Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: ID Theft

Proposed Rulemaking – IRS Truncated Taxpayer Identification Numbers

“This document contains proposed regulations that create a new taxpayer identifying number known as an IRS truncated taxpayer identification number, a TTIN. As an alternative to using a social security number (SSN), IRS individual taxpayer identification number (ITIN), or IRS adoption taxpayer identification number (ATIN), the filer of certain information returns may use a TTIN… Continue Reading

Hacker Intelligence Initiative, Monthly Trend Report #13

Monitoring Hacker Forums ADC Monthly Web Attacks Analysis, October 2012: “Imperva analyzed one of the largest-known hacker forums with roughly 250,000 members, as well as other smaller forums. Using search capabilities, we analyzed conversations by topic using specific keywords. We found: SQL injection is now tied with DDoS as the most discussed topic. Both topics… Continue Reading

nCircle Security Tips eBook

“As part of nCircle’s commitment to improving Internet security, we asked some of the brightest minds in security to help us compile a list of security tips and tricks for a wide range of readers. The resulting eBook includes a wide range of topics — from passwords and public Wi-Fi to Java configuration and sandboxing… Continue Reading

New GAO Report – Mobile Device Location Data

Mobile Device Location Data – Additional Federal Actions Could Help Protect Consumer Privacy, GAO-12-903, Sep 11, 2012 “Using several methods of varying precision, mobile industry companies collect location data and use or share that data to provide users with location-based services, offer improved services, and increase revenue through targeted advertising. Location-based services provide consumers access… Continue Reading

Industrial Control Systems Cyber Emergency Response Team Report

“The Department of Homeland Security (DHS) Control Systems Security Program manages and operates the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) to provide focused operational capabilities for defense of control system environments against emerging cyber threats…This report provides a summary of cyber incidents, onsite deployments, and associated findings from the time ICS-CERT was established… Continue Reading

FTC Advises Consumers on What to Do if Their Identity is Stolen

“The Federal Trade Commission, the nation’s consumer protection agency, offers updated information explaining how to protect your child’s information and your own, and the immediate steps to take to limit the damage identity theft can cause. Taking Charge: What To Do If Your Identity Is Stolen is a step-by-step guide that includes sample letters, forms… Continue Reading

Check Point Survey Reveals a Generation Gap in Computer Security

News release: “Check Point® Software Technologies Ltd…announced the results of a new ZoneAlarm report revealing differences in the use of computer security between Gen Y and Baby Boomers. The report, The Generation Gap in Computer Security, found that Gen Y is more confident in its security knowledge than Baby Boomers. However, 50 percent of Gen… Continue Reading

Principles for Voluntary Efforts to Reduce the Impact of Botnets in Cyberspace

Industry Botnet Group Principles for Voluntary Efforts to Reduce the Impact of Botnets in Cyberspace “The proliferation of botnets and malware in cyberspace threatens to undermine the efficiencies, innovation, and economic growth of the Internet and diminishes the trust and confidence of online users. Every participant has a role in helping to reduce the impact… Continue Reading

CRS: Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and – Resources, Rita Tehan Information Research Specialist, April 26, 2012 “Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or… Continue Reading