Proposed Plan to Regulate IoT Devices through the FCC

History buffs may know that the Titanic disaster had far-reaching consequences as officials struggled to understand and correct what had led to such a terrible loss of life. One of the lesser known outcomes was the formation of the Federal Communications Commission, or FCC, under the Radio Act of 1912.

The UK to Monitor Its Citizens’ Internet Use

There is an unfortunate fine line between protecting people and violating their rights, and privacy advocates fear that a new UK law called the Investigatory Powers (IP) Bill may have just crossed it. The law, recently approved by both houses of Parliament and royal assent, will make the UK the most stringent surveillance group of any other country.

Hacking Internet-Connected Medical Implant Devices

For some time, security experts have warned about the potential for cybercrime involving internet-connected medical implants. These devices, which include things like pacemakers, insulin pumps, and glucometers, send feedback to the patient’s doctor through wifi and radio signal, providing a more comprehensive level of care. Unfortunately, as with all Internet of Things devices, the potential for hacking and “cybereavesdropping” is always there.

Old School Method of Uncovering Cybercrime

There are a lot of different payment methods that individuals can use when shopping online. While credit cards, debit cards, and even gift cards are popular with consumers, millions of people worldwide rely on some kind of “escrow-style” payment service. One such company is PayPal, and they work by serving as a layer of protection surrounding your purchases.

Bah Humbug! Don’t Open that Holiday Card!

No one wants to be a Grinch at the holidays, but sometimes it’s the only way to protect yourself from malicious software that can steal your identity and your online account access. One of the biggest culprits at this time of year is the scam “holiday e-card” that infects your computer with a virus, malware, adware, spyware, or any other nasty “ware” you can think of!

Yahoo Email Scam Targets Users with Attachments

There are countless ways that scammers send out viruses, malware, and fraud attempts, but they’re only effective if you fall for it. That’s why the famous Nigerian prince emails always had a lengthy “sob story” to them; if they could engage you in the circumstances, you’d be more likely to participate in their plot.

Spammers Take to Online Ads to Spread Malicious Software

Ah, those spam emails of yesteryear, the ones that promised untold wealth for helping a prince get his money out of the country. There were also the ones that offered you an incredible work-from-home job just for filling out this form with your name, birthdate, and Social Security number. And who can forget the emails that said, “You won’t believe these outrageous pictures of [insert celebrity name here]!” and got you to click the link?

Article Archives

 

ITRC Sponsors and Supporters 

 

 

 

 

Go to top

 

The TMI Weekly

Breaches here, identity theft there and invasions of privacy everywhere... Should you be worried and, if so, how can you protect yourself? Sign up now to receive The TMI Weekly and get the latest hot topics in identity theft, data breaches and privacy and helpful information on how to protect your information.