Blog Posts Tagged with "Identity Theft"
July 08, 2012 Added by:Allan Pratt, MBA
It should come as no surprise that businesses are taking advantage of the public’s fascination of placing their day-to-day activities on social networking sites. This may seem inappropriate and offensive, and it might be – but for the moment, it’s not illegal. We have only ourselves to blame...
July 07, 2012 Added by:Robert Siciliano
“Dumps” are batches of stolen credit card numbers. This example of a criminal’s sales pitch for stolen dumps came to me through a comment on a blog post I wrote about credit card security. Go figure. If you scan the following message line by line, you’ll see there’s a great deal of thought put into the pitch...
June 06, 2012 Added by:Kelly Colgan
People who rely on LinkedIn for professional networking keep a wealth of information stored on their profile pages. With news of a possible data breach exposing 6.5 million user passwords, LinkedIn users need to take steps to protect their personal data. Here are five tips we recommend you follow...
June 04, 2012 Added by:Headlines
Michael Garcia was sentenced by U.S. District Judge Morrison C. England Jr. to 57 months in prison for fraud. Garcia accessed the computer servers of a law firm and an accountant firm without their knowledge or authorization and downloaded the personal information of more than 1,450 clients and employees...
May 30, 2012 Added by:Robert Siciliano
Victims of business identity theft often do not find out about the crime until significant losses accumulate, or someone discovers discrepancies on the books. Because of the hidden nature of the transactions, businesses can lose vast amounts of money. Business identity theft can remain undetected for years...
May 25, 2012 Added by:Headlines
Laird stole the funds through a number of means: opening credit accounts in her father’s name without authorization; making redemptions from CD accounts of five customers; opening checking accounts in other names and wroting checks to pay her personal bills and expenses...
May 10, 2012 Added by:Marc Quibell
Here's the problem - too many people have too much information about you, stored in or on who-knows-what, and who-knows-where. The risks of having your identity stolen and used are astronomical. All it requires is someone on the receiving end putting it all together...
May 01, 2012 Added by:Pierluigi Paganini
It is clear that criminal organizations are devoting substantial resources in this sector. An increasing component of organized crime is specializing in this kind of activity characterized by high profits and low risks compared to traditional criminal activities...
April 02, 2012 Added by:Headlines
The majority of fugitives on the Secret Service's top ten most wanted list can be described as "cyber criminals". While the objectives remain the same, the ubiquity of the digital systems that pervade every aspect of our culture presents a new set of challenges for law enforcement...
March 30, 2012 Added by:Robert Siciliano
Vishing occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft...
March 23, 2012 Added by:Headlines
After a five week trial, four defendants have been convicted for their roles in one of the largest bank fraud and identity theft schemes in California history, with dozens of victims in four states and millions of dollars in losses...
March 14, 2012 Added by:Robert Siciliano
What did you do with all of your old devices? Some were probably given away, or you might have hocked a few on eBay or Craigslist. Did you know it is very likely that you inadvertently put all of your digital data in someone else’s hands?
March 11, 2012 Added by:Kelly Colgan
Used to be crooks snagged a Social Security number to open a credit card and run up charges. Now they've found an easier way to make money, according to the FTC: Identity thieves prefer to commit tax and wage-related fraud...
February 14, 2012 Added by:Kelly Colgan
The IRS has seen a significant increase in the number of fraud cases involving identity theft, according to Steven Miller, IRS deputy commissioner for services and enforcement. Addresses don’t mean anything. All a thief needs is your name and Social Security number...
February 07, 2012 Added by:Headlines
U.S. Secret Service’s New York Field Office recently investigated a sophisticated operation in which information from the cell phone accounts of tens of thousands of people is stolen to support a black market in international calling...
February 03, 2012 Added by:Robert Siciliano
Recently UCLA announced 16,000 patients were potential victims of identity theft because a doctor’s home office was broken into and data stolen. Data breaches cost big bucks. Encryption in this scenario failed due to a password on a sticky note near the laptop...
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015