Recently here at ITRC, we’ve received several queries about the effectiveness and use of mobile VPNs. What are they? How do they work? Do I need one for my phone if I send and receive a lot of data? Well, we aim to please… VPN stands for “virtual private network.” A mobile VPN provides mobile […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2012-11-16 05:37:482018-05-05 20:14:53Does Your Mobile Device Need a VPN?
Bring Your Own Device (BYOD), is a growing trend in the business world where employees use their own personal mobile devices for work. This means that sensitive company information including customers’ personal identifying information (PII) and company trade secrets may be accessible from, or might be stored on the employee’s personal phone or other digital […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2012-11-05 05:38:532018-02-24 05:39:47Bring Your Own Device Security Tips
There was a time when every parent knew what to tell their children to be safe. Children knew not to take candy from strangers, or go swimming right after eating. These days the rules have all changed and children have a new playground on which they must be trained in order to stay safe. The […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2012-10-23 05:39:572018-02-24 05:40:38How to Teach Your Child About Cybersecurity
It has been a particularly disturbing couple of weeks as headlines throughout America highlight how some of our most powerful financial institutions were being hacked by alleged foreign powers. It all began on September 17 when the FBI issued a joint Bank Fraud Alert with the Financial Services Information Sharing and Analysis Center (FS-ISAC) and […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2012-10-04 05:40:572018-02-24 05:41:29First the Banks, Now the White House
Last week someone in my family asked me if I could help them with their computer. I asked them what was seemed to be wrong with the machine. They told me that it would start normally at first, but as soon as Windows was done loading they would get a pop-up that they had been […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2012-10-02 05:41:402018-05-05 20:16:20Ransomware - It Can Happen to Anyone
Two days ago, the Federal Bureau of Investigation, the Financial Services Information Sharing and Analysis Center, and the Internet Crime Complaint Center jointly issued a Fraud Alert to financial institutions warning them of alarming trends in unauthorized wire transfers overseas in amounts ranging from $400,000 to $900,000. The Fraud Alert explains that after targeting financial […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2012-09-28 05:42:352018-02-24 05:43:09Banks Warned of Heightened Cyber Threat by FBI
A report released by Norton (Symantec), a leader in cybersecurity that develops antivirus, anti-malware, and other related products and software, demonstrates just how pervasive cybercrime is in today’s digital age. The report was the final product of 19,636 interviews of adults, parents, children, and teachers from 24 developed and emerging countries. The report confirms that […]
If you have scratched below the surface of the avalanche of articles on identity theft, scams, cyber-security, or related topics, you have probably run across the term “spoofing.” However, even many of us that work in the field are not very good at explaining to others what the term means, and the various ways the […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2012-08-22 05:44:152018-05-05 20:17:18Have you been “Spoofed?” Say What?
These days we hear a lot about “the cloud.” There are services encouraging you to upload your data to the cloud, and you can access it from anywhere and easily share files with others. But the flip side is the fact that you’re pushing your personal information from your own computer to data centers where […]
Progress in technology is occurring faster than ever before in human history. The wealth of information now at our fingertips makes things possible that were unthinkable even a few short years ago. One of these is an interesting new development in law enforcement tactics. The use of digital data, stored on sites like Facebook, or […]
https://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.png00Jameshttps://www.idtheftcenter.org/wp-content/uploads/2018/06/32smWideLogo_edited-1-300x71.pngJames2012-08-01 05:45:512018-02-24 05:46:53Phone and Social Media Tech Now Being Utilized by Police
GET ID THEFT NEWS
Stay informed with alerts, newsletters, and notifications from the Identity Theft Resource Center
Does Your Mobile Device Need a VPN?
Recently here at ITRC, we’ve received several queries about the effectiveness and use of mobile VPNs. What are they? How do they work? Do I need one for my phone if I send and receive a lot of data? Well, we aim to please… VPN stands for “virtual private network.” A mobile VPN provides mobile […]
Bring Your Own Device Security Tips
Bring Your Own Device (BYOD), is a growing trend in the business world where employees use their own personal mobile devices for work. This means that sensitive company information including customers’ personal identifying information (PII) and company trade secrets may be accessible from, or might be stored on the employee’s personal phone or other digital […]
How to Teach Your Child About Cybersecurity
There was a time when every parent knew what to tell their children to be safe. Children knew not to take candy from strangers, or go swimming right after eating. These days the rules have all changed and children have a new playground on which they must be trained in order to stay safe. The […]
First the Banks, Now the White House
It has been a particularly disturbing couple of weeks as headlines throughout America highlight how some of our most powerful financial institutions were being hacked by alleged foreign powers. It all began on September 17 when the FBI issued a joint Bank Fraud Alert with the Financial Services Information Sharing and Analysis Center (FS-ISAC) and […]
Ransomware – It Can Happen to Anyone
Last week someone in my family asked me if I could help them with their computer. I asked them what was seemed to be wrong with the machine. They told me that it would start normally at first, but as soon as Windows was done loading they would get a pop-up that they had been […]
Banks Warned of Heightened Cyber Threat by FBI
Two days ago, the Federal Bureau of Investigation, the Financial Services Information Sharing and Analysis Center, and the Internet Crime Complaint Center jointly issued a Fraud Alert to financial institutions warning them of alarming trends in unauthorized wire transfers overseas in amounts ranging from $400,000 to $900,000. The Fraud Alert explains that after targeting financial […]
Norton Cybercrime Report 2011: Painting a Dismal Picture
A report released by Norton (Symantec), a leader in cybersecurity that develops antivirus, anti-malware, and other related products and software, demonstrates just how pervasive cybercrime is in today’s digital age. The report was the final product of 19,636 interviews of adults, parents, children, and teachers from 24 developed and emerging countries. The report confirms that […]
Have you been “Spoofed?” Say What?
If you have scratched below the surface of the avalanche of articles on identity theft, scams, cyber-security, or related topics, you have probably run across the term “spoofing.” However, even many of us that work in the field are not very good at explaining to others what the term means, and the various ways the […]
Security of Cloud Backups
These days we hear a lot about “the cloud.” There are services encouraging you to upload your data to the cloud, and you can access it from anywhere and easily share files with others. But the flip side is the fact that you’re pushing your personal information from your own computer to data centers where […]
Phone and Social Media Tech Now Being Utilized by Police
Progress in technology is occurring faster than ever before in human history. The wealth of information now at our fingertips makes things possible that were unthinkable even a few short years ago. One of these is an interesting new development in law enforcement tactics. The use of digital data, stored on sites like Facebook, or […]