Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: ID Theft

This is how Google’s Chrome lets the cookies track you, imagined in real life

A Washington Post video story – This is how Google’s Chrome lets the cookies track you, imagined in real life  – “Chrome has become like spyware for the company, allowing more tracker cookies than any other browser. The Post’s Geoffrey A. Fowler imagines how that might feel in real life, and gives advice for more… Continue Reading

Protect your online identity now: Fight hackers with these 5 security safeguards

ZDNET – Having your identity stolen can be a nightmare, and cleaning up the mess can take months. You can make life difficult for a would-be identity thief by locking down these five key aspects of your online life. “…You don’t have to be the next victim. With a little effort (and, yes, a little expense),… Continue Reading

Pennsylvania identity theft case trends

PA Courts: “Over the last five years, Pennsylvania has seen a gradual decrease in identity theft cases. Identity theft is defined as the fraudulent use of another person’s identifying information (social security number, bank account, birth certificate etc.). The infographic below highlights key data including defendant demographics, identity theft case counts and outcomes as well… Continue Reading

You’re Not Alone When You’re on Google

The New York Times – We know that. But the “privacy paradox” means we still act like we are. “…To fully apprehend our vulnerabilities as digital creatures would require far too much time and energy. More than that: It would require an entirely new set of instincts, a radically different cognitive framework from the one… Continue Reading

Your most sensitive data is likely exposed online. These people try to find it.

c/net: “Justin Paine sits in a pub in Oakland, California, searching the internet for your most sensitive data. It doesn’t take him long to find a promising lead. On his laptop, he opens Shodan, a searchable index of cloud servers and other internet-connected devices. Then he types the keyword “Kibana,” which reveals more than 15,000… Continue Reading

Most hacked passwords revealed in UK cyber survey

The National Cyber Security Centre’s first ‘UK cyber survey’ published alongside global password risk list NCSC’s first ‘UK Cyber Survey’ shows 42% of Brits expect to lose money to online fraud Breach analysis finds 23.2 million victim accounts worldwide used 123456 as password Global password risk list published to disclose passwords already known to hackers… Continue Reading

Range of Consumer Risks Highlights Limitations of Identity Theft Services

Data Breaches: Range of Consumer Risks Highlights Limitations of Identity Theft Services, GAO-19-230: Published: Mar 27, 2019. Publicly Released: Mar 27, 2019. “Data breaches have exposed the personal data of hundreds of millions of people and put them at risk for identity theft. We looked at what you can do if you’re a victim of… Continue Reading

Hackers Are Passing Around a Megaleak of 2.2 Billion Records

Wired: “When hackers breached companies like Dropbox and LinkedIn in recent years—stealing 71 million and 117 million passwords, respectively—they at least had the decency to exploit those stolen credentials in secret, or sell them for thousands of dollars on the dark web. Now, it seems, someone has cobbled together those breached databases and many more… Continue Reading

Cisco 2019 Data Privacy Benchmark Study

Cisco newsroom: “Organizations worldwide that invested in maturing their data privacy practices are now realizing tangible business benefits from these investments, according to Cisco’s 2019 Data Privacy Benchmark Study. The Study validates the link between good privacy practice and business benefits as respondents report shorter sales delays as well as fewer and less costly data… Continue Reading

(Don’t) Return to Sender: How to Protect Yourself From Email Tracking

EFF: “There are a lot of different ways to track email, and different techniques can lie anywhere on the spectrum from marginally acceptable to atrocious. Responsible tracking should aggregate a minimal amount of anonymous data, similar to page hits: enough to let the sender get a sense of how well their campaign is doing without invading users’… Continue Reading