Every year the Internet Crime Complaint Center, known as IC3, releases their report of the complaints they have received throughout the prior year. This information in gathered through the reports made by victims of cybercrime to IC3. It is then analyzed and reported to authorities at all levels in order to help law enforcement fight cybercrime. The information is also used to make important Public Service Announcements, which help make the public aware of new cybercrime scams and other exploits against citizens. This awareness is an incredibly important step in helping prevent individuals from becoming victims.

The Federal Trade Commission charged social network MySpace LLC with falsely representing the protection of its millions of users' personal information. On May 8, 2012, the FTC made public its press release noting the conditions of the agreed settlement between the FTC and MySpace LLC.

Last August, Facebook released their Facebook Messenger app for smart phones. This app is great for communicating with large groups of people (like party planning) so that everybody is involved, and also for allowing a friend to locate you in case you are lost or are meeting up at an unfamiliar location. In many ways, this app is a great convenience to many people and does make communication easier, but like with all social networking, users need to know about the privacy concerns and what they need to keep in mind to protect themselves.

Chances are you have a lot of accounts. Personally I have accounts (and passwords) for sites that I don't even remember. And while I have more accounts than most due to my profession, I would bet many people deal with the same problem I do: Password Overload. Password overload is when you attempt to use your Pinterest, Twitter, work email and university login passwords (one after another) to get into your Money Market Account only to be locked out. Now you have to go into the branch with photo ID, or endure the dreaded "customer service hotline" (not-line) to prove that you are not indeed a thief. Maybe you haven't experienced such an ordeal, but everyone has experienced something similar.

Are you considering selling your old laptop or smartphone? As some of us may be aware, deleting files or data from these mobile devices is not enough. The truth is that some of what we think are "files" in these devices are actually "shortcuts," and deleting these from the devices will not delete the files themselves. Nowadays, personal computers and mobile devices, such as smartphones have replaced the old paper-file method for storing or even doing work. If you are thinking about selling or donating your personal laptop or any of your mobile devices, there are some precautionary steps you may want to take in order to ensure that any personal or sensitive information does not get left behind. Sensitive information left behind can be retrieved and pose a serious problem.

"Botnet," has become commonplace terminology in the world of cyber-security. This term is used to refer to a network of private computers (or bots) infected with malicious software and controlled as a group without the owners' knowledge. Major breach and hacking events over the past few years have awakened many to the potential dangers created by hackers with the ability to utilize other individual's computers remotely.

A recent study done by a cyber security firm known as F-Secure, found that 58 new threats to the Mac operating system were discovered between April and December of 2011. It is a commonly perpetuated falsehood amongst consumers that viruses and malware are only issues for PC platforms, not Macs. Unfortunately, this is a fallacy. Viruses are like any program; they have to be written with platform specific languages, with instructions written for that machine, operating system, type of processor, etc. What this means in simple layman's terms is that in order to infect a Mac, you must develop software designed for a Mac.

Article Archives

 

ITRC Sponsors and Supporters 

 

 

 

 

Go to top

 

The TMI Weekly

Breaches here, identity theft there and invasions of privacy everywhere... Should you be worried and, if so, how can you protect yourself? Sign up now to receive The TMI Weekly and get the latest hot topics in identity theft, data breaches and privacy and helpful information on how to protect your information.