecting their child's identity?

4 Tips to Protect Seniors Against Fraud and Identity Theft | Posted 07.22.2015 | Fifty

Although most anyone can be a target of fraud and identity theft, senior identity theft is on the rise and those ages 50+ are often in the cross-hairs of scammers. The U.S. government is taking steps to help circumvent the high level of fraud aimed at seniors, but it can only do so much -- and progress in this area has been fairly slow.

Shame on Facebook: How Zuckerberg's Confusing "Real Names" Policy Hurts More Than It Helps

Lil Miss Hot Mess | Posted 02.02.2016 | Queer Voices
Lil Miss Hot Mess

Facebook's policy disproportionately affects certain categories of users, and whether intentional or not, that's discriminatory as well as dangerous for many. So, Zuck, let's cut through the confusion and make things perfectly clear: it's time for Facebook to be accountable to its community and delete this policy once and for all.

5 Ways to Protect Your Personal Identity

Chris Mettler | Posted 07.14.2015 | Money
Chris Mettler

It's always a possibility that your identity theft protection measures could fail. Therefore, everyone should have a response plan in place so that you can react quickly and help minimize the damage should an incident occur.

How a New Illinois Law Could Protect 12 Million From Identity Theft

GOBankingRates | Posted 05.25.2015 | Chicago

It's no surprise that Illinois consumers expressed identity theft as their No. 2 complaint, right behind debt, according to the state attorney general's office.

How the Internet of Things Can Go Very Wrong

Robert Siciliano | Posted 01.25.2015 | Technology
Robert Siciliano

The Internet--one of history's greatest inventions--is also one of history's greatest platforms for crime. Here are ways things can go very wrong with the Internet of Things.

How Your Webcam May Be Spying on You

Robert Siciliano | Posted 01.12.2015 | Technology
Robert Siciliano

Remember that song from 1984, "Somebody's watching me?" It was a great foreshadowing of things to come: These days, people really CAN watch you while you go about your business at home...through your computer.

Keanu Reeves two Intruders in two Days

Robert Siciliano | Posted 12.30.2014 | Crime
Robert Siciliano

Keanu Reeves recently had a home intruder: a woman. It was 4:00 am when she got into his home and plopped in a chair. The 40-something nut-job told the movie star she was there to meet with him. He nonchalantly called 911. Police took the woman into custody.

Why Even Smart People Keep Falling For Scams

Nancy LeaMond | Posted 12.17.2014 | Fifty
Nancy LeaMond

n the past year, Americans have lost over $18 billion to fraud, identity theft and various scams. But how? We all know when something seems too good to be true, it probably is. So, why do people continue to fall for scams or fail to protect their personal data?

USB Drives Have Serious Security Flaws

Robert Siciliano | Posted 11.30.2014 | Technology
Robert Siciliano

That little thing that you stick in your computer to store or transfer data can also mean very bad news.

How to Secure Your iCloud

Robert Siciliano | Posted 11.08.2014 | Technology
Robert Siciliano

By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app.

Botnets Here, Botnets There, Botnets EVERYWHERE

Robert Siciliano | Posted 11.08.2014 | Huffpost Code
Robert Siciliano

What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybercrime ring.

Researchers say your Mobile Carrier's Network isn't all that Secure

Robert Siciliano | Posted 11.08.2014 | Technology
Robert Siciliano

Gee, even the tools that update your smartphone's operating system over the air have holes that hackers can slip into.

4 Identity Protection Habits Every College Student Should Have

Robert Siciliano | Posted 11.08.2014 | Money
Robert Siciliano

It's pretty easy to believe that because you are young and not in the "real world" yet that you are immune to identity theft or credit card fraud. But crime isn't so choosy about age.

Majority of Executives Believe Attackers Will Overcome Corporate Defenses

Robert Siciliano | Posted 10.30.2014 | Business
Robert Siciliano

Many technology executives don't have a favorable outlook on their ability to sideswipe cybercriminals, according to research conducted by McKinsey and World Economic Forum.

Family Identity Theft Is Ugly

Robert Siciliano | Posted 10.29.2014 | Technology
Robert Siciliano

It's easy, for instance, for a parent to access their child's name and Social Security number, then open up a phony account--even if the victim is literally a child. Most companies don't check the ages, so that's why this crime can go undetected for years.

Best Way to Destroy a Computer Virus

Robert Siciliano | Posted 10.28.2014 | Technology
Robert Siciliano

You can outwit cybercriminals. You just have to be a little smarter than they are and never think, "It can't happen to MY computer." There's nothing special about your computer that makes it intrinsically immune to cyber threats.

Cybersecurity Insurance Still Requires Cybersecurity

Robert Siciliano | Posted 10.24.2014 | Technology
Robert Siciliano

OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced.

Before Getting Rid of Your Old Printer, Say 'Goodbye' to Lingering Data

Robert Siciliano | Posted 10.21.2014 | Technology
Robert Siciliano

Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names, and credit card numbers. But there are other devices that hold sensitive data that we don't really talk about. For example, printers.

Beware of the Lottery Scam

Robert Siciliano | Posted 10.19.2014 | Crime
Robert Siciliano

There's one born every minute. Many scammers use the names of valid lottery organizations, but this doesn't mean the legit entities are involved. The latest con is to tell someone they won a Powerball jackpot while planning on stealing their identity.

Healthcare Providers Gaining Trust by Marketing Security

Robert Siciliano | Posted 10.12.2014 | Business
Robert Siciliano

You’ve surely heard of “B2B” or business-to-business marketing. The new game plan is “B2C” – business to consumer ...

8 Ways to Bullet Proof Your Social Accounts

Robert Siciliano | Posted 10.12.2014 | Huffpost Code
Robert Siciliano

There are ways to keep the hackers at bay--for the most part, anyways, since no protection is 100 percent efficient.

Data Breaches May Result in Board Breakups

Robert Siciliano | Posted 10.07.2014 | Business
Robert Siciliano

The ripple effect continues to haunt Target: It's expected that seven of its board of directors members may be replaced because they failed to provide effective oversight into the corporation's data-protection risks. Boards simply need to be more proactive in safeguarding their companies against data breaches

Cyber Security Insurance Difficult for Business to Navigate

Robert Siciliano | Posted 10.03.2014 | Business
Robert Siciliano

Cyber insurance is now booming, with about 50 carriers in the industry. An increasing number of companies have cyber insurance to protect against cyber crime. However, businesses claim it's not easy to get adequate coverage.

Business Identity Theft; Big Brands, Big Problems

Robert Siciliano | Posted 10.04.2014 | Business
Robert Siciliano

Cyber criminals go after brand names like vultures, infiltrating company websites, hijacking mobile applications and tainting online ads, among other tricks.