Similar Articles |
|
PC Magazine June 5, 2008 |
Malware Everywhere Malicious software attacks, including Trojan horses, bots, and rootkits, are rising at the fastest rate ever. |
Information Today September 23, 2014 |
LexisNexis Introduces Identity Challenges Resource LexisNexis Risk Solutions created a thought leadership platform to educate government agencies and officials about solutions to their identity challenges. |
Entrepreneur August 2007 Jacquelyn Lynn |
Small Business Owners Risk Identity Theft Insuring your identity makes it easier to get it back. |
PC Magazine May 1, 2009 Matthew D. Sarrel |
Identity Theft: It's Out of Your Hands The most important thing you have is you, right? And online, you are your identity. If xyz.com doesn't value you enough to keep you safe, then does that company really deserve your business? |
PC Magazine February 15, 2006 Robert Lemos |
Caught by Phish Falling prey to online identity theft takes only a few minutes, but the cost can be high. |
PC World January 2002 Steve Bass |
Wily Tricks to Thwart E-Thieves Keep your money -- and your identity -- safe while you're on the Web... |
Inc. August 2003 Robert X. Cringely |
They've Got Your Number Identity theft using a combination of computer technology and government information is a major crime just waiting to happen. |
The Motley Fool June 13, 2011 Arunava De |
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. |
CRM December 2013 Ray Wang |
Why the Battle for Identity Will Affect Customer Experience Merging identities across environments is no easy task. Facebook, Google, and Twitter dominate most social log-ins. Users expect their identity to be transportable from personal to work environments. These implications carry over to customer experience. |
CIO August 1, 2005 Grant Gross |
VoIP Security Debate Heats Up Voice over IP (VoIP) telephony and malicious software for mobile devices are among the most-hyped IT security threats, according to Gartner. |
InternetNews July 19, 2007 Roy Mark |
DoJ Sends ID Theft Bill to Congress The Bush administration sent proposed legislation to Congress today that aims to update and improve federal identity theft laws. |
OCC Bulletin September 8, 2004 |
FFIEC Customer Brochure To assist depository institutions' efforts in raising customer awareness of identity theft and similar crimes, "Protecting Customers' Personal Financial Information" outlines steps bank customers should take to reduce the risk of identity theft. |
InternetNews March 19, 2007 Andy Patrizio |
What's a New Identity Cost? Less Than a CD. Symantec probes the identity-trading underground and finds personal IDs selling for $14. |
Salon.com October 2, 2001 Katharine Mieszkowski |
Wanted: Your name and number The hijackers in the terrorist attacks were masters of identity theft. Now lawmakers are worried about copycat persona stealing... |
PC Magazine June 20, 2008 Larry Seltzer |
Hacked Through the Heart Even medical gadgetry is subject to outside hacking. |
PC Magazine March 20, 2009 Matthew D. Sarrel |
I Stole My Friend's Identity If you've not yet jumped into the great abyss of social networking, then you haven't created any accounts that can be compromised, and you're safe, right? Not! |
InternetNews October 28, 2008 Richard Adhikari |
Yahoo Tightens HotJobs After Hackers Hit In a move that could have saved thousands of potential victims of identity theft, Yahoo techs have fixed a flaw in it's HotJobs Web site, one of the leading online job sites with thousands of subscribers. |
InternetNews April 23, 2010 |
SMBs Often a Weak Link in Cyber Security Lax data security and a lack of resources could be exposing small and midsized businesses - and their customers - to risk. |
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. |
The Motley Fool October 21, 2004 Tom Taulli |
Our Money, Our Lost Identities There are many threats to our pocketbooks in the online world. Entrust's plan to put a stop to it can have a big impact for e-commerce. The company posted revenues of $21.3 million, which was a 6% increase from the same period a year ago. |
The Motley Fool February 23, 2007 Mary Dalrymple |
Hassled to the Maxx The identity theft saga involving T.J. Maxx continues: Consumers need to be on the lookout for evidence that their identity, credit card, or debit card information has slipped into the wrong hands. |
InternetNews August 25, 2005 Clint Boulton |
China Sites Said Behind U.S. Network Attacks Report says the latest spate of attacks from China-based sites on U.S. government networks raises new concerns. But one analyst wonders about the alarm. |
InternetNews May 20, 2010 |
Novell Offers Cloud-Based Identity Manager With this new release, Novell's identity management tools/framework cover the move of services and identity floating in the clouds, and more tools for access and security on the way. |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. |
Bank Technology News April 2009 Rebecca Sausner |
Compliance, IAM Top Security Plans Security regulatory compliance and identity and access management were the top two security initiatives in financial services in 2008, just as they were the year before. |
InternetNews January 29, 2007 Michael Hickins |
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. |
InternetNews April 23, 2007 Roy Mark |
A New Fight Against ID Theft Improved cyber security, increased law enforcement and public education top the recommendations of President Bush's Identity Theft Task Force plan issued today. |
AskMen.com Michael Hirsch |
How To: Deal With Identity Theft You probably don't think about it, but transactions you take for granted every day put you at risk for identity theft. |
CRM September 7, 2012 Dale Dabbs |
Protect Your Most Valuable Business Assets--Your Customers Optimal CRM incorporates data protection best practices to curtail identity theft. |
InternetNews February 27, 2006 Clint Boulton |
Manage Your Own Identity Online Companies like Microsoft join Harvard in the Higgins Project, which is designed to help people control their identity info online. |
The Motley Fool June 16, 2005 Tim Beyers |
Hackers Aim for AIM Is instant messaging really that safe? Not so much. The startling lack of IM shielding from major vendors such as Symantec and McAfee has left many users vulnerable. |
InternetNews January 12, 2009 Richard Adhikari |
Vendors See More DLP with ID Management CA's recent acquisition is a sign of more product adds to come. |
PC Magazine October 28, 2003 Sebastian Rupley |
Lock 'Em Out Take steps to protect yourself from identity theft. |
T.H.E. Journal May 2005 |
Microsoft Launches `Web Watchers' Initiative With High-Tech Partners This program provides educators with age- and curriculum-appropriate lessons that will help students understand the opportunities and risks of the Internet, including how to avoid installation of malicious software and how to protect their online identity. |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
InternetNews February 12, 2010 |
Study Puts Identity Theft Cost at $54B in 2009 Research firm Javelin estimates that more than 11 million Americans were victims of identity theft last year, a 12 percent increase that led to tens of billions of dollars in costs. |
InternetNews September 15, 2008 Richard Adhikari |
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. |
InternetNews July 5, 2005 Roy Mark |
Finance Firms To Give FTC ID Theft Data The financial services industry is pooling its own data on identity theft victims with the Federal Trade Commission and law enforcement groups. |
Knowledge@Wharton May 21, 2003 |
Ignoring Your Corporate Identity Can Sabotage Strategic Change Identity is a crucial component of all firms, but it often goes ignored until a crisis forces a company to confront change. |
PC Magazine November 29, 2006 Robert Lemos |
Hacking for Dollars Viruses and worms are so last-decade. Today's PC users have to worry more about online burglary than stolen bandwidth. |
Search Engine Watch April 14, 2011 Kristine Schachinger |
3 Website Exploits - Are You Protected? Examining three common attacks that can hurt your visitors and rankings, and tips on how to prevent your site from being hacked. |
InternetNews December 30, 2004 Tim Gray |
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. |
Inc. March 2007 |
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. |
Bank Technology News February 2005 Holly Sraeel |
Hot on the ID Theft Trail: Will the Real Jane Doe Stand Up? Welcome to the world of identity theft, where the snatch of an individual's social security number begins that unsuspecting individual's downward financial spiral. |
InternetNews September 18, 2009 |
Hackers Hit 'Curious George' on PBS Web Site Malicious code aimed to infect visitors to the site. |
InternetNews February 20, 2008 Larry Barrett |
Can Oracle's Identity Manager Tackle Compliance? Oracle on Wednesday announced the release of the latest version of its Identity Manager software, a key security and access management component of its Fusion middleware platform. |
Bank Systems & Technology March 7, 2005 Cynthia Ramsaran |
ID Theft Hits Paper Harder Despite growing fears of online fraud related to Web-based banking services, the increase in identity theft is hitting consumers closer to home than in cyberspace. Identity theft crimes are more often committed off-line rather than online. |
PC World October 2002 Anne Kandra |
Don't Let Them Steal Your Good Name Identity theft is skyrocketing -- and it's even being used to fund terrorism. The Web can be a real boon for identity thieves, helping them find information about victims and profit from the crime. |
Bank Systems & Technology July 12, 2007 Larry Greenemeier |
Link Between Data Breaches And ID Theft Unclear, GAO Reports A U.S. Government Accountability Office report indicates that while the amount of information lost or stolen is disturbing, it's difficult to prove that these breaches lead to identity theft. |
Bank Systems & Technology April 7, 2006 Peggy Bresnick Kendler |
Security Outlook A plethora of high-profile data breaches and concerns about identity theft have put the banking industry on high alert. To secure their information assets, banks must implement a cross-channel, multilayered approach that extends beyond technology. |