Search

Subscribe to ProtectMyID Blog via RSS

Rss Posts

Rss Comments

Welcome to the ProtectMyID Blog

Lessons and stories from the front lines of fighting identity theft.

 

Posts in ‘Identity Theft’

Smartphone Safety 101

Nov 16

Smartphone Safety 101 A Smartphone is a mobile phone with enhanced capabilities. With the increased abilities of the Smartphone, come built-in risks for exposure of personal information. There are steps Smartphone users can take in order to reduce the risks associated with using these handy devices.

Military Members at Greater Risk of Identity Theft

Nov 11

Military Members at Greater Risk of Identity Theft Nearly a century ago, World War I ended on November 11, 1918. One year later, President Wilson selected November 11 as a day to honor those who had represented the country in the armed forces and it the date became a legal holiday in 1938. However, feeling gratitude for the country’s service men and women doesn’t extend to identity thieves. In fact, members of the military are at greater risk of identity theft and many don’t know how to protect themselves.

Understanding Smartphones: Glossary of Terms

Nov 09

Understanding Smartphones: Glossary of Terms Knowing how to protect your privacy when it comes to your mobile device begins with knowing the terms used to describe its features, functionality and the risks that can accompany the technology.

Identity Theft by Tax Fraud:A Nightmare for Innocent Taxpayers (Part 2)

Nov 07

Identity Theft by Tax Fraud:A Nightmare for Innocent Taxpayers (Part 2) Unfortunately, the IRS is able to criminally investigate only a small percentage of tax-related identity theft cases due to its limited resources. In 2010, its Criminal Investigations Division investigated only 4,700 cases of all kinds, not just identity thefts.

Identity Theft by Tax Fraud:A Nightmare for Innocent Taxpayers (Part 1)

Nov 04

Identity Theft by Tax Fraud:A Nightmare for Innocent Taxpayers (Part 1) If Benjamin Franklin were alive today, he might revise his often-repeated quote to reflect a current threat: “...in this world nothing can be said to be certain, except death, taxes and identity theft.”

Social Engineering and Identity Theft

Nov 02

Social Engineering and Identity Theft By Nikki Junker, Identity Theft Resource Center It is much easier to hack a human than a computer. Computer hackers must be incredibly knowledgeable about information security in order to find a weakness in a computer system which they can then exploit in order to get to the information they want. A human hacker already knows its targets faults. They are the same as his own because his target is a human as well. This technique of personal exploitation is called “social engineering” and it is one of three ways identity thieves carry out their crimes. Social engineering, however, is much easier and less costly for crooks than cyber attacks or physical theft. The following are ways that identity thieves will use social engineering (personal manipulation in order to gain information) to commit identity theft.

Mobile Vampires: 7 Simple Security Settings to Stop Data Suckers

Oct 31

Mobile Vampires: 7 Simple Security Settings to Stop Data Suckers By John Sileo, Identity Theft Author and Data Security Keynote Speaker Information is the currency and lifeblood of the modern economy and, unlike the industrial revolution, data doesn’t shut down at dinnertime. As a result, the trend is towards hyper-mobile computing – smartphones and tablets – that connect us to the Internet and a limitless transfusion of information 24-7.

Don’t Get Scrooged: Cyber Theft During the Holidays

Oct 28

Don’t Get Scrooged: Cyber Theft During the Holidays By John Sileo, Identity Theft Author and Speaker Online shopping during the holidays is a convenient, green, inexpensive way to share the joy of the season. In 2010, Cyber Monday was the heaviest online spending day in history and the first to surpass the billion-dollar threshold ($1.028 billion). But as you gear up for the holidays (yes, it’s here already), don’t forget to take simple precautions to keep your credit card, banking and identity information safe.

Wise Up: Smart Moves for Your Smartphone (Part 2)

Oct 26

Wise Up: Smart Moves for Your Smartphone (Part 2) By Chuck Whitlock, Identity Theft Author and Investigative Reporter Once malware finds its way onto a mobile device, it’s possible that the device can be controlled remotely by a hacker or network of hackers; once that happens, the data on the device can be transferred, and precious, unprotected information can be sold to identity thieves. With this vulnerability in mind, the assumption users make is that the applications that store data like passwords and user names employ some form of encryption when writing the data to the device’s memory.

Wise Up: Smart Moves for Your Smartphone (Part 1)

Oct 24

Wise Up: Smart Moves for Your Smartphone (Part 1) By Chuck Whitlock, Identity Theft Author and Investigative Reporter Identity thieves are opportunists who don’t care what type of equipment you’re using. You can be brought to your knees by identity theft on your smartphone or tablet as well as your laptop or PC. Malware, computer software that can relay personal data or hand over your computer's control to a cyber criminal, has long been an issue for anyone who has connected a personal computer to the Internet. The concern about malware infection should logically follow Internet users as they walk away from their personal computers and dive headfirst into the freedom of life with a smartphone.