Your computer’s hard drive contains an extraordinary amount of personal information; information that an identity thief could use to commit financial, criminal and medical fraud under your identity. So when you are considering selling or throwing away an old computer, naturally, you delete everything off of your hard drive. But is that enough? There are […]

We are not yet thinking about 2014, but the antivirus community certainly is.  We can expect a lot of new product introductions in the antivirus sector as they attempt to get on your holiday shopping list with newer products. You’ll find that the competition to get your AV dollar is fierce.  One particular website comparison found at http://www.av-comparatives.org/dynamic-tests/ , […]

On August 6, Michael Daniel, Special Assistant to the President and the Cybersecurity Coordinator, posted on the White House blog a set of possible incentives for companies that voluntarily adopt the Cybersecurity Framework currently being created by the National Institute of Standards and Technology (NIST). The Cybersecurity Framework is a voluntary set of rules based on existing […]

Passwords “are starting to fail us,” says PayPal’s Chief Information Security Officer Michael Barrett at a recent event in Las Vegas.  Much like a locked front door to your home, it may serve as a minor deterrent to the casual passer-by, but anyone who really wants to find a way in, will most likely be […]

You use your smartphone and tablet everyday, but are you using it safely when you connect to public WiFi? The Identity Theft Resource Center and PRIVATE WiFi invite you to participate in our co-sponsored research survey on Mobile Device Security. By contributing your insight, we will learn more about consumer usage habits when it comes […]

When the Identity Theft Resource Center was founded, cybercrime and identity theft weren’t quite the “household name” hot topics that they are today. While the various forms of the crime aren’t going away anytime soon, what has happened is a cultural shift towards protecting your information and watching out for your data security. The old recommendations for security-minded […]

Social networking sites are a great way for families and friends to stay in contact with each other. They also provide an open forum for people to speak their mind, talk about issues that are important to them, and share photos and memories with the world. Kids and teens have especially taken to this new […]

Most iPhone users store a considerable amount of personal data on their phone that would be devastating to lose. This can be in the form of pictures, saved PDFs, passwords, banking information, credit card information, and personal text messages. Therefore, it is extremely important to keep your iPhone as secure as possible. Luckily, there are […]

Most of us who own smart phones store a considerable amount of personal data on them which could be very damaging if the phone was lost or stolen. Everything from valuable documents, passwords, personal pictures, banking or credit information, and personal text messages could be compromised. Fortunately, there are several steps one can take to protect […]

Like millions of other people, I got my first smartphone for work, not personal use. And, just like most other digital device users, my personal life soon became a part of whatever smart phone I was using, and the tasks I expect it to do have broadened greatly since the days of my Kyocera 6035. […]