Feeds & Podcasts

Blogs

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

identity theft protection product

Posts tagged under identity theft protection product

Spear Phishing Leaves a Bloody Wound

Friday, June 24, 2011 at 8:10am by Robert Siciliano
Robert Siciliano

Once criminal hackers get a person’s username and email address, they can begin to launch a targeted spear phish scam. Scammers copy the design of each breached entities outgoing email campaign and blast the breached list with “account update” or other ruses. Gaming site Sega Pass was hacked. On the Sega Pass website it states, Read more…

Tags: , , , , , , , , , , , , , ,

Breaches Upon Breaches, Sony, X-Factor, LastPass, bin Laden Scams

Wednesday, May 11, 2011 at 9:05am by Robert Siciliano
Robert Siciliano

When a major corporation like Sony gets hit then you know we are all vulnerable. Sony is a great company and like many great corporations is under constant attack. The landscape of information security is changing every day and criminals are aiming their cyber-weapons at the biggest targets in the world. TechNewsWorld reports LastPass, the Read more…

Tags: , , , , , , , , , , , ,

McAfees Most Unwanted Identity Theft Criminals

Monday, May 2, 2011 at 12:12pm by Robert Siciliano
Robert Siciliano

McAfee has created a tongue-in-cheek list of the most unwanted identity thieves, describing the various techniques thieves use to steal your information. It’s clever and, unfortunately, very real. Pauly the Pickpocket & Sally Sticky Fingers work as a team to lift wallets and mobile devices from pockets and purses, often in broad daylight. Sally creates Read more…

Tags: , , , , , , , , , , , , , , , ,

Lawmakers Push To Shield Last 4 Social Security Numbers

Monday, April 18, 2011 at 3:30pm by Robert Siciliano
Robert Siciliano

Most of us have become accustomed to giving out the last four digits of our Social Security numbers. But this customary request is becoming increasingly problematic, and two Rhode Island lawmakers are responding by pushing legislation to stop businesses from asking for the last four digits of customers’ Social Security numbers. Researchers at Carnegie Mellon Read more…

Tags: , , , , , , , , , , , ,