5 Cyber-Security Myths We Need to Ditch

Identity Theft

5 Cyber-Security Myths We Need to Ditch

5 Cyber-Security Myths We Need to Ditch

Pick a subject, any subject, and there are myths and pure nonsense that someone will buy into. Birds will die if they eat the uncooked rice flung at newlyweds. (Nope) If you eat Mentos and drink Diet Coke simultaneously your stomach will explode. (Hardly) You only have one credit score. (Wrong) Napoleon was short. (At... Read More

Obama’s Data Security Plan: Do As I Say, Not As I Do

Identity Theft

Obama’s Data Security Plan: Do As I Say, Not As I Do

Obama’s Data Security Plan: Do As I Say, Not As I Do

“If we’re going to be connected, then we need to be protected,” President Obama proclaimed at the Federal Trade Commission on Monday. In wide-ranging remarks, the president expressed what should be a self-evident truth, but is not yet a reality in the new digital age: “As Americans, we shouldn’t have to forfeit our basic privacy... Read More

5 Risky Things You’re Doing on Your Work Computer

Identity Theft

5 Risky Things You’re Doing on Your Work Computer

5 Risky Things You’re Doing on Your Work Computer

With technology driving business growth, more companies are implementing bring-your-own-device policies in the workplace. Almost two in three IT professionals believe employee carelessness is connected to major data breaches that exposed customer information, according to a study by IT security firm Check Point. With the risk of employees causing data breaches of customer and corporate information,... Read More

BlackEnergy: The Scariest Malware in America?

Identity Theft

BlackEnergy: The Scariest Malware in America?

BlackEnergy: The Scariest Malware in America?

Malicious software that researchers think has been used by hackers to attack critical infrastructure systems, such as trains and power plants in Ukraine and Poland, has been found in similar American systems, the U.S. government says. And while there is no sign hackers have used the software — called BlackEnergy — to wreak havoc by... Read More

What Is a ‘Data Breach’ Really?

Identity Theft

What Is a ‘Data Breach’ Really?

What Is a ‘Data Breach’ Really?

Data breaches. Vulnerabilities. These terms have entered our lexicon. But what exactly do they refer to? Recent news events show that we are in a period where the terminology we use to refer to security shortfalls is in flux. Target, Home Depot and JPMorgan Chase clearly suffered major data breaches. So did Apple’s iCloud, Dropbox... Read More

FBI Chief: China Has Hacked Every Major U.S. Company

Identity Theft

FBI Chief: China Has Hacked Every Major U.S. Company

FBI Chief: China Has Hacked Every Major U.S. Company

In a “60 Minutes” interview, Federal Bureau of Investigation Director James Comey bluntly answered questions about cybersecurity threats to the U.S. and its citizens. Perhaps his most shocking statement came on the topic of foreigners’ attempts at breaking digital security barriers: “I mean, there are two kinds of big companies in the United States. There... Read More

The All-Access Pass Hackers Love

Identity Theft

The All-Access Pass Hackers Love

The All-Access Pass Hackers Love

What do the Target hackers have in common with Edward Snowden? Both successfully breached highly protected networks to steal mountains of sensitive data by abusing privileged accounts. Privileged accounts are the logons that open access to desktops, laptops, servers, firewalls, databases, printers — pretty much any device with a microprocessor tied into a company network. For the... Read More

Show Me More

Certain credit cards and other financial products mentioned in this and other articles on Credit.com News & Advice may also be offered through Credit.com product pages, and Credit.com will be compensated if our users apply for and ultimately sign up for any of these cards or products. However, this relationship does not result in any preferential editorial treatment.