If you are one of the millions of consumers who use a voice-activated assistant in your home or through your smartphone, your personal data and activity may become more secure due to new data privacy regulations like the European Union’s GDPR and recent privacy-related legislation. Virtual assistants and chatbot tools will now have to tighten […]

As cybercrimes go, ransomware might be one of the nastiest, which is why lots of attention is being brought to recent DSLR ransomware attacks. Using one of several different avenues of attack, a hacker infects a piece of technology with harmful software that locks up the device. The only way to unlock it and restore […]

On Wednesday, July 24, 2019, people could begin filing Equifax claims for the recent data breach settlement, which included filing an Equifax breach settlement claim for a minor. In 2017, Equifax, one of the three largest credit reporting agencies in the world, announced they suffered a data breach. More than 148 million consumers’ identities had […]

Ransomware attacks have risen steadily in the past few years to become a widespread, costly form of cybercrime. This attack, which happens when someone infects a computer or network with harmful software and demands payment to remove it, has hit every kind of industry and business and can affect companies and consumers alike. The first […]

ITRC_SS_VenmoPaymentApp

Payment apps like Venmo have become increasingly popular lately, for good reason. However, if users are not careful about how they use and secure their information the Venmo payment app, it can be a privacy pitfall. Venmo Privacy One concern is password strength. If you are reusing an old password, your app could be infiltrated by someone […]

Payment apps, like Venmo, Apple Pay, Zelle and even Facebook Messenger, are used by over 90 million Americans, but are they actually secure? This touch-of-a-button technology lets you use actual funds from your bank account or your credit card to send money instantly to friends, family and retailers. At first glance, some consumers might be […]

There are two specifically related but not interchangeable threats to your identity, and the terms can often get confused. Credential cracking and credential stuffing both involve someone getting their hands on your personal data, especially your usernames and passwords, but how those two things take place are somewhat different. Credential Cracking Credential cracking happens when […]

The Force Has Awakened this #StarWarsDay! May the Fourth Be With You as you break out your lightsabers and prepare to do battle against the Dark Side of our cyber world with tips from the Identity Theft Resource Center and National Cyber Security Alliance. To celebrate this #MayTheFourthBeWithYou, use the messages below on Twitter, Facebook and […]