Why Can’t We Catch Hackers?

It’s an easy enough question, but one for which the answer is very complex and multi-faceted: why can’t we catch cybercriminals? With all of the technology at our disposal, why is it still so hard to find the people perpetrating the hacking, data breaches, fraud, and scams?

Want to Get Rid of Ransomware? Infect Your Friends.

Ransomware is pretty nasty stuff, and its victims have included everyone from a lone computer user to a large-scale major medical center. As the name implies, your computer or network becomes infected with a virus that basically locks up the entire thing. A popup window associated with the virus appears and gives you the instructions for removing the virus, namely, to pay the ransom.

When the “Experts” Get Scammed

When it comes to scam and fraud attempts, there is literally no limit to what kind of victim the criminals will go after. Whether it’s senior citizens on a fixed income, charitable organizations, small business owners, military veterans and their families, or any other group whom you might otherwise think would be “off limits,” that’s simply not true.

Proposed Plan to Regulate IoT Devices through the FCC

History buffs may know that the Titanic disaster had far-reaching consequences as officials struggled to understand and correct what had led to such a terrible loss of life. One of the lesser known outcomes was the formation of the Federal Communications Commission, or FCC, under the Radio Act of 1912.

The UK to Monitor Its Citizens’ Internet Use

There is an unfortunate fine line between protecting people and violating their rights, and privacy advocates fear that a new UK law called the Investigatory Powers (IP) Bill may have just crossed it. The law, recently approved by both houses of Parliament and royal assent, will make the UK the most stringent surveillance group of any other country.

Hacking Internet-Connected Medical Implant Devices

For some time, security experts have warned about the potential for cybercrime involving internet-connected medical implants. These devices, which include things like pacemakers, insulin pumps, and glucometers, send feedback to the patient’s doctor through wifi and radio signal, providing a more comprehensive level of care. Unfortunately, as with all Internet of Things devices, the potential for hacking and “cybereavesdropping” is always there.

Old School Method of Uncovering Cybercrime

There are a lot of different payment methods that individuals can use when shopping online. While credit cards, debit cards, and even gift cards are popular with consumers, millions of people worldwide rely on some kind of “escrow-style” payment service. One such company is PayPal, and they work by serving as a layer of protection surrounding your purchases.

Article Archives


ITRC Sponsors and Supporters 





Go to top


The TMI Weekly

Breaches here, identity theft there and invasions of privacy everywhere... Should you be worried and, if so, how can you protect yourself? Sign up now to receive The TMI Weekly and get the latest hot topics in identity theft, data breaches and privacy and helpful information on how to protect your information.