Twice a month MotherG teams up with Jim Kendall, business columnist for the Daily Herald and host of our podcast. On this episode, Undo Identity Theft Expert George Vroustouris, an Identity Protection Advisor…joins the conversation.
Child Identity Theft can begin shortly after birth and continue well into their teenage years.
Social engineering became the No. 1 attack technique as attackers shifted away from automated exploits and instead engaged people to do the dirty work—infecting systems, stealing credentials, and transferring funds.
In a recent public service announcement, the Federal Bureau of Investigation (FBI) warned that “weak security capabilities” and “lack of consumer security awareness” can provide criminals with opportunities to exploit these devices.
The 2016 Identity Fraud Study by Javelin Strategy & Research, revealed that 13.1 million consumers were victims of identity fraud in the U.S. last year. The study also found that Chip Pin credit cards (EMV) have already had a significant impact on fraudsters’ behavior, which drove a 113 percent increase in incidence of new account fraud.
If you use a free online service, such as an email account or social network, then you have virtual assets that are stored online. But do you know what will happen to that data in the future—even if you no longer use the site?
The Federal Trade Commission (FTC) initiated a contempt proceeding against LifeLock following an extensive investigation.
Most identity fraud originates from a sensitive, personal information breach in the workplace.
60% of small businesses that have a data breach . . . go out of business after six months.
Wi-Fi has changed the way we communicate, connecting us with the digital world from anywhere. However, the convenience of free Wi-Fi comes with some serious risk, from computer viruses to identity theft.
Search engines like Google and Yahoo only access 4% of the entire Internet. The other 96% is made up of the “dark web,” or “deep web,” a vast online space commonly favored by mass hackers and smugglers. So how exactly does the dark web work? And why is Facebook currently tapping into it?