We are currently looking for an Official SelfGrowth.com Guide to "Identity Theft". If you have expertise in Identity Theft and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
Mass shootings. They happen so often these days, they are hardly making headlines, and when they do, they are soon pushed out of the news cycle thanks to what’s going on in the White House or in Russia. There are many red flags that show what crazy mass shooters look like.
Look at ... Views: 812
Social Security numbers and credit card numbers are not the only types of data that hackers are after. Now, they are looking at frequent flyer accounts, and they are stealing reward miles, and then selling them online.
How do Hackers Steal Frequent Flyer Miles?
As with other types of ID ... Views: 816
As California goes, so does the rest of the country. While the California Consumer Privacy Act (CCPA), which was passed this summer and goes into effect in 2020, falls short of being an “American GDPR,” it clearly tore many pages from the far-reaching European data privacy law. Similar to the ... Views: 1064
You probably have a few usernames, or you might have just one that you use for every site. Either way, your user names can be used not just to identify you online, but it can also be used to track you and find out information about you. How do people track you based on your user name? They do ... Views: 717
Eddie Leal, 23, was an up-and-coming professional boxer who gave free boxing lessons in his garage to down-and-out neighborhood teens. He was a good guy. And like most young men, was looking for a girlfriend.
One day he saw that a young woman, Rebecca Santhiago, was asking for a friend ... Views: 747
While digital currencies, particularly bitcoin, are the most common and well-known application of blockchain technology, they are far from being the sole or even the most important use. Blockchain is one of the most important technological advancements of the digital age, and its full potential ... Views: 1369
You have probably heard that it’s important to be prepared for a disaster. You might have a first aid kit set aside, food and water, or a battery-operated radio. But, are you financially prepared?
Creating an Emergency Fund
It might be tough but try to set aside some money a little at ... Views: 592
If only. But that’ll never be.
Brandi Hicks, 17, and her high school friend, Liz Reiser, exited a video store at 9:30 pm, where they were approached by Matthew Vaca, a creepy acting stranger.
He asked them for a ride to his house. At first they refused, but then he offered $20 for gas. ... Views: 749
The holiday season is fast approaching, but hackers don’t take vacations. Whether you’re planning to go home for the holidays or travel for business on a regular basis, make sure to protect yourself from cyber crime with these cyber security travel tips.
Update Your OS & Software
Before ... Views: 1212
Who does this?
Morna Brennen did this when she was 22. She and a few friends went to a bar and stayed there late.
At some point while they were there, a man took an interest in Morna. But she was creeped out by him and pretty much ignored him.
Later when it was time to leave, Morna and one ... Views: 1063
Lois Riess is a woman from Minnesota who police say shot her husband, went on the run, and then killed a woman in order to take on her identity. Here are some shocking facts about her:
Riess Looked Like her Victim
The woman Lois Riess killed, Pamela Hutchinson, looked like her. This is why ... Views: 600
Have you ever used Facebook to sign onto another site? Many of us do this pretty blindly simply because it is very convenient. But, this convenience could come at a cost.
You know the drill. You go to a website and it says “Log In With Facebook.” or Google. Usually, it just takes ... Views: 607
You have a mobile phone, you might think it’s pretty safe, but what you might not realize is that these devices can have spyware on them. Keep in mind, many of the “signs” listed below are everyday normal phone behaviors. But combined, might mean spyware. Here are some of the ... Views: 680
Where should you live in the world? What Game of Thrones family are you in? What is the food that best describes your personality? All of these answers are given and found by doing quizzes on Facebook. You have surely seen them if you use Facebook, and have may have taken these quizzes, but you ... Views: 589
In 1996, a 12-year-old Washington state girl was raped and murdered. However, it wasn’t until June 2018, that an arrest was made in the case. How did this happen? DNA technology.
The man arrested is Gary Hartman, and he is accused of killing and raping 12-year old Michella Welch. Donald ... Views: 665
Citing the success of its cybersecurity framework and the advent of IoT devices, artificial intelligence, and other technologies that are making it more challenging than ever for enterprises to protect their customers’ privacy, NIST has launched a collaborative project to develop a voluntary ... Views: 910
When is the last time you checked your credit report? If it has been more than a year, you can get a free one. The issue is, however, is how to really understand it. Here’s some information about obtaining and reading your credit report.
Obtaining Your Free Credit Report
Based on US ... Views: 579
If you are thinking of jumping onto the Bitcoin bandwagon, or any type of cryptocurrency, you have to make sure that you are watching out for scams. There are a ton of them out there, including the following:
Fake Bitcoin Exchanges
You have to use a Bitcoin exchange if you want to buy or ... Views: 781
There is a new Social Security scam in the news, and you should definitely know about it. The Acting Inspector General of Social Security, released a statement that warns people of this new scheme. Basically, scammers are impersonating Social Security Administration employees.
The scam ... Views: 684
Javelin Strategy & Research recently released its Identity Fraud Study, and it revealed that the number of identity theft victims rose by 8% in 2017 when compared to 2016. That’s almost 17 million people, which is a record high. Despite more information and industry efforts to make ... Views: 644
When it comes to background checks, the National Crime Information Center is the gold standard. It is only available to law enforcement agencies and is the most accurate and complete database tracking convictions and arrests in the US. That sounds pretty great, right? Unfortunately, it’s ... Views: 691
Cyber criminals are constantly trying to stay one step ahead of the good guys, and there is now another scam out there that you should know about: synthetic identity theft. Basically, the criminals take information from someone, and then make up the rest. They also often use fake Social Security ... Views: 683
The competition among the numerous companies that make up the notch of every business endeavor calls for a mechanism that will protect the interests of the company from predators that are out to steal valuable information from their rivals. There should be as a matter of fact the availability of ... Views: 1015
It seems like 2017 broke records for all the wrong reasons…one of them being the worst year for data breaches in history.
According to reports, hacking was the most common way to collect this data, but almost 70% of exposures occurred due to accidental leaks or human error. This came ... Views: 732
There are more connected devices than there are humans on Earth. Organizations have been as quick to embrace the Internet of Things as consumers have, and the healthcare industry is no exception. Medical IoT devices have exploded in popularity and grown in complexity. Smart medical devices allow ... Views: 973
You have probably heard the story before. Teenage girl takes some scantily clad photos and sends them to her latest boyfriend. “What could go wrong?,” she thinks. Well, a lot could go wrong, and an article on Vice.com really lays that out. You might think that the boyfriend is ... Views: 1046
Do you have children? How do you talk to them when something like a mass shooting happens? What about a robbery in your neighborhood? Do you talk about nuclear weapons? If you are like most parents, you don’t know where to start. Here’s 10 tips that you can use to talk to your kids ... Views: 696
According to the Wi-Fi Alliance, there are now more IoT devices than there are humans on Earth, and over 50% of internet traffic travels through wireless networks. As people’s dependence on connected devices has grown, free public WiFi has become insanely popular, but it’s also insanely ... Views: 929
Once a luxury item, free public WiFi has morphed into a standard service that consumers expect when patronizing everything from restaurants and retail stores to airports and hotels. Free WiFi users aren’t just checking Facebook or posting vacation photos to Instagram, either; all of us have sat ... Views: 1031
Criminals have a reliance on tricking victims to get access to account information, like passwords. This is known as social engineering, and is also called a “confidence crime.” These come in many forms:
Do Not Take the Bait of These Phishermen
A phishing email that targets a ... Views: 604
Cyber security is a continuous game of Spy vs. Spy. Every time a new technology is introduced, the potential attack surface expands. The moment one vulnerability is patched, hackers find another way in. Keeping up can feel overwhelming, even for security professionals.
In no particular order, ... Views: 847
Though it would be nice to think that you can fix something if you make a mistake, there are some where there is just no going back. And in some cases, these mistakes can be tragic. Here are some of the biggest mistakes that people make with their home security:
Leaving Doors Unlocked ... Views: 862
Hackers are out there, and they have their eyes on YOU! So, you are the first line of defense against them. Do you know how to make your smart phone or computer more difficult for hackers to access? Here’s five tips to help:
Password Information
You would think that these days, ... Views: 647
Global losses from business email compromise scams, a highly sophisticated form of phishing, grew by 136% between December 2016 and May 2018 and now exceed $12 billion, according to a public service announcement released by the FBI.
What Is a Business Email Compromise Scam?
A business ... Views: 946
For the most part, the local police department does not prevent most assaults or burglaries. That would require a cop to be everywhere all at once. Not happening. However, they do their best to capture and arrest those who commit these crimes. And, preventing crimes goes way beyond getting a ... Views: 668
The recent Exactis data leak, which could surpass Equifax in the sheer number and scope of records exposed, has data privacy advocates calling for an “American GDPR.” While it is unlikely that a federal data privacy law will come to pass anytime soon, some states have already taken matters into ... Views: 964
Last week’s data leak at Exactis, a Florida-based marketing and data aggregation firm, has cyber security experts and data privacy advocates up in arms. WIRED reports:
Earlier this month, security researcher Vinny Troia discovered that Exactis, a data broker based in Palm Coast, Florida, had ... Views: 972
When is the last time you thought about the safety and security of your home? How about thinking about it right now? Do you do the following? If not, start, today:
Do you have propane tanks for a gas grill? Or gasoline cans with gas in them? They aren’t supposed to be stored inside. ... Views: 902
Even if you have the best security on your computer network, you might have noticed that you still seem to get hacked…or worse. Ask Equifax. Why is this happening? It’s probably because a member of your staff has made it easy for cyber criminals to get inside. It’s really ... Views: 692
What do you do if you have a “Plan A” for survival, but you realize that it’s a bad plan. Do you have a “Plan B?”
Forget about doing things like running to the grocery store right before the snow storm of the century hits. Everyone else in your town or city will ... Views: 743
You might not think about this, but identity thieves really want your child’s Social Security number. If they get this number, they can do a lot, including buying a car, renting an apartment, opening a credit card account, or getting a mortgage. The Social Security numbers of children are ... Views: 1157
How to Boost Your Digital Security for Peace of Mind
From the recent Facebook data breach to compromised customer data at huge companies like FedEx and Delta, personal security is more relevant than ever.
In fact, it might even seem that our data is under attack!
While you can’t ... Views: 1212
With just over three weeks to go until the May 25, 2018, deadline, many U.S. companies are woefully unprepared for the EU’s new General Data Protection Regulation, or GDPR. In fact, quite a few of them don’t yet realize they have to achieve GDPR compliance. A new survey by CompTIA found that “A ... Views: 924
Social media is an excellent tool for small businesses, yet, the use of social media by small business staff can definitely put the company in danger. Many small business owners and managers don’t realize this.
Recently, I was talking to employees of a credit union about what to do in a ... Views: 703
Do you have a secret self-defense weapon on hand that you don’t even know about?
Here’s a few:
Canes. Might seem obvious…but…
Your first instinct would probably be to swing the cane like a baseball bat. However, this isn’t the best way. An attacker can easily ... Views: 774
All of us have cell phones these days, and if you are like the vast majority of the population, you access everything from social media to banking information right from your mobile phone. However, if you do this, which everyone does, you are putting yourself in the position to get hacked. With ... Views: 704
How many internet-connected devices do you have in your home? Do some of them have cameras?
How many different computers, phones, and smart devices can track your location?
Which social media websites have recorded your personal information? How many of your followers know where you ... Views: 1142
If you are like most people, you probably haven’t done a lot of thinking about what you would do in a situation involving physical assault. Why would you? I mean, it’s unpleasant and scary. Further, depending on your physical makeup, you may think you’d probably lose anyway. ... Views: 767
If you are working for an IT security company, I have a message for you: the term “identity theft protection” is way overused and even abused as a marketing term. We know that this term is used to sell services and products, but does it really protect a user from being the victim of ... Views: 722
Last week, athletic apparel manufacturer Under Armour announced that its popular MyFitnessPal weight loss and fitness tracking app had been hacked, compromising 150 million accounts. The Under Armour breach is the largest data breach so far this year and ranks among the top five to date. It also ... Views: 1117