Identity Theft Prevention

Identity Theft Prevention news, information, and how-to advice

Businesses face rising political pressure from data breaches

FTC encourages Congress to pass national breach notification legislation, among other efforts.

The paranoid's survival guide, part 1: How to protect your personal data

Who says privacy is dead? While it's true that marketers, the government, data aggregators and others are gathering and analyzing more data than ever about every individual, you can still exert some control over what's out there,...


US attorney general calls for data-breach notification law

A new law would allow the DOJ to better combat cybercrime, Holder says

Source code for Android iBanking bot surfaces on underground forum

The leaked source code could lead to a larger number of attacks using the mobile malware, security researchers from RSA said

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

New identity fraud victim every two seconds thanks to massive data breaches

There have been a number of high-profile data breaches lately—and a whole bunch of smaller data breaches that didn’t make national headlines. The data breach itself, however, is just the beginning. What matters most is what happens...

Yahoo attack places spotlight on identity management

Theft of credentials highlights risk of using the same usernames and passwords across multiple accounts

GoDaddy owns up to role in Twitter account hijacking incident

PayPal dismissed claims that its customers representatives were tricked into helping the attacker

Officials: Two people used fake credit cards that may be linked to Target data breach

Police didn't say if the pair were directly involved in the data breach or merely purchased stolen card information

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

5 Things you should do to protect yourself from Target data breach

Details of the actual hack are still sketchy, but so far it seems that if you shopped at an actual Target store between Black Friday and December 15 it’s a virtual certainty that your credit or debit card info is among the compromised

Attention Target shoppers: What you need to know about the credit data breach

Target issued a statement this morning confirming reports by security journalist Brian Krebs that it was the victim of a massive security breach.

CSO's guide to the Target data breach *Updated 12/23*

Updated news, analysis and everything else you need to know about the Target data breach *New articles added 12/23*

Hackers meet professor's challenge to pen test his online world

An NYU professor challenged a team of hackers to break into his online world. They did, but it wasnt easy or cheap.

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

Does Black Friday and Cyber Monday extend to the black market? According to new research, it does... with your identity and more

Research about the underground provides evidence and the specifics necessary for credible stories. It's an opportunity to discuss the friction of the attacks -- and how lower friction for attackers leads to more breaches, more...

How security is using IAM to manage BYOD

Faced with the undeniable arrival of BYOD, many security leaders are now turning to IAM technologies to ensure smartphones and tablets are not lost, stolen or misused.How can you make it work in your organization?

Automated hacking tools swarm Web site login pages

Recent study finds that 94 percent of login attempts made by malicious automated tools

How secure is encrypted credit card data, really?

Adobe revealed last week that it was the victim of a sophisticated hack that exposed product source code, and sensitive data on about three million customers to attackers.

Gartner Magic Quadrant for Client Management Tools

The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.

How to take advantage of the Adobe breach to advance the conversation about security in your organization

Breaches aren't new. Learning this week that Adobe experienced and disclosed a recent security breach isn't surprising. And if it's not surprising for us, then it barely registers with most people.

Adobe hacked—source code and customer accounts compromised

In case you missed it yesterday, Adobe has been hacked.

Hack of data brokers highlights weakness of knowledge-based authentication

Security blogger Brian Krebs broke a story this week about a cyber underground identity theft service in the business of selling Social Security numbers, birth records, credit and and background reports, and other pertinent, sensitive

Why Apple’s Touch ID fingerprint authentication is good for iPhone security

Apple made a big deal out of its new Touch ID fingerprint sensor in the iPhone 5s unveiling. Hackers with lots of time on their hands made an even bigger deal out of demonstrating that the fingerprint authentication could be tricked....

Load More