security breach

Here are the top 10 major identity theft cases of last year that tufitech took a look at: Date: February 2016 Compromised
No payment card or banking information was compromised in the latest 1 billion-user breach at Yahoo, according to expert reports. But what if there had been? The truth is that for most users it would be annoying, but not the end of the world. So, why is this big news?
It's also worthwhile to consider signing up for an identity theft protection service. While these services cannot prevent
October is National Cyber Security Awareness Month, and it's off to a pretty dismal start. Following the Experian breach announcement on Oct. 2 that affected 15 million T-Mobile customers, retail brokerage Scottrade announced it had discovered a breach in one of its systems.
If you've applied for a T-Mobile phone plan within the past two years, there's a high chance your information may have been breached by Experian -- one of the three major credit bureaus.
Whether you are a part of the database or not, this hack could affect you. Millions of e-mail addresses, home addresses, credit cards and other information are contained within the leaked database.
The Sony Hack was not even one of the ten largest hacks of 2014. Though large, it actually only ranks as the 33rd largest of the year in terms of number of records breached. EBay actually suffered the largest data breach of 2014 (and the second largest since 2005) with more than 150 million records compromised.
Your most sensitive emails, text messages, photos and videos could be used to hurt your reputation, humiliate and embarrass you, and even try to force you to pay up in order to kill the threat.
The campaign to stop cyber-crime begins with educating the next wave of professionals, but ongoing education and idea exchange are the ultimate keys to confronting cybercrime on the ground and in the boardroom.
The days when companies could afford to focus inward during a crisis and wordsmith press releases are gone. This time, Home Depot's mistakes won't cause an immediate customer revolt, but those mistakes did tarnish the brand in the most subtle of ways.
I believe relatively soon we will all agree -- and write into national law -- that PII includes more than your Social Security number, and that name, address and ZIP should be not be shared on media sources or other public forums without extreme cause. T
U.S. attorneys general have launched a multi-state investigation into a breach in which criminals gained access to a repository of some 200 million social security numbers through a unit of data provider Experian Plc.
During his trial the companies were represented by lawyers who did not identify their clients as Target and J.C Penney. Yet
Luckily, the paranoia-inducing infographic below will whip you into shape, stat. Find out how hackers gain access to your
You can be standing next to the wrong person on a bus and get the flu, and when your data is sitting on the wrong database and the wrong person gains access, you become a victim of identity theft.
Ask the "how" and the "why" questions. Be indignant. Most importantly, ask what you can do to preserve our privacy rights in the future.
An identity thief can make life very difficult for you. As the hacks of the New York Times and Twitter prove, it's only a matter of time. And how can anyone in their right mind "Like" that?
Andrew Valentine wrote up the case study for Verizon, and the story apparently caused such a furor it temporarily crashed