Get in Touch
Just when you thought it was impossible to use a connected device without getting hacked, 2018 arrives with the discovery of an entirely new class of network vulnerability built...
In this episode of “Stupid Things Organizations Do with Connected Devices,” we take a look at the U.S. Defense Department, which gave 2,500 Fitbit...
The data breach archive site HaveIBeenPwned.com just added records from 2,844 data breaches, providing users with one of the most up-to-date resources to check...
Scenarios about the strategic importance of knocking out a rival nation's critical infrastructure in the early phases of any all-out cyber war have been widely discussed.
Now comes a report from...
Unless you live in a pineapple under the sea with a talking sponge, you’re probably familiar with the never-ending parade of cute animal pictures...
Researchers at Ben-Gurion University of the Negev made a startling discovery that may change the way cybersecurity is handled in the future. One standard...
The U.S. Securities and Exchange Commission recently toughened cybersecurity reporting guidelines for public companies, and days later Yahoo agreed to pay $80 million to settle a milestone class-action lawsuit brought by investors...
Net Neutrality is dead and the Internet is increasingly a playground for data mining schemes, social networks, and identity thieves. The possibility of true...
Customers of Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor can take some steps to preserve and secure their personal information after...
Does Anyone REALLY Know the Difference Between a Data Breach, Compromise, Leak or a Breach of Trust?
By Eva Velasquez, Identity Theft Resource Center CEO and President
Do you? Currently and depending on who is speaking, there are varying and frequently opposing...