Identity Theft Prevention News, Features, and Interviews

News

Wearable Tech - Can your life be hacked?

By Anthony Caruana | 07 March, 2014 10:30

Paraphrasing the song made famous in the 1960s by The Troggs and wonderfully updated by Bill Nighy in "Love Actually" Big Data is really all around us. We are making more and more data about ourselves available to a broader audience. But what if that data is stolen? Is it useful to anyone?

Auscert 2012: Day 2 Roundup - Roll your sleeves up its Gala Day

By CSO staff | 17 May, 2012 18:36

Today's sessions through the eyes of IT Security journos Richard Chirgwin and Hamish Barwick at Auscert 2012.

Start-up Click Security debuts with threat-detection product

By Ellen Messmer | 21 February, 2012 16:30

Start-up Click Security launches today with a threat-detection product that analyzes and correlates intelligence gathered by sensors on network traffic and activity to provide real-time alerts or even automate defense response to network intrusions or other security threats.

Eight tips to defend against online financial fraud threats

By Thor Olavsrud | 17 February, 2012 07:48

Criminals in 2012 are increasingly targeting the accounts of business owners and executives as a way to facilitate financial fraud and CIOs can help protect their organizations against these attacks.

How to get the IRS' attention: Forge nearly $8 million in tax returns, steal identities

By Michael Cooney | 11 February, 2012 04:28

A former Internal Revenue Service employee this week got 105 months in prison for pleading guilty to theft of government property and aggravated identity theft in a case where the guy tried to get away with nearly $8 million in fraudulent tax returns.

Slideshows

Destroying data to protect against fraud

By Neerav Bhatt | 18 October, 2011 07:39

Destroying data to protect against fraud.

Features

It Wasn’t Me, It Was Bennett Arron

By Bennett Arron | 11 July, 2011 18:31

So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.

Opinions

Opinion: How safe is your customer identity data?

By Anton Koren | 14 July, 2011 22:52

Some of the world’s largest corporations have recently fallen victim to hacking attacks and identify data theft, while other online businesses have been compromised and sidelined for days or weeks, losing millions of dollars in revenue and suffering significant reputational damage. It’s never been more important for companies to act in order to avoid becoming the next victim of identity data theft.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Enterprise Virtualisation Security

Deep Security provides a comprehensive Server Security Platform giving organisations advanced protection for Physical, Virtual, and Cloud Servers.

Latest Jobs
Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.