Identity theft

EMV Chip Technology Is the Future of U.S. Payments: Get the Facts in New EMV Migration Forum Infographic

The new year will bring a new way to pay in-store for many U.S. consumers, with 600 millioni new EMV chip cards expected to reach their wallets and increasing acceptance of the cards at retail stores.


Nigeria rolling out eID cards

Nigeria – home to 160 million residents – is launching a national identity smart card that will include biometrics and an EMV payment application. At the end of August the first residents of Nigeria received their copy of the eID, a contact, polycarbonate smart card that replaced the current printed plastic identification document. 


The 5 biggest cybersecurity myths, debunked

The Internet used to be called “A domain for the nerds,” until everyone began to use and depend on it. Today, cybersecurity is viewed the same way - that quote is from a White House official earlier this year. Recognizing that cybersecurity is a comprehensible, manageable challenge for all of us is a key step towards a solution.


Blogs, other content management sites targeted by password thieves

August 07, 2013CSO — Brute force attacks to pry login credentials from content management sites like blogs have been growing as more data robbers use a short-term gain for a bigger pay-off later on.

Such sites are attractive targets because they tend to be less secure than other environments -- such as financial services -- and since they're interactive by design, "drive-by" malware planted on them can infect a lot of users quickly, said David Britton, vice president of industry solutions at 41st Parameter.


How Do I Restore My Identity Once It Has Been Stolen?

The Federal Trade Commission offers invaluable tools for restoring your identity if it has already been compromised. The tools can be found at On this website, you will find a complaint form, affidavit of your identity, and sample letters. You will also find a log to chart your actions while restoring your identity.

What is hacking?

Hacking is what computer criminals (or hackers) do when they try to penetrate a computer system by foiling its security features. Although there is a subculture of hackers that do it as a kind of sport for the intellectual challenge, others are malicious or criminal in intent. “Hacktivists” are a new class of hackers that are politically motivated or have a cause. Once they penetrate a system, they seek to cause damage by changing or destroying data, profit from stealing it or use it to embarrass a company or government agency.


Cyber security for holiday shopping

How do you prefer to do your holiday shopping? Getting in the car, driving to a shopping centre, dealing with the crowds and standing in queues to bag the ideal gifts? Or plopping down on the sofa, armed with your laptop, a credit card and a warm cuppa and doing your shopping as you work your way through half a series of 24?

Despite warnings, most states slow to confront corporate ID theft

According to the Department of Justice, the two took advantage of loose public- and private filing systems for more than a year, fooling regulators in Ireland, the UK and the U.S. and stealthily taking control of dozens of dormant firms. The scam calls attention to a little-known, but growing problem in the U.S. and elsewhere: business identity theft, and the way that lax business filing systems aid would-be thieves.


Subscribe to Identity theft