Identity Theft

Our Credit.com experts provide tips & advice on how you can avoid becoming a victim of identity theft and what you should do in the event your identity is compromised. Here, you’ll find information explaining the different forms of identity theft, how to monitor you credit for signs of identity theft & what fraud protection measures you can take.

Can Prepaid Cards Protect You From Data Breaches?

Can Prepaid Cards Protect You From Data Breaches?

Can Prepaid Cards Protect You From Data Breaches?

If the constant news of data breaches makes you nervous, it should. “Data breaches are the greatest risk factor for identity fraud,” warns Javelin Strategy and Research. And debit cardholders should be particularly worried because nearly half (46%) of consumers whose debit cards were breached in 2013 became fraud victims that same year, according to Javelin…. Read More

Home Depot Confirms Data Breach: What’s Next?

Home Depot Confirms Data Breach: What’s Next?

Home Depot Confirms Data Breach: What’s Next?

Home Depot shoppers, check your credit card bills and bank statements. The home improvement giant confirmed Monday it was hit by hackers. While information is still scarce, it’s clear the hack will have a huge footprint. Here’s the relevant part of the firm’s statement: “Last Tuesday, September 2, we disclosed that we were investigating a… Read More

It Took Me 850 Days to Get My Tax Refund

It Took Me 850 Days to Get My Tax Refund

It Took Me 850 Days to Get My Tax Refund

Death involves a lot of paperwork. It’s not something people associate with losing a loved one, but for Wendy Boka Gonzalez, paperwork was one of the things she hated most after her husband died suddenly at age 31 of a pulmonary embolism — when one or more of the pulmonary arteries in the lungs is blocked…. Read More

Is Your Grandma the Target of Online Dating Scams?

Is Your Grandma the Target of Online Dating Scams?

Is Your Grandma the Target of Online Dating Scams?

Scammers know no limits when it comes to taking advantage of the elderly: There are the notorious grandparent scams, but apparently seniors seeking love are a favorite target, as well. After allegedly using dating sites to prey on seniors for more than a year, a Maryland man was indicted Aug. 21 on charges related to… Read More

Police Hope Software Will Stop Crime Before It Happens

Police Hope Software Will Stop Crime Before It Happens

Police Hope Software Will Stop Crime Before It Happens

The promise to local police departments is simple: Buy our software, and we will help you prevent crime before it happens. How? Through a social media “listening lens.” Called “SnapTrends,” the web-based service sifts through every Facebook status, Tweet, Instagram photo, YouTube video and other social media post within a designated area. That “listening lens”… Read More

The Lie That Could Keep You Safe From Hackers

The Lie That Could Keep You Safe From Hackers

The Lie That Could Keep You Safe From Hackers

The hack that created millions of morally challenged voyeurs—and, depending upon which celebrity they downloaded, child sex offenders—also provided us with a teachable moment. It exposed the use of security questions in online authentication as a quaint artifact of an antiquated Internet culture. We talk a lot about personally identifiable information (PII) in the data… Read More

The Quick-Cash Scheme That’s Too Good to Be True

The Quick-Cash Scheme That’s Too Good to Be True

The Quick-Cash Scheme That’s Too Good to Be True

There are few people in this world who aren’t at least intrigued by an opportunity to make more money. According to the Bureau of Labor Statistics, 6.8 million Americans have more than one job (that’s 4.6% of employed people), either because they need the extra income or they merely enjoy the flexibility that comes with… Read More

The All-Access Pass Hackers Love

The All-Access Pass Hackers Love

The All-Access Pass Hackers Love

What do the Target hackers have in common with Edward Snowden? Both successfully breached highly protected networks to steal mountains of sensitive data by abusing privileged accounts. Privileged accounts are the logons that open access to desktops, laptops, servers, firewalls, databases, printers — pretty much any device with a microprocessor tied into a company network. For the… Read More

7 Scams That Just Won’t Die

7 Scams That Just Won’t Die

7 Scams That Just Won’t Die

As much of a joke as those Nigerian-prince-email scams have become, people sadly fall for them. That “pay me now, you’ll get millions later” operation has been around for decades (the Boston Globe says it’s 200 years old) and has found ways to work from paper letters, emails and texts, and given that longevity, it’s probably… Read More

5 Reasons Not to Search for Those Nude Celebrity Photos

5 Reasons Not to Search for Those Nude Celebrity Photos

5 Reasons Not to Search for Those Nude Celebrity Photos

A not-so funny thing happened to the Internet over Labor Day weekend. It was nearly trampled to death in a digital stampede for photographs of nude celebrities including Jennifer Lawrence, Ariana Grande, Mary Elizabeth Winstead, Kate Upton, Rihanna and others. More than 100 celebrities “made” the list. How did the pictures wind up online? The best… Read More

Show Me More

Find out where you stand.
Get your FREE personalized credit report card.

Sign Up Now
X

Stay Connected to your experts

Please submit your email address to get credit & money tips & advice
from our team of 30+ experts, delivered weekly to your inbox.