Keyboard Apps May Be Fun, But They’re Also Watching What You Type

Imagine that a company has produced a brand-new food. It’s all the rage, and everyone’s talking about it. Commercials for it are everywhere, and your kids come home from school talking about how all of their friends are eating it at lunch.

Can Mouse Movements Detect an Identity Thief?

Technology to fight identity theft is growing more and more sophisticated, a critical advancement as hackers continue to find new ways to steal data, identities, and funds from their victims. But a new study just might give cyber security tech experts another tool to fight back against this crime: self-incrimination.

It Only Takes Minutes for a Thief to Use Your Data

Hackers have a few different goals when it comes to using stolen data.

Do I Need RFID Protection?

There’s an entire industry surrounding the protection of your RFID cards, but some industry experts are already speaking out against the newfangled gadgets.

Don’t Let that Fender Bender Lead to Identity Theft

These days, exercising a little restraint—or at least questioning why the information is needed and how it will be stored safely—is a good idea.

How Data Breaches Affect Your Identity

Only a few years ago, the entire world was shocked by a major retail data breach that stole tens of millions of consumers’ credit card information during Black Friday shopping. It was the talk of news channels everywhere, and at the time it highlighted just how capable cyber criminals really were.

FTC to Host Webcast Conference on Identity Theft

The more things change, the more they stay the same…at least it can feel that way, especially where identity theft is concerned.

 

ITRC Sponsors and Supporters 

 

 

 

 

Go to top

 

The TMI Weekly

Breaches here, identity theft there and invasions of privacy everywhere... Should you be worried and, if so, how can you protect yourself? Sign up now to receive The TMI Weekly and get the latest hot topics in identity theft, data breaches and privacy and helpful information on how to protect your information.