Privacy & Identity Protection

Whether you prefer to explore online, on foot, or both. Read up on how to protect your privacy, identity and data.

Most Unwanted Criminals: Phishers, Shoulder Surfers and Keyloggers
McAfee’s most unwanted criminals have included pickpockets, Trojan viruses, and ATM skimmers, dumpster divers, spies, and wireless...
Lawmakers Push To Shield Last 4 Social Security Numbers
Most of us have become accustomed to giving out the last four digits of our Social Security...
Spyware A Major Identity Theft Threat
Spyware is sold legally in the United States. This software records chats, emails, browsing history, usernames, passwords,...
7 Types of Hacker Motivations
There are good and bad hackers. Here is a window into what they do and why: White...
Social Security Numbers Easily Cracked
It is easier than ever to guess or predict an individual’s Social Security number, which puts us...
Lost or Stolen Mobile Devices Can Lead to Identity Theft
We lose stuff. You put something down, you get distracted, you forget about it and it’s gone....
The 6 Types of Identity Theft
#1 New Account Fraud Using another’s personal identifying information to obtain products and services using that person’s...
Data Privacy Day
This is a critical time for our personal security as it relates to privacy and personal information....
Hacking Wireless for Identity Theft
The ability to connect wirelessly has a lot to do with the indispensability of the Internet in...
IRS Fully Reliant on Social Security Numbers
On the Policy, Practice & Procedures page of their website, the IRS addresses the public’s concern regarding...
529 - 538 of 538
Back to top