What You Need to Know About Biometrics

Biometrics measure users’ physical characteristics to verify their identity. Biometrics may be physiological traits, such as fingerprints and eyes, or behavioral characteristics, such as the unique way you’d complete a security-authentication puzzle. They can be more secure than simply using passwords, but they are not immune to privacy and security…

Continue Reading

Why Your Online Reputation Matters

What do potential employers, lenders, friends, and relationship partners see when they search for your name online? Google and other search engines are often the first stop for someone who wants to learn more about a person. One employer wrote that he had an applicant with an excellent resume, but…

Continue Reading

IRS Transitioning from ID.me Due to Privacy and Accuracy Concerns—But it is Still Used by 27 States

As part of their efforts to stem the massive amounts of tax fraud we have seen over the last few years, the Internal Revenue Service (IRS) introduced a new requirement for managing your tax records online. However, they are now backing off from having taxpayers log in to their IRS…

Continue Reading

Why Don’t We Protect Ourselves?

We know there are many things we can do to protect ourselves from identity theft and other security threats. But surprisingly, we often do not do them. The Identity Theft Resource Center (ITRC) and DIG Works surveyed 1050 U.S. adults about data breaches and credit freezes. They found that although…

Continue Reading

Spam Stats

Although it is almost impossible to know exactly how many spam emails are sent every day, we know the number is significant and that spam is not going away. One reason that it is hard to know how many spam emails are sent is that many people do not understand…

Continue Reading

Are Apple AirTags Tracking You?

Are you always misplacing your keys or other items? Apple AirTags give you an easy way to locate your personal items. Just attach an AirTag to your purse, your pet or anything you want to be able to find, and you can easily locate it with an app for Apple…

Continue Reading

Identity Fraud Trends in 2022

The Identity Theft Resource Center has released their predictions of six expected trends in identity theft and identity fraud for 2022. There will be a shift from identity theft (the accumulation of personally identifiable information (PII)) to identity fraud (the misuse of that information). Identity fraud will cause consumers to…

Continue Reading

Is Social Media Affecting Our Mental Health?

There are positive benefits to be obtained from being connected to others via social media, but there is a downside as well. We will examine the negative effects that may be experienced by both adults and children from exposure to social media and the unrealistic expectations that can develop. Expert:…

Continue Reading

Fraud Reports from the FTC and the FBI

On June 15, 2021, the FBI’s Internet Crime Complaint Center (IC3) released its 2020 Elder Fraud Report. According to the report, IC3 received a total of 791,790 complaints in 2020, with reported losses exceeding $4.1 billion. About 28% of the total fraud losses were sustained by victims over the age…

Continue Reading

Scamming the Scammers

Even if you spot the scam and don’t fall for it, being on the receiving end of a scam attempt can be infuriating. It can make you mad enough to want revenge against the scammer. That is usually a very bad idea. There are people, though, who love to mess…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now