Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: ID Theft

2013 Data Breach Investigations Report

“Verizon’’s 2013 Data Breach Investigations Report (DBIR) provides truly global insights into the nature of data breaches that can help organizations of all sizes to better understand the threat and take the necessary steps to protect themselves. The breadth and depth of data represented in this year’s DBIR is unprecedented. It combines the efforts of… Continue Reading

IRS Releases the Dirty Dozen Tax Scams for 2013

News release: “The Internal Revenue Service…issued its annual “Dirty Dozen” list of tax scams, reminding taxpayers to use caution during tax season to protect themselves against a wide range of schemes ranging from identity theft to return preparer fraud. The Dirty Dozen listing, compiled by the IRS each year, lists a variety of common scams… Continue Reading

FTC Releases Top 10 Complaint Categories for 2012

Identity Theft Tops List for 13th Consecutive Year in Report of National Consumer Complaints “Identity theft is once more the top complaint received by the Federal Trade Commission, which has released its 2012 annual report of complaints. 2012 marks the first year in which the FTC received more than 2 million complaints overall, and 369,132,… Continue Reading

Mandiant Exposes APT1 – One of China’s Cyber Espionage Units & Releases 3,000 Indicators

By Dan Mcwhorter on February 18, 2013 -“Today, The Mandiant® Intelligence Center™ released an unprecedented report exposing APT1′s multi-year, enterprise-scale computer espionage campaign.  APT1 is one of dozens of threat groups Mandiant tracks around the world and we consider it to be one of the most prolific in terms of the sheer quantity of information it has stolen. Highlights… Continue Reading

"Carnegie Mellon researchers devise grammar-aware password cracker"

News release: “When writing or speaking, good grammar helps people make themselves be understood. But when used to concoct a long computer password, grammar — good or bad — provides crucial hints that can help someone crack that password, researchers at Carnegie Mellon University have demonstrated. A team led by Ashwini Rao, a software engineering… Continue Reading

Proposed Rulemaking – IRS Truncated Taxpayer Identification Numbers

“This document contains proposed regulations that create a new taxpayer identifying number known as an IRS truncated taxpayer identification number, a TTIN. As an alternative to using a social security number (SSN), IRS individual taxpayer identification number (ITIN), or IRS adoption taxpayer identification number (ATIN), the filer of certain information returns may use a TTIN… Continue Reading

Hacker Intelligence Initiative, Monthly Trend Report #13

Monitoring Hacker Forums ADC Monthly Web Attacks Analysis, October 2012: “Imperva analyzed one of the largest-known hacker forums with roughly 250,000 members, as well as other smaller forums. Using search capabilities, we analyzed conversations by topic using specific keywords. We found: SQL injection is now tied with DDoS as the most discussed topic. Both topics… Continue Reading

nCircle Security Tips eBook

“As part of nCircle’s commitment to improving Internet security, we asked some of the brightest minds in security to help us compile a list of security tips and tricks for a wide range of readers. The resulting eBook includes a wide range of topics — from passwords and public Wi-Fi to Java configuration and sandboxing… Continue Reading

New GAO Report – Mobile Device Location Data

Mobile Device Location Data – Additional Federal Actions Could Help Protect Consumer Privacy, GAO-12-903, Sep 11, 2012 “Using several methods of varying precision, mobile industry companies collect location data and use or share that data to provide users with location-based services, offer improved services, and increase revenue through targeted advertising. Location-based services provide consumers access… Continue Reading

Industrial Control Systems Cyber Emergency Response Team Report

“The Department of Homeland Security (DHS) Control Systems Security Program manages and operates the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) to provide focused operational capabilities for defense of control system environments against emerging cyber threats…This report provides a summary of cyber incidents, onsite deployments, and associated findings from the time ICS-CERT was established… Continue Reading

FTC Advises Consumers on What to Do if Their Identity is Stolen

“The Federal Trade Commission, the nation’s consumer protection agency, offers updated information explaining how to protect your child’s information and your own, and the immediate steps to take to limit the damage identity theft can cause. Taking Charge: What To Do If Your Identity Is Stolen is a step-by-step guide that includes sample letters, forms… Continue Reading

Check Point Survey Reveals a Generation Gap in Computer Security

News release: “Check Point® Software Technologies Ltd…announced the results of a new ZoneAlarm report revealing differences in the use of computer security between Gen Y and Baby Boomers. The report, The Generation Gap in Computer Security, found that Gen Y is more confident in its security knowledge than Baby Boomers. However, 50 percent of Gen… Continue Reading