Phishing attack, spoofing attempt, ransomware, botnets… the lingo surrounding technology can be pretty strange, but it can all lead back to a very real threat to your data if you’re not on top of it. Even worse, new technology and new methods of attack appear practically every day, making it hard for even the most […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2017-04-17 18:48:472018-05-05 19:40:01Phish, Phlash, Spoof: Do You Know Your Cyber Security Vocab?
One of the earliest large-scale social media sites, MySpace, suffered a data breach that may have occurred as early as 2013 but was only discovered in 2016. The stolen information was found for sale on a black market data website and contained usernames, email addresses, and passwords to an estimated 360 million user accounts. When the announcement […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2017-04-06 19:05:092019-02-21 11:30:48Are You Still Hanging onto an Old Email Account?
When it comes to protecting our privacy and staying safe online, new data from the Pew Research Center shows that too many of us aren’t as savvy as we think. The need for strong passwords, the dangers of connecting to public wifi, even the ability to spot common scams are topics that many people aren’t […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2017-04-05 19:14:162018-05-06 19:16:16What You Don’t Know about Cybersecurity Can Hurt You
You can take lots of steps to avoid malware and cyberattacks on the devices you own. But how can you protect your online safety when you use public computers at your local library, school, cyber café, or hotel lobby? How Safe Are Public Computers? Public computers are not as safe as personal devices because you […]
https://www.idtheftcenter.org/wp-content/uploads/2019/08/college-student-studying-library.png8581000Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2017-04-03 04:50:592019-08-27 12:16:16Keep Yourself Safe When Using Public Computers
As the weather turns warmer, many people start looking around at their home improvement projects and “spruce-ups” that they’ve put off through the winter. While no one adores the chores associated with cleaning out the gutters or washing all the windows, there is a real sense of accomplishment when it’s over. When we’re through, it […]
https://www.idtheftcenter.org/wp-content/uploads/2017/03/springcleaning-mobiledevice-itrc.jpeg9601280Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2017-03-07 19:06:292019-02-21 11:30:45Clear Out the Cobwebs: Spring Cleaning for your Mobile Device
If you’ve spent even a few minutes of your life near a computer, you’ve probably already been schooled on the need for strong, unique passwords. Strong passwords are typically between eight and twelve characters’ long, and they contain a seemingly random combination of uppercase letters, lowercase letters, numbers, and symbols. Unique passwords, as the name […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2017-02-28 18:46:522018-05-05 19:23:45Creating Strong Passwords Can Be Fun
The internet of things has produced some really cool innovations. From lamps that come on when you drive up to your house to countertop crock pots that you can turn on and off from your desk at work, our connected lives are easier than ever. But the power of the internet isn’t just for convenience. […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2017-02-22 04:01:202018-05-06 04:03:54That's What We Call a Snack Attack: Hackers Gain Access Through Vending Machines
Internet access at home has become a must for most people: adults need it for work, bills, and shopping; kids need it for homework; everyone uses it to download entertainment and keep in touch with friends. Many of us get web access with a home Wi-Fi network, but most of us don’t know how to […]
https://www.idtheftcenter.org/wp-content/uploads/2017/02/public_wifi_dangers.jpg200300Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2017-02-11 20:09:052018-09-17 20:35:32Securing Your Home Wi-Fi: The Invisibility Defense
Are you a social media addict, or do you shun the whole Facebook and Twitter thing? No matter how connected you are or aren’t, a new report from Javelin Strategy & Research shows there may be pros and cons to both. First, the general findings of their study: there were 15.4 million US victims of identity theft […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2017-02-10 20:05:042018-05-06 20:06:35Your Online Presence: The Security Pros and Cons
Many internet users have accounts spread far and wide across the web. Online accounts for your social media apps, email provider, and bank accounts are practically a given these days, but what about all those other accounts? The account you had to setup to buy a promotional t-shirt, the account you created on that cooking […]
https://www.idtheftcenter.org/wp-content/uploads/2017/01/ITRC_SS_password_414545476.jpg6671000Alex Hamiltonhttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngAlex Hamilton2017-01-26 20:44:592019-11-04 15:59:30Security Flaw Reminds Us to Never Reuse Passwords
GET ID THEFT NEWS
Stay informed with alerts, newsletters, and notifications from the Identity Theft Resource Center
Phish, Phlash, Spoof: Do You Know Your Cyber Security Vocab?
Phishing attack, spoofing attempt, ransomware, botnets… the lingo surrounding technology can be pretty strange, but it can all lead back to a very real threat to your data if you’re not on top of it. Even worse, new technology and new methods of attack appear practically every day, making it hard for even the most […]
Are You Still Hanging onto an Old Email Account?
One of the earliest large-scale social media sites, MySpace, suffered a data breach that may have occurred as early as 2013 but was only discovered in 2016. The stolen information was found for sale on a black market data website and contained usernames, email addresses, and passwords to an estimated 360 million user accounts. When the announcement […]
What You Don’t Know about Cybersecurity Can Hurt You
When it comes to protecting our privacy and staying safe online, new data from the Pew Research Center shows that too many of us aren’t as savvy as we think. The need for strong passwords, the dangers of connecting to public wifi, even the ability to spot common scams are topics that many people aren’t […]
Keep Yourself Safe When Using Public Computers
You can take lots of steps to avoid malware and cyberattacks on the devices you own. But how can you protect your online safety when you use public computers at your local library, school, cyber café, or hotel lobby? How Safe Are Public Computers? Public computers are not as safe as personal devices because you […]
Clear Out the Cobwebs: Spring Cleaning for your Mobile Device
As the weather turns warmer, many people start looking around at their home improvement projects and “spruce-ups” that they’ve put off through the winter. While no one adores the chores associated with cleaning out the gutters or washing all the windows, there is a real sense of accomplishment when it’s over. When we’re through, it […]
Creating Strong Passwords Can Be Fun
If you’ve spent even a few minutes of your life near a computer, you’ve probably already been schooled on the need for strong, unique passwords. Strong passwords are typically between eight and twelve characters’ long, and they contain a seemingly random combination of uppercase letters, lowercase letters, numbers, and symbols. Unique passwords, as the name […]
That’s What We Call a Snack Attack: Hackers Gain Access Through Vending Machines
The internet of things has produced some really cool innovations. From lamps that come on when you drive up to your house to countertop crock pots that you can turn on and off from your desk at work, our connected lives are easier than ever. But the power of the internet isn’t just for convenience. […]
Securing Your Home Wi-Fi: The Invisibility Defense
Internet access at home has become a must for most people: adults need it for work, bills, and shopping; kids need it for homework; everyone uses it to download entertainment and keep in touch with friends. Many of us get web access with a home Wi-Fi network, but most of us don’t know how to […]
Your Online Presence: The Security Pros and Cons
Are you a social media addict, or do you shun the whole Facebook and Twitter thing? No matter how connected you are or aren’t, a new report from Javelin Strategy & Research shows there may be pros and cons to both. First, the general findings of their study: there were 15.4 million US victims of identity theft […]
Security Flaw Reminds Us to Never Reuse Passwords
Many internet users have accounts spread far and wide across the web. Online accounts for your social media apps, email provider, and bank accounts are practically a given these days, but what about all those other accounts? The account you had to setup to buy a promotional t-shirt, the account you created on that cooking […]