Identity Theft Prevention

Identity Theft Prevention news, information, and how-to advice

Cost of healthcare    167248933

Businesses face rising political pressure from data breaches

FTC encourages Congress to pass national breach notification legislation, among other efforts.

The paranoid's survival guide, part 1: How to protect your personal data

Who says privacy is dead? While it's true that marketers, the government, data aggregators and others are gathering and analyzing more data than ever about every individual, you can still exert some control over what's out there,...

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

US attorney general calls for data-breach notification law

A new law would allow the DOJ to better combat cybercrime, Holder says

Source code for Android iBanking bot surfaces on underground forum

The leaked source code could lead to a larger number of attacks using the mobile malware, security researchers from RSA said

New identity fraud victim every two seconds thanks to massive data breaches

There have been a number of high-profile data breaches lately—and a whole bunch of smaller data breaches that didn’t make national headlines. The data breach itself, however, is just the beginning. What matters most is what happens...

Yahoo attack places spotlight on identity management

Theft of credentials highlights risk of using the same usernames and passwords across multiple accounts

Redefining Endpoint Security With Isolation Technology: An innovative, new security architecture

Find out how to secure your enterprise and empower your users to click on anything, anywhere without the fear of being compromised.

GoDaddy owns up to role in Twitter account hijacking incident

PayPal dismissed claims that its customers representatives were tricked into helping the attacker

Officials: Two people used fake credit cards that may be linked to Target data breach

Police didn't say if the pair were directly involved in the data breach or merely purchased stolen card information

5 Things you should do to protect yourself from Target data breach

Details of the actual hack are still sketchy, but so far it seems that if you shopped at an actual Target store between Black Friday and December 15 it’s a virtual certainty that your credit or debit card info is among the compromised

Attention Target shoppers: What you need to know about the credit data breach

Target issued a statement this morning confirming reports by security journalist Brian Krebs that it was the victim of a massive security breach.

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

Download this complimentary report, featuring the Gartner Research "Designing an Adaptive Security Architecture for Protection From Advanced Attacks", and learn why organizations can't rely solely on traditional blocking

CSO's guide to the Target data breach *Updated 12/23*

Updated news, analysis and everything else you need to know about the Target data breach *New articles added 12/23*

Hackers meet professor's challenge to pen test his online world

An NYU professor challenged a team of hackers to break into his online world. They did, but it wasnt easy or cheap.

Does Black Friday and Cyber Monday extend to the black market? According to new research, it does... with your identity and more

Research about the underground provides evidence and the specifics necessary for credible stories. It's an opportunity to discuss the friction of the attacks -- and how lower friction for attackers leads to more breaches, more...

How security is using IAM to manage BYOD

Faced with the undeniable arrival of BYOD, many security leaders are now turning to IAM technologies to ensure smartphones and tablets are not lost, stolen or misused.How can you make it work in your organization?

Healthcare Information Management: A New Urgency

With the challenges of an evolving regulatory environment and the information overload problem with management practices, many organizations have now reached an inflection point.

Automated hacking tools swarm Web site login pages

Recent study finds that 94 percent of login attempts made by malicious automated tools

How secure is encrypted credit card data, really?

Adobe revealed last week that it was the victim of a sophisticated hack that exposed product source code, and sensitive data on about three million customers to attackers.

How to take advantage of the Adobe breach to advance the conversation about security in your organization

Breaches aren't new. Learning this week that Adobe experienced and disclosed a recent security breach isn't surprising. And if it's not surprising for us, then it barely registers with most people.

Adobe hacked—source code and customer accounts compromised

In case you missed it yesterday, Adobe has been hacked.

Load More