Identity theft

You Have Exactly Three Passwords, Don't You?

Software architect and Microsoft MVP Troy Hunt performed an independent data analysis of the leaked passwords from the Sony hacks and compared it with another data set that was made available after Gawker's commenting database was hacked in December 2010.  One of the most shocking things he found (although it's not shocking if you are a password reuser yourself) is that 88 people had both a Gawker and Sony account with the same email address, and 67 percent of them used the same password. It's a small sample size, but an interesting figure nonetheless.
U.S.

4 Reasons 2011 is the Year to Get Serious About Security

Prognosticators are silly. Or that’s how I’ve always viewed them, anyway. They combine past experience with their perspective on current trends to make predictions and pretend to be smarter than you.

Many prognosticators in the financial world have failed miserably, and we’re all paying the price now. Their current excuse is “irrational exuberance.”

U.S.

Cool Tools To Access Files Remotely

Whether you’re a road warrior or simply own multiple PCs and want access to all your data from anywhere, here are a few easy ways to do it, and one not so easy option.

All of these options are secure, as long as you don’t leave a remote PC logged into your account, or log in from a PC that is already infected with spyware or a virus. I only log in from trusted PCs like my own laptop.

U.S.

Mobile Apps Are Leaking Data on You

Tracking users is all the rage. A battle is being waged over our data, and there are several parties involved in this fight. We voluntarily offer our data to various companies, only to discover that they are using it in ways that we never anticipated.

Smartphones have become almost an extension of ourselves. They are as integral to our lives as clothing. I have mine clipped to my suit when I’m working, jeans when I’m shopping, and pajamas when I’m lounging. And then, of course, it’s on the nightstand when I’m sleeping. It’s even right outside the shower.

U.S.

Safeguard your smart phone from identity theft

Hackers are shifting their focus from taking over your PC to invading your cell phone. With more than a billion smart phones on the world market today, security has never been a higher priority. There is something you can do to protect your information.

As phones are getting smarter, so are the crooks who want to your information to get what they want. According to Experian, a global fraud prevention company, 2/3 of smart phone users check and send e-mails from private accounts.
U.S.

Pages

Subscribe to Identity theft