Posts tagged "hackers"

How to Stop Email Account Hackers (Fox & Friends)

Posted in Burning Questions (Video), Cyber Data Security, Identity Theft Prevention, Online Privacy, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Zappos Breach: 5 (Foot)Steps for the CEO, 6 for Victims

Let’s say you ordered winter boots for your spouse on Zappos.com (now part of Amazon), which has world-class customer service. You don’t really even shop the competition because someplace in your brain you already trust Zappos to deliver as they always have. Your unquestioned confidence in Zappos is worth a fortune.

And then hackers break in to a server in Kentucky this past weekend and steal private information on 24 million Zappos customers, including (if you are a customer) your name, email address, physical address, phone number, the last four digits of your credit card number and an encrypted version (thank goodness) of your password. Consequently, your junk email folder is overflowing (your email has been illicitly sold to marketing companies), you receive the doom-and-gloom breach notification from Zappos (just like I did), and suddenly, you don’t have quite the same confidence in this best-in-practice business any more. Your shaken confidence in Zappos costs them a fortune. For the foreseeable future, you will pause before using their website again.

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , ,

Information Offense – How Google Plays

image-4242
Google recently offered $20,000 to the first person who could hack their web browser, Chrome. Without question, a hacker will crack it and prove that their browser isn’t as mighty as they might think.

So why waste the money?

In that question, ‘why waste the money?’ lies one of the root causes of all data theft inside of organizations. Google’s $20,000 investment is far from a waste of money. Consider:

  1. The average breach inside of an organization costs $6.75 million in recover costs (Ponemon Study). $20,000 up front to define weak points is a minuscule investment.
  2. Chrome is at the center of Google’s strategic initiatives in search, cloud computing, Google Docs, Gmail, displacing Microsoft IE and mobile OS platforms – in other words, it is a very valuable asset, so Google is putting their money where their money is (protecting their profits).

Posted in Cyber Data Security, Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

Is Online Banking Safe from Identity Theft?

I am starting to reconsider my opinion that online banking is safer than traditional banking. Primarily because I have been hearing horror stories during some of my identity theft seminars. But now I am seeing it in the mainstream media. Case in point: read this short article in this morning’s USA Today about Hackers Swarming Bank Accounts. I’m open to your opinions, but I feel like the thieves are starting to win. In a YouTube video post I did some time ago about online banking, I suggested that if your computer is well-protected, you are better to bank online.

Online Banking & Identity Theft Video

But lately, it seems like the thieves are a step ahead. What are your thoughts? Have you had any troubles with identity being compromised because of the types of threats discussed in the article?

Identity Theft Seminars

Posted in Burning Questions (Video), Identity Theft Prevention, Video Tips by Identity Theft Speaker .
Tags: , , , ,