insider threat

Privileged Access Could Be a Company Killer

It doesn’t matter how many times you tell employees not to share passwords. A new study suggests many people are still going to do...
Russian router hack

The Russians May Already Be in Your Home (Router)

With all of the headlines about potential vulnerabilities and hacks through IoT-enabled devices, there’s a much more prevalent way to get got. The inherent...
Grandparent Scam

The Grandparents Scam: How it Works

A few months ago, a relative of mine in Sacramento received a call from his granddaughter. She was calling from a jail in Florida...
Dots matter

Gmail’s Dots Are a Bug, Not a Feature

Google’s email platform has more than a billion active monthly users as of the last count in February 2016, which is why the recent...
https

Why Google’s ‘Distrust’ Campaign Could Lead to Much Safer Web Commerce

By and large, HTTPS—the encrypted form of delivering websites – has proven to be a very effective mechanism for assuring the legitimacy of websites,...
Crypto botnet

Is Your Company Mining Cryptocurrency for Hackers?

A new cyberthreat is disrupting business networks, and it's tricky enough that you may not know it's happening. Crypto-mining malware is used to harvest the computing power necessary to...
data breach

Does Anyone REALLY Know the Difference Between a Data Breach, Compromise,...

By Eva Velasquez, Identity Theft Resource Center CEO and President Do you?  Currently and depending on who is speaking, there are varying and frequently opposing...

Are You Helping an ID Thief Get a Credit Card?

You can spot a Nigerian email scam without opening it. You know what you’re doing when it comes to keeping ID thieves from conning...

Adam Levin Speaks with ABC News About Saks, Lord & Taylor...

Customers of Saks Fifth Avenue, Saks Off Fifth and Lord & Taylor can take some steps to preserve and secure their personal information after...
VPN

Is Your VPN Leaking Your Info?

Net Neutrality is dead and the Internet is increasingly a playground for data mining schemes, social networks, and identity thieves. The possibility of true...