Cybersecurity

It used to be enough to hack into a corporation’s servers, access personal data on hundreds of thousands—or even millions—of the company’s customers, and use that data to steal identities. But that’s just so much work. A new threat is on the rise, and hacker groups like Rex Mundi (King of the World) have made headlines for their efforts.

A heated debate has been underway in the California state legislature over your telephone. Whether you knew it or not, government leaders and consumer protection groups have been battling it out over the proposed requirement that would declare mobile phone manufacturers to provide kill switches on any smartphone sold in California (the requirement that tablets be equipped with a kill switch was lifted).

When most citizens think of identity theft, the usual processes might come to mind. A thief nabs a Social Security number or bank account number and makes off with a good deal of money. But as consumers have grown more aware of the problem and corporations have instituted better measures to safeguard their clients’ personally identifiable information, criminals have had to adapt in order to keep their stolen income going.

As one of the leaders in the cyberinformation industry, Verizon goes to great lengths to understand how data breaches happen.

Tablet use in the US is on the rise, so much so that a full 85% of traffic from some websites takes place on a tablet or smartphone (which is basically a mini tablet). Tablets, like the iPad, Kindle Fire, Samsung Galaxy, and others, are convenient and easy to use, making them the perfect computer companion.

Social media platforms are all the rage. Everyone from corporate entities, major league sports teams, political parties, even your third grade teacher may have accounts of some form now. They’re a useful tool for everything from catching up with old or out of town friends to sharing information about a company’s products or brand. Unfortunately, there are a wide variety of platforms and they function in an equally wide variety of ways. If you don’t know what you’re doing, you can accidentally open yourself up to headaches.

Internet scams have become so commonplace in society that they’ve actually become a joke, a meme all their own. Popular television shows, movies, and even children’s programming have had light-hearted references to strange emails from deposed royalty, asking for help in moving some money out of the country in exchange for a cut of the proceeds.

 

ITRC Sponsors and Supporters 

 

 

 

 

Go to top

 

The TMI Weekly

Breaches here, identity theft there and invasions of privacy everywhere... Should you be worried and, if so, how can you protect yourself? Sign up now to receive The TMI Weekly and get the latest hot topics in identity theft, data breaches and privacy and helpful information on how to protect your information.