Most of us have become accustomed to giving out the last four digits of our Social Security numbers. But this customary request is becoming increasingly problematic, and two Rhode Island lawmakers are responding by pushing legislation to stop businesses from asking for the last four digits of customers' Social Security numbers. Researchers at Carnegie Mellon ...
Read Blog
Spyware is sold legally in the United States. This software records chats, emails, browsing history, usernames, passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file, which can then be accessed remotely. This is all perfectly legal as long as the PC’s owner installs the ...
Read Blog
There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of ...
Read Blog
It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, using information from social networking sites, data brokers, voter registration lists, online white pages, and ...
Read Blog
We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out of our pockets and bags all the time. I’m one of those people that’s so smart, I’m stupid and absent minded when it comes to my stuff. Where’s my wallet, where are my keys, where’s ...
Read Blog
#1 New Account Fraud Using another's personal identifying information to obtain products and services using that person’s good credit standing.  This fraud often requires use of the victim's Social Security number. Opening new utility, cell phone and/or credit card accounts are the most prevalent forms of new account fraud. #2 Account Takeover Fraud Using another ...
Read Blog

Data Privacy Day

By on
This is a critical time for our personal security as it relates to privacy and personal information. A battle is being waged over our data, and there are several parties involved in this fight. My concern is securing the personal details that you would prefer to keep private. Criminal hackers and identity thieves want to ...
Read Blog
The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-time ...
Read Blog
On the Policy, Practice & Procedures page of their website, the IRS addresses the public’s concern regarding Social Security numbers on checks: “Complete Social Security Numbers (SSN) on Checks or Money Orders Remitted to IRS Issue: Tax Professionals and clients have concerns about taxpayers putting their full SSN on checks remitted to IRS in payment ...
Read Blog
Today we announced our McAfee® Family Protection iPhone®, iPod touch® and iPad™ Edition. McAfee now provides strong parental controls to keep young people safe when they are browsing the Internet on an Apple mobile device. McAfee released McAfee Family Protection for the PC in June 2009. According to data released by Admob in 2010, 65 ...
Read Blog