New Search

If you are not happy with the results below please do another search

689 search results for: hackers

641

ATM Fraud Increases Identity Theft Risk

Robert Siciliano Identity Theft Expert A spate of recent news reports highlight growing ATM fraud. Law enforcement in New York City reported a gang had stolen $500,000 from bank accounts via ATM skimming. They installed cameras and skimming devices on the machines, and recorded the magnetic strips and the PIN numbers. A recent survey points…

643

Sarah Palin Victim of Social Media Identity Theft, LaRussa Drops Suit

Robert Siciliano Identity Theft Expert Since the beginning of the presidential campaign, Sarah Palin has used Twitter and Facebook to communicate with the public. Impostors have taken every opportunity to jack her persona, even hacking into her personal email account. Now, hackers and impostors are chiming in on Sarah Palin’s resignation. The Twitter profile for…

644

Identity Theft Credit Card Security

Robert Siciliano Identity Theft Expert Credit card fraud comes in two different flavors: account takeover and new account fraud. Account takeover occurs when the identity thief gains access to your credit or debit card number through criminal hacking, dumpster diving, ATM skimming, or perhaps you simply hand it over when paying at a store or…

645

TJX Identity Theft Costs Another 10 million, Protect Yourself from WarDriving

Robert Siciliano Identity Theft Expert Most people are familiar with the TJX data breach, in which 45 million credit card numbers were stolen. TJX recently agreed to pay $9.75 million to 41 states to settle an investigation of the massive data breach. According to some reports, TJX has spent up to $256 million attempting to…

646

mCrime; Hacking Mobile Phones for Identity Theft

Robert Siciliano Identity Theft Expert History indicates that we are at the forefront of an era in which criminal hackers develop tools and techniques to steal your money using your own cell phone. Fifteen years ago, cell phones were so bulky and cumbersome, they had to be carried in bags or briefcases. Then they became chunky,…

647

Typosquatting on Twitter and other social networks

Robert Siciliano Identity Theft Expert Typosquatting, which is also known as URL hijacking, is a form of cybersquatting that targets Internet users who accidentally type a website address into their web browser incorrectly. When users make a typographical error while entering the website address, they may be led to an alternative website owned by a cybersquatter. This…

648

Privacy Is Dead, Identity Theft Prospers

My information is in lots and lots of different places. I sacrifice a lot of privacy because of the nature of my business. If I wasnt so dependant on eyeballs I’d live much differently. However to participate in society on any level, privacy becomes a dead issue. Accept it. Or live in the jungle in…

649

P2P on Your PC Equals Identity Theft

Robert Siciliano Identity Theft Speaker Peer to peer file sharing is a great technology used to share data over peer networks.  It’s also great software to get hacked. The House Committee on Oversight and Government Reform is responding to reports that peer to peer file sharing allows Internet users to access other P2P users’ most important…

650

Perez Hilton is a Hater and Social Media Suffers

Robert Siciliano Identity Theft Expert I was on CNN this week and CNN also featured Perez Hilton, who was hired by Donald Trump, to judge a beauty contest and Hilton made hateful remarks about Miss Californias beliefs. Perez is a hateful sardonic celebrity critic, and his actions are parallel to others who rant and hate,…