Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: ID Theft

Forgot Your Password? books / prints 2013

Artist – Aram Bartholl: “In summer 2012 the social network LinkedIn.com got hacked and lost its whole user database. A few months later parts of the decrypted password list surfaced on the Internet. These eight volumes contain 4.7 million LinkedIn clear text user passwords printed in alphabetical order. Visitors are invited to look up their own password. 8… Continue Reading

Victims Of Identity Theft, 2012

“An estimated 16.6 million people, representing 7 percent of all persons age 16 or older in the United States, experienced at least one incident of identity theft in 2012, the Justice Department’s Bureau of Justice Statistics (BJS) announced today – in Victims of Identity Theft, 2012 (NCJ 243779), written by BJS statisticians Erika Harrell and Lynn Langton.… Continue Reading

2013 IT Trust Curve study

“The 2013 IT Trust Curve study surveyed 3,200 respondents to assess their organizations’ IT maturity levels and ability to withstand and quickly recover from disruptive incidents such as unplanned downtime, security breaches, and data loss…Today’s business environment is both ripe with opportunity and fraught with risk. This dichotomy is revealing itself in the world of… Continue Reading

TIGTA – IRS Full Compliance With Trusted Internet Connection Requirements Is Progressing

Full Compliance With Trusted Internet Connection Requirements Is Progressing; However, Improvements Would Strengthen Security. September 17, 2013. Reference Number: 2013-20-107. Treasury Inspector General for Tax Administration “The Trusted Internet Connection (TIC) initiative is one of the Administration’s three priorities to information improve cybersecurity and the security of Federal information systems. The TIC initiative aims to improve agencies’ security posture… Continue Reading

IRS Case Processing Delays and Tax Account Errors Increased Hardship for Victims of ID Theft

Treasury Inspector General for Tax Administration: Case Processing Delays and Tax Account Errors Increased Hardship for Victims of Identity Theft – September 26, 2013, Reference Number: 2013-40-129. “It took the Internal Revenue Service (IRS) an average of 312 days to resolve tax-related identity theft cases, according to a new report released by the Treasury Inspector… Continue Reading

NIST Releases Preliminary Cybersecurity Framework

Improving Critical Infrastructure Cybersecurity – Executive Order 13636 – Preliminary Cybersecurity Framework – November 1, 2013 [snipped] “The Framework Core is a set of cybersecurity activities and references that are common across critical infrastructure sectors organized around particular outcomes. The Core presents standards and best practices in a manner that allows for communication of cybersecurity risk across the organization… Continue Reading

CRS – Cybersecurity: Authoritative Reports and Resources

Cybersecurity:  Authoritative Reports and Resources – Rita Tehan, Information Research Specialist. October 25, 2013 “Cybersecurity is a sprawling topic that includes national, international, government, and private  industry dimensions. In the 113th Congress, 5 bills have been introduced in the Senate and 7 in the House. More than 40 bills and resolutions with provisions related to cybersecurity were introduced in… Continue Reading

Phishing Activity Trends Report – 1st Qtr 2013

“The APWG Phishing Activity Trends Report [published July 23, 2013] analyzes phishing attacks reported to the APWG by its member companies, its Global Research Partners, through the organization’s website, and by e-mail submissions to [email protected]. APWG also measures the evolution, proliferation , and propagation of crimeware by drawing from the research of our member companies.… Continue Reading

Five indicted in NJ for largest known data breach conspiracy

News release: “A federal indictment made public today in New Jersey charges five men with conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole more than 160 million credit card numbers, resulted in hundreds of millions of dollars in losses and is the largest such scheme ever prosecuted in… Continue Reading

FTC Issues Revised Business Guide on ‘Red Flags’ Identity Theft Rule

News release: “The Federal Trade Commission has issued revised guidance designed to help businesses comply with the requirements of the Red Flags Rule, which protects consumers by requiring businesses to watch for and respond to warning signs or “red flags” of identity theft. The guidance outlines which businesses – financial institutions and some creditors –… Continue Reading

EFF – How to Enable Two-Factor Authentication on Twitter (And Everywhere Else)

EFF, Parker Higgins: “Twitter rolled out two-factor authentication last week, joining a growing group of tech companies to support the important security feature. Two-factor authentication can help mitigate the damage of a password breach or phishing attack…Twitter has named its two-factor authentication system “Login Verification,” and its announcement provides a straightforward guide on how and why to use… Continue Reading