Recently, the police in Lincoln County, Maine were faced with a decision: Pay an unidentified hacker $300, or lose access to all of the files on their network, which included the types of sensitive information that you might imagine a police department network maintains.
The department did decide to pay up, and the FBI was able to track the money to a Swiss bank account, but they got no further….
Raytheon acquires majority stake in security provider Websense to boost Raytheon cyber security defense amidst copious information breaches….
Mortgage fraud resulting from identity theft is devastating. It begins when a crook uses your good name and the equity in your home to make a profit. All of this is done in the dark—behind your back and without your consent.
Thieves can even execute fraudulent deed transfers….
From vacation photos to wedding albums, interesting news articles to political discussions, Facebook is a wonderful tool we can use to share information and interact with friends, family, and acquaintances in one place.
With over 1.39 billion active monthly users worldwide, that’s a lot of information. How much is too much to share?
Even if you’ve carefully set your privacy settings, here are five things you might consider keeping offline….
We are almost at the end of tax season. Returns have been filed, refunds are rolling in and we can look forward to not doing this again until January.
Unfortunately for some people, the headache doesn’t end once the paperwork is sent off. Many receive letters indicating that their return has been ejected as a “duplicate” because the filer’s Social Security number had already been used to file a 2014 return, for which a refund was issued.
Tax fraud relating to identity theft is one of the many scams that the IRS is forced to battle each year. Thieves don’t get your exact tax refund. Instead, they create a return that generates a generous sum of cash….
The note that arrived in the mail, dated March 25 and addressed to my grade-school-age daughter, said what we had expected and feared: Like tens of millions of other Americans, including untold numbers of children, she may have fallen victim to thieves who gained access to Social Security numbers and other personal data from the health insurance giant Anthem….
Most people think of dusting and organizing as part of a deep clean, but decluttering digitally is just as—if not even more—important. Businesses collect and store valuable customer data, and managing and disposing of it securely and responsibly is key in building trust.
Here are some great free tools, guides and ….
The U.S. government is preparing to order the first round of sanctions against foreign entities or individuals involved in hacking, according to a senior Department of Justice official, in what will be the first test of the government’s newest tool in cyber deterrence.
The presidential authorization for cyber-specific….
We all have a favorite password. Maybe it’s based on your pet’s name, a birth date, your sports team, or your street number. However, according to the Wall Street Journal and a recent study, odds are you’ve used “123456” and “password”: the most common, and worst passwords of last year.
Research firm SplashData compiled the most popular passwords for the fifth year running, from around 3.3 million passwords posted publicly online by hackers. When you create a new password, don’t use one of these top 10 of 2014:
2. password ….