Get in Touch
By and large, HTTPS—the encrypted form of delivering websites – has proven to be a very effective mechanism for assuring the legitimacy of websites,...
Does Anyone REALLY Know the Difference Between a Data Breach, Compromise, Leak or a Breach of Trust?
By Eva Velasquez, Identity Theft Resource Center CEO and President
Do you? Currently and depending on who is speaking, there are varying and frequently opposing...
Customers of Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor can take some steps to preserve and secure their personal information after...
Net Neutrality is dead and the Internet is increasingly a playground for data mining schemes, social networks, and identity thieves. The possibility of true...
The U.S. Securities and Exchange Commission recently toughened cybersecurity reporting guidelines for public companies, and days later Yahoo agreed to pay $80 million to settle a milestone class-action lawsuit brought by investors...
Researchers at Ben-Gurion University of the Negev made a startling discovery that may change the way cybersecurity is handled in the future. One standard...
Unless you live in a pineapple under the sea with a talking sponge, you’re probably familiar with the never-ending parade of cute animal pictures...
Scenarios about the strategic importance of knocking out a rival nation's critical infrastructure in the early phases of any all-out cyber war have been widely discussed.
Now comes a report from...
The data breach archive site HaveIBeenPwned.com just added records from 2,844 data breaches, providing users with one of the most up-to-date resources to check...
In this episode of “Stupid Things Organizations Do with Connected Devices,” we take a look at the U.S. Defense Department, which gave 2,500 Fitbit...