Posts from January, 2012
Remember the days when a phone was for calling people? Well, those days are long gone now. One of the necessities the smartphone has taken on to replace is the wallet. A smartphone has already challenged the necessity of regular phones, computers, camcorders, cameras and GPS devices, so why not a wallet too?
While we are all aware that computers retain information from their users, a public computer user may not consider just how dangerous that information could be in the wrong hands. Retained Internet history, passwords or social network log-in credentials provide an excellent opportunity for identity thieves to access all of the information they will need to steal the user’s identity. However, following the tips below can help decrease the risk of becoming the target of identity thieves:
Popular online retailer Zappos.com has informed over 24 million customers that the database storing their personal information was hacked. Among the data that may have been accessed are customers' names, e-mail addresses, billing and shipping addresses, phone numbers, the last four digits of consumers' credit card numbers and cryptographically scrambled passwords (but not the actual password).
Allowing our children the innocence of their childhood is paramount to us as parents. Because our children are pretty much the center of our universe, we want to do everything in our power to keep them safe and to safeguard their futures. From an identity theft perspective, why are our children, the very people we most want to protect, so vulnerable?