It's something that happens to everyone: you're checking your e-mail and a message catches your eye. It says it's urgent and it seems to come from a company or person you think you know, so you open the message. It tells you there's a problem with your account and to use a link provided in the message to fix the problem. If you click it, it goes to a page that looks right, but how can you really be sure? How do you tell which e-mails are safe and legitimate from the ones that are looking to steal your information or, worse, money?
This Common IT Policy Makes Your Organization Less Secure
Some time-tested IT policies are as true today as they were two decades ago, but this IT policy needs to stay in yesteryear.
How Your Social Media Accounts Make Identity Theft Easier (Part 2)
We often think of cyber-crime as the domain of elite hackers, but you may be surprised to learn that hackers often need not look past public data on social media accounts to compromise an identity.
Did A Facebook Bug Share Your Photos Without Your Consent?
Facebook has acknowledged a bug affecting 6.8 million users that gave Apps and their developers unauthorized access to Facebook user photos and uploads. Was yours one of them?
How Your Social Media Accounts Make Identity Theft Easier (Part 1)
Social media can be a powerful tool for staying in touch with friends and family or keeping up with current events, but how can the information we post on social media be used to help fraudsters steal our identity?
Do I Really Need a Lock Screen on My Phone?
If you look at your smartphone and wonder, "why do I need to have a PIN code or registered fingerprint to unlock this phone? Why do I need to unlock it at all?" Here's why.
4 Tips for Securing Your Social Media Accounts
When you think about identity theft, a few things probably come to mind immediately: social security numbers, credit reports, and your financial accounts. Often overlooked, though, are social media accounts, which are an increasingly popular target for online hackers and fraudsters.