Identity Theft

Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held responsible for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
Posts about Identity Theft
  • Chipotle malware attack exposed customers’ card info

    … Recently, restaurant chain Chipotle announced they experienced a massive data breach that affected numerous locations nationwide. If you visited the restaurant between March 24 and April 18 of this year and paid with a debit or credit card, the odds are that your card information has been exposed to hackers and identity thieves. This is just…

    Greg's Corner- 21 readers -
  • Cloud connected child’s toy leads to personal data breach

    … Cloud connected child’s toy leads to personal data breach As seen on TV toy CloudPets is actually a pretty clever concept. By using a smart phone app a traveling parent or a relative that lives far away can leave a voice message to a child on one of the stuffed animals. Except there’s that one inherent problem that affects any device connected…

    Greg's Corner- 16 readers -
  • Google ad for Amazon was actually link to scam site

    … Google ad for Amazon was actually link to scam site Many tech news sites are reporting that there was a false ad for Amazon this past week when you searched for the retail giant on Google. The ad, that would come first in the search results, did not take you to Amazon, but instead took to you to a site that tried to perpetrate a tech support…

    Greg's Cornerin Google- 29 readers -
  • Why hackers want your kids’ accounts

    … Why hackers want your kids’ accounts We’re used to hearing about companies being hacked and personal information being stolen. Usually it’s a tech monolith like Yahoo or a retail giant like Target. However, it seems that some hackers are targeting sites and services used by children. Popular Mechanics has reported that children’s sites like V…

    Greg's Corner- 11 readers -
  • The MySpace hack could cost you

    … The MySpace hack could cost you Do you remember MySpace? You know, the sparkly animated background plagued social network of the mid 2000s. Admit it, you had one but you abandoned it after the advent of Facebook. Recently it was made public that the former king of the social networking world had been hacked and hundreds of millions of usernames…

    Greg's Corner- 9 readers -
  • Are Breaches Possible with Credit Card Readers?

    …. This can be difficult as most large stores offer free Wi-Fi for customers. It is a far better idea to restrict internet service in-store, but provide it outside the store to keep customers happy. If you do require wireless access, create a secure VPN and then configure the VPN on all devices to be used with the POS system. Make sure employees never…

    Dana Davis/ Growmap- 5 readers -
  • Why Google Analytics’ User Metrics Are BS [For Most Sites]

    … != me. Therefore, my girls can borrow my car without risk of being arrested for identity theft. Likewise, your client is a vehicle you, the user, use to get to a site. It’s not you. The problem with user-based KPIs in Google Analytics is they measure license plates, not social security numbers. Let’s Do an Experiment My devices: I have two laptops…

    Annie Cushing/ Annielyticsin Google Facebook- 18 readers -
  • Broken Link Building Bible: The New Testament

    …, Domain Hunter Plus, or BrokenLinkBuilding.com. Let's jump in. Table of contents Ethical Guidelines Content Commandments Cloaking Plagiarizing Bait & Switch Identity Theft Outreach Commandments Automation Unrelated Misrepresentation Conclusions Advanced Prospecting Section Discovery Site Discovery Advanced Content Panda Guidelines Publish Date…

    Moz Blogin SEO- 44 readers -
Get the top posts daily into your mailbox!
More from around the web