Why Your Passwords Should be at Least 24 Characters Long
Here are two simple rules to follow when developing hacker-proof passwords.
Most I.D. Theft is of the Local, No-Tech Variety
You have more control over identity theft than you think you do.
Are Schools Putting Your Child's Information at Risk?
It's become the norm for school districts to turn over sensitive student data to outside "cloud computing" companies, a practice that has ignited concerns about student privacy.
When Family and Friends Steal Your Identity
When identity fraud victims know their imposters, it can tear through both relationships and financial well-being.
Heartbleed: Why Changing Your Passwords Isn't Enough
If a phisher reeled in or bought information of yours – like emails, addresses or phone numbers -- compromised in the Heartbleed hack, what should you watch for?
The Top Problem With Identity Theft? Getting New Credit
After having your identity stolen, one of the biggest problems you’re likely to face is having trouble getting new loans or credit cards, because the thief has damaged your credit score.
ID Thieves Love Millennials. Here's Why
Even with nonstop social networking, 20-somethings can use these tips to avoid ID fraud.
Identity Thieves Can't Ignore Wealthy Targets
Identity thieves are following the money when it comes to selecting their next victim. Here's why the wealthy can be easy targets with big paydays.
6 Ways You're Unknowingly Compromising Your Identity
When it comes to protecting our identities, many of us are looking to play defense when we should be playing offense.
The Future of Crime: 8 Cyber-Crimes to Expect in Next 20 Years
Forget everything you think you know about crime. It will be obsolete in 20 years. Today’s criminals are limited by physical proximity, skill and daring. Future criminals won’t face any such restrictions. Get ready.
Who Goes to Jail for Fraudulent Credit Card Use?
Businesses that accept stolen credit card information may be on the hook for a refund. But the thief is the one who broke the law -- and cardholders need to take steps to prevent further damage.
Are We Finally Ready for EMV Cards?
Data breaches lead to a renewed push toward chip-enabled cards, but experts warn they are not the ultimate cure.
Identity Theft--By Bank Insiders
It’s the dirty secret in banking. Bank employees often steal personal account information from bank customers so as to rob money from bank accounts or commit fraud via identity theft, and few banks seem immune.
5 Steps You Can Take to Protect Your Bank Account
Phishing, scamming and stolen identity problems — we have all heard about them. But how do you ensure that you don’t become a victim?
Mobile Banking Threat on the Rise as Hackers 'Refine' Techniques
While the crackdown on digital currencies has helped thwart some major hard-crime operations, crime through Trojans to nab critical banking data nevertheless remains a problem.
Hackers Use Missing Malaysia Airlines Flight to Bait Users
Cyber scammers are exploiting intense interest in missing Malaysia Airlines Flight 370 to spread malicious malware aimed at attacking users.
BlackBerry Rallies on Pentagon Mobile Program
BlackBerry shares rallied after the Pentagon said its new mobile program for unclassified work will predominantly use the Canadian company's smartphones.
Beware the Cybermath
There is no escaping the reality that the consequences of cyber attacks are costly, on the rise, and uncomfortably cheap to conduct. It is more important than ever then for companies – especially at the C-suite level – to become knowledgeable cybersecurity consumers.
Scottrade Says Customer Database Compromised in Cyber Attack
Discount broker Scottrade said on Friday that it believes it was the victim of a cyber attack from late 2013 to early 2014 that targeted client names and addresses.
Hyatt Says Payment Processing Systems Breached
Hyatt Hotels Corp on Wednesday asked customers to review payment card statements for possible fraud after it found malicious software in its payment processing systems for hotels it manages.


















