identity theft

  • The next revolution will be reclaiming your digital identity Crunch Network

    The next revolution will be reclaiming your digital identity

    An identity is a difficult thing to lose. I found this out the hard way when my passport was stolen while backpacking through Asia and Africa earlier this year. The bureaucratic process to get a new passport gave me a glimpse at how broken our system of identity management is today. Fortunately, technology is on the cusp of a major paradigm shift in the field of identity. Read More

  • N.Y. regulators issued Equifax with a subpoena, per report

    N.Y. regulators issued Equifax with a subpoena, per report

    Equifax was issued a subpoena from New York state’s financial service regulators in regards to the massive data breach the company announced last month, Reuters reported today. The regulators want Equifax to provide more information, which is about right since it seems like Equifax has changed the story several times since the first announcement. Specifically, Reuters states the subpoena… Read More

  • Equifax data breach help site leaves consumers with more questions than answers

    Equifax data breach help site leaves consumers with more questions than answers

    Equifax just announced a massive data breach that could affect 143 million consumers. It’s shaping up to be one of the largest hacks of all time. The information came mostly from U.S. residents, but a percentage also involved U.K. and Canadian citizens and the company is working with authorities from these countries. Read More

  • Ransomware completely shuts down Ohio town government

    Ransomware completely shuts down Ohio town government

    In another interesting example of what happens when you don’t manage your backups correctly, the Licking County government offices, including the police force, have been shut down by ransomware. Although details are sparse, it’s clear that someone in the office caught a bug in a phishing scam or by downloading it and now their servers are locked up. Wrote Kent Mallett of the… Read More

  • Researchers sabotage 3D printer files to destroy a drone

    Researchers sabotage 3D printer files to destroy a drone

    Researchers at Ben-Gurion University of the Negev (BGU), the University of South Alabama, and Singapore University of Technology and Design have successfully injected malicious code into a computer which, in turn, added invisible commands to a file containing a 3D model of a drone propeller. When they printed the model and attached it to the drone, the propeller broke upon take-off. This… Read More

  • How Frank Abagnale thinks like a con artist to improve security

    How Frank Abagnale thinks like a con artist to improve security

    Frank Abagnale, Jr’s ignominious youth as a clever con artist was made famous in the 2002 movie, Catch Me If You Can, starring Leonardo DeCaprio as a young Frank, but Abagnale, as you might imagine, would rather talk about the life he led after he got caught, went to jail and paid his debt to society. It was then that he turned his conning skill to good and began a 40-year career as… Read More

  • Civic launches a free service that aims to stop identity theft before it happens

    Civic launches a free service that aims to stop identity theft before it happens

    A new startup called Civic, launching today, wants to help Americans stop becoming victims of identity theft. The company is aiming to topple similar identity protection services like LifeLock by focusing on a broader market than just credit monitoring, while also allowing people to respond to fraud alerts in real-time in order to prevent the fraud from actually taking place. Today… Read More

  • Guccifer pleads guilty to hacking of American political figures

    Guccifer pleads guilty to hacking of American political figures

    A hacker who first exposed the existence of Hillary Clinton’s private email server and who found his way into accounts of several American political figures pleaded guilty to identity theft and hacking charges today. Read More

  • Six Lessons From Cybersecurity Superhero Training Crunch Network

    Six Lessons From Cybersecurity Superhero Training

    One of my distinct grade-school memories is filing out of fourth grade class, nervous, but excited to miss a portion of math class. We were having our quarterly disaster-survival drill; instructing students on what to do in case disaster strikes. While working through yet another attempted malicious cybersecurity attack it dawned on me, why can’t we apply this diligence and training… Read More

  • Why Apple Pay Is Our Best Hope To Stop Online Fraud Crunch Network

    Why Apple Pay Is Our Best Hope To Stop Online Fraud

    Heists used to be so much effort — you’d need a gang, machine guns, a getaway car and long, meticulous planning. Nowadays, all you need is a couch, a laptop and some stolen data. When the barrier to entry is so low, it’s no surprise that online fraud is a huge problem. In fact, according to the authoritative annual True Cost of Fraud report from LexisNexis/Javelin Group… Read More

  • Valuing A Data Breach Victim Crunch Network

    Valuing A Data Breach Victim

    In the relentless world of public breach reporting, there’s a fixation on the number of accounts affected; the higher the number, the larger the impact. But from a victim’s perspective, does it make a difference if your information was included in a breach alongside 10,000 or 50,000,000 others? From a criminal ecosystem perspective, the number of victims per successful breach… Read More

  • Records Of 15 Million T-Mobile Customers Swept Up In Experian Hack

    Records Of 15 Million T-Mobile Customers Swept Up In Experian Hack

    T-Mobile announced on Thursday the personal information of about 15 million customers was swept up in a hack on Experian, a vendor that processes the phone company’s credit applications. The breach affects new applicants who required a credit check for service or a new device between September 1 and September 15. Experian said the hack did not affect its consumer credit database. Read More

  • Wearables: A Pandora’s Box For Security? Crunch Network

    Wearables: A Pandora’s Box For Security?

    As many have noted, we’re entering a new era where wearable gadgets — from watches and fitness bands to glasses and health aids — are at the forefront of the new technological revolution. A PricewaterhouseCooper’s report found that more than 20 percent of U.S. adults already own at least one wearable, and estimates that soon we’ll be using them at home and work… Read More

  • Revel Adds Photo-Based Identity Theft Prevention To Its iPad Point-Of-Sales System

    Revel Adds Photo-Based Identity Theft Prevention To Its iPad Point-Of-Sales System

    San Francisco-based Revel Systems is essentially the industry leader when it comes to iPad-based point-of-sale (POS) for restaurants, grocery and now retail, and today it’s adding additional security features that provide an added level of comfort for users and merchants. Revel 2.0 brings a new identity theft protection system to the POS, which shows an image of the credit card holder on… Read More

  • Identity theft costs rise overall, while costs per victim decline

    According to an article at Forbes, identity theft and related fraud were up considerably in 2009 with 11.2 million victims for an estimated cost of $54 billion U.S. dollars. In 2008, just under 10 million people were ripped off as a result of identify theft, for an estimated cost of $48 billion. Interestingly, the cost to individuals as a result of data breaches has declined from $498 in 2008… Read More

  • Selling your old iPhone could put you at risk for identity theft

    If you plan on tossing your old iPhone for the new 3G version next month, you may want to think twice before you do. Just like any other computer platform, you can pull data out of the memory using tools that are readily available. To most people this isn’t a big deal, but to the paranoid this is life or death. Since people use their iPhone for all kinds of computing, the information… Read More