I finally got one of those “I’m stuck in London” emails. My friend Kate’s Gmail account was hacked, and everyone on her contact list received an email from a hacker posing as Kate: “Hi, Apologies, but I made a quick trip, to London,United Kingdom and got mugged, my bag, stolen from me with my passport ...
Read Blog
Today, there are over 2.2 million ATMs worldwide, and by 2015 there will be around 3 million. ATM skimming accounts for as much as 30% of all data theft. That’s about $350,000 in fraud every day in the United States alone, or more than a billion dollars a year. The ATM Industry Association is now ...
Read Blog
I often hear Mac users say “Oh, I don’t have to worry about viruses. I have a Mac!” Well, unfortunately, those days have come to an end. The market share of Apple owners has tipped enough that criminal hackers are taking notice and creating malware targeting Mac users. McAfee explains that there have been Fake ...
Read Blog
McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. Identity theft can happen online or on the ground to anyone with a pulse, and even to the deceased. The key is awareness, vigilance, and investing in products and services ...
Read Blog
Most of us have become accustomed to giving out the last four digits of our Social Security numbers. But this customary request is becoming increasingly problematic, and two Rhode Island lawmakers are responding by pushing legislation to stop businesses from asking for the last four digits of customers' Social Security numbers. Researchers at Carnegie Mellon ...
Read Blog
Spyware is sold legally in the United States. This software records chats, emails, browsing history, usernames, passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file, which can then be accessed remotely. This is all perfectly legal as long as the PC’s owner installs the ...
Read Blog
There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of ...
Read Blog
It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, using information from social networking sites, data brokers, voter registration lists, online white pages, and ...
Read Blog
We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out of our pockets and bags all the time. I’m one of those people that’s so smart, I’m stupid and absent minded when it comes to my stuff. Where’s my wallet, where are my keys, where’s ...
Read Blog
#1 New Account Fraud Using another's personal identifying information to obtain products and services using that person’s good credit standing.  This fraud often requires use of the victim's Social Security number. Opening new utility, cell phone and/or credit card accounts are the most prevalent forms of new account fraud. #2 Account Takeover Fraud Using another ...
Read Blog