FBI Chief: China Has Hacked Every Major U.S. Company

Identity Theft

FBI Chief: China Has Hacked Every Major U.S. Company

FBI Chief: China Has Hacked Every Major U.S. Company

In a “60 Minutes” interview, Federal Bureau of Investigation Director James Comey bluntly answered questions about cybersecurity threats to the U.S. and its citizens. Perhaps his most shocking statement came on the topic of foreigners’ attempts at breaking digital security barriers: “I mean, there are two kinds of big companies in the United States. There… Read More

Is This Malware ‘South Park’-Inspired?

Identity Theft

Is This Malware ‘South Park’-Inspired?

Is This Malware ‘South Park’-Inspired?

Malicious advertising, or malvertising, continues to pose a profound hazard, making visits to some of the Internet’s most popular websites a dicey proposition. Cisco researchers have identified a criminal ring, christened the “Kyle and Stan” Malvertising Network (a likely reference to two of the main characters on “South Park”), that distributes sophisticated, mutating malware to… Read More

What Really Happens After Your Credit Card Is Stolen

Identity Theft

What Really Happens After Your Credit Card Is Stolen

What Really Happens After Your Credit Card Is Stolen

After a hacker steals your credit card number, you may receive an email, text or phone call from your bank to alert you of criminal or fraudulent activity with your credit card. This is a helpful and necessary measure implemented by financial institutions to help protect your accounts. However, sometimes the alert is too late and… Read More

The Lie That Could Keep You Safe From Hackers

Identity Theft

The Lie That Could Keep You Safe From Hackers

The Lie That Could Keep You Safe From Hackers

The hack that created millions of morally challenged voyeurs—and, depending upon which celebrity they downloaded, child sex offenders—also provided us with a teachable moment. It exposed the use of security questions in online authentication as a quaint artifact of an antiquated Internet culture. We talk a lot about personally identifiable information (PII) in the data… Read More

The All-Access Pass Hackers Love

Identity Theft

The All-Access Pass Hackers Love

The All-Access Pass Hackers Love

What do the Target hackers have in common with Edward Snowden? Both successfully breached highly protected networks to steal mountains of sensitive data by abusing privileged accounts. Privileged accounts are the logons that open access to desktops, laptops, servers, firewalls, databases, printers — pretty much any device with a microprocessor tied into a company network. For the… Read More

Even Hackers Worry About Getting Hacked

Identity Theft

Even Hackers Worry About Getting Hacked

Even Hackers Worry About Getting Hacked

Hackers have some of the best security knowledge out there, but that doesn’t mean they’re attack-proof: 88% of self-identified hackers surveyed at a recent security conference said they think their personally identifiable information is at risk of being compromised online. At the same time, the vast majority of those surveyed said they believe they’ll never… Read More

5 Things Identity Thieves Want You to Do

Identity Theft

5 Things Identity Thieves Want You to Do

5 Things Identity Thieves Want You to Do

Keeping your identity safe online and elsewhere is paramount in today’s highly digitized world. If you allow hackers to access information about you, it could result in a wiped-out bank account or a hacked email address, which will lead to major frustrations. As Chairman and Co-Founder of Credit.com and IDT911 Adam Levin believes, escaping identity thieves… Read More

Hackers Target the World Cup

Identity Theft

Hackers Target the World Cup

Hackers Target the World Cup

Hackers are planning to attack the FIFA World Cup, according to a report by Infosecurity Magazine. The article cited two hackers. One called Che Commodore spoke with Reuters and explained that the infamous hacker group Anonymous has already begun to look for weaknesses in World Cup-related websites it can exploit. Commodore said the group plans to execute Denial of Service attacks on high-profile sponsors… Read More

My Run-In With a Real-Life Hacker

Identity Theft

My Run-In With a Real-Life Hacker

My Run-In With a Real-Life Hacker

I received an unexpected email from a friend today with a Google doc attachment. It was a friendly note, so friendly that I did consider clicking on it — even with about 20 years experience watching all manner of hacker tricks.  Fortunately, I stopped and asked a simple question, which is almost always enough to… Read More

Show Me More

Find out where you stand.
Get your FREE personalized credit report card.

Sign Up Now
X

Stay Connected to Our Experts

Please submit your email address to get credit & money tips & advice
from our team of 30+ experts, delivered weekly to your inbox.