Get in Touch
Privileged Access Could Be a Company Killer
It doesn’t matter how many times you tell employees not to share passwords. A new study suggests many people are still going to do...
The Russians May Already Be in Your Home (Router)
With all of the headlines about potential vulnerabilities and hacks through IoT-enabled devices, there’s a much more prevalent way to get got.
The inherent...
The Grandparents Scam: How it Works
A few months ago, a relative of mine in Sacramento received a call from his granddaughter. She was calling from a jail in Florida...
Gmail’s Dots Are a Bug, Not a Feature
Google’s email platform has more than a billion active monthly users as of the last count in February 2016, which is why the recent...
Why Google’s ‘Distrust’ Campaign Could Lead to Much Safer Web Commerce
By and large, HTTPS—the encrypted form of delivering websites – has proven to be a very effective mechanism for assuring the legitimacy of websites,...
Is Your Company Mining Cryptocurrency for Hackers?
A new cyberthreat is disrupting business networks, and it's tricky enough that you may not know it's happening. Crypto-mining malware is used to harvest the computing power necessary to...
Does Anyone REALLY Know the Difference Between a Data Breach, Compromise,...
By Eva Velasquez, Identity Theft Resource Center CEO and President
Do you? Currently and depending on who is speaking, there are varying and frequently opposing...
Are You Helping an ID Thief Get a Credit Card?
You can spot a Nigerian email scam without opening it. You know what you’re doing when it comes to keeping ID thieves from conning...
Adam Levin Speaks with ABC News About Saks, Lord & Taylor...
Customers of Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor can take some steps to preserve and secure their personal information after...
Is Your VPN Leaking Your Info?
Net Neutrality is dead and the Internet is increasingly a playground for data mining schemes, social networks, and identity thieves. The possibility of true...