Category Archives: Identity Theft

What is Encryption?

      No Comments on What is Encryption?

Encryption is the science of encoding and decoding secret messages.  It began as cryptography—the ancient Greeks used it to protect sensitive information that might fall into the hands of their enemies. More recently, governments have used encryption for military purposes, but these days the term if often used in reference to online security. Encryption is Read more…

What is Encryption?

      No Comments on What is Encryption?

Encryption is the science of encoding and decoding secret messages.  It began as cryptography—the ancient Greeks used it to protect sensitive information that might fall into the hands of their enemies. More recently, governments have used encryption for military purposes, but these days the term if often used in reference to online security. Encryption is Read more…

Why Child Identity Theft is Dangerous

      No Comments on Why Child Identity Theft is Dangerous

Identity theft in the form of new account fraud can happen to anyone with a Social Security number, which includes virtually any American with a pulse…as well as some who no longer do. Identity theft can even happen to your newborn baby shortly after a Social Security number has been issued to him or her Read more…

4 Tactics Cybercriminals Are Using to Steal From Us

Today McAfee Labs™ released the McAfee Threats Report: Second Quarter 2013, which reported that the cybercriminal community is using four main tactics to steal our identities, and our money. As consumers, it’s critical that we are aware of the ways the hackers are trying to attack us and here’s the four main ways: 1. Malicious Read more…

What is a Zero-Day Threat?

      No Comments on What is a Zero-Day Threat?

The term “zero-day threat” may sound like the title of a hit film, but it’s definitely not that kind of thriller. A zero-day threat or attack is an unknown vulnerability in your computer or mobile device’s software or hardware. The term is derived from the age of the exploit, which takes place before or on Read more…

What is a Keylogger?

      No Comments on What is a Keylogger?

Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every click and touch, every download and conversation. A keylogger (short for keystroke logger) is software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don’t know Read more…

Before You Share, Ask Yourself “Is This TMI?”

Social networks and new online services make it easy to share the details of our lives, perhaps too easily. With just a few clicks, posts and messages, you can give away enough personal information to compromise your privacy and even open yourself up to identity theft. Hackers use information you post online to try and Read more…

What is Typosquatting?

      No Comments on What is Typosquatting?

Typosquatting, also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser (e.g., “Gooogle.com” instead of “Google.com”). When users make such a typographical error, they may be led to an alternative website owned Read more…

Connecting the Dots–How Your Digital Life Affects Identity Theft and Financial Loss

You’re on Facebook, LinkedIn and Twitter. You use Gmail, Yahoo! and bank online. You might buy stuff on sites like Amazon and occasionally make purchases from eBay. Sometimes you apply for a loan online and maybe open up a credit card account too. This is all commonplace in today’s digital world. So how does all Read more…