Source: Online Identity Theft Protection for Dummies by Dovell Bonnett Physical identity theft occurs when thieves come in close contact with their victims or the information they’re stealing. For example, thieves may engage in dumpster diving where they look...
Lucian Constantin’s recent article “Expect more cyber-espionage, sophisticated malware in ’12, experts say” states that cyber-attacks in 2012 will increase with more sophisticated malware. Certainly companies like MicroTrend, Symantec and others have their work...
Well the Christmas season is upon us and we’re all out there shopping for presents for our loved ones. Just recently I was shopping at Best Buy to purchase some computer components, but when I got home I found that one items was broken. So of course the next...
SplashData published their annual list of the 25 Worst Passwords on the Internet. Here is the list that all IT directors should block as acceptable logon password to websites, networks, computers, etc. Not taking precautions could result in another sort of list such...
UCLA recently agreed to pay a penalty of $865,000 for a series of HIPPA violations and now they are forced to reveal that the theft of an external hard drive from a former employee’s home has created the fears of yet another security breach. Plus, UCLA is...
I have been following a very disturbing trend for a couple of months now, and it is that of Medical Identity Theft. When we think of identity theft, we typically worry about credit cards or store credit being taken out in our name. Somebody attempting to purchase a...