Sorry, you need to enable JavaScript to visit this website.

 

 

 

 

 

 

 

Cybersecurity

October 17, 2018
Comments [0]

Just in time for National Cybersecurity Awareness Month, the Identity Theft Resource Center in conjunction with CyberScout has released a survey entitled “Social Media Habits and You.” The survey focuses on how parents and guardians monitor their kids’ online behavior, with a focus on issues like cyber hygiene.

So what exactly is cyber hygiene?

You teach your kids how to practice basic hygiene. This...

Read More
October 15, 2018
Comments [0]

Today’s revelation from Facebook’s security blog was that the personal information of 14 million of the initial 50 million accounts hacked this month included their "username, gender, locale/language, relationship status, religion, hometown, self-reported current city, birthdate, device types used to access Facebook, education, work, the last 10 places they checked into or were tagged in, website, people or Pages...

Read More
October 15, 2018
Comments [0]

Watch now to learn about the cyber threats our children face online—and how families can stay safe.

In our on-demand webinar, Protecting Your Family’s Online Reputation: A Conversation About Child & Family Social Media Habits, we explore the results of surveys on child and family social media habits, just in time for National Cyber Security Awareness month.

Our children are digital...

Read More
October 15, 2018
Comments [0]

By Eva Velasquez, president & CEO of the Identity Theft Resource Center

There’s little doubt that parenting is one of the hardest jobs in the world. Raising a new generation of confident, capable, self-sufficient people is no small task. It can be a decades-long span of ups and downs made of heart-warming triumphs and more than a few mistakes. Hopefully, though, those mistakes don’t have lasting consequences.

... Read More
October 12, 2018
Comments [0]

Facebook announced today that a security bug in its WhatsApp messaging service that allowed hackers to take control of users’ phones has been fixed. The vulnerability affected the WhatsApp app on both iPhone and Android devices.It allowed hackers to take control of accounts simply by having their victims answer a video call.

The bug was initially discovered by Google Project Zero, and reported by ZDNet and the Register in late August, but was not fixed until this week, leaving the...

Read More
October 9, 2018
Comments [0]

Amazon revealed a breach of customer data last week, but it wasn’t a data breach of the usual variety. Rather than falling prey to a cyberattack or having hackers exploit unsecured code, customer email addresses were leaked by an employee to an online reseller in exchange for money.

What you need to know: 1.) A crime was committed, and 2.) It still counts as a data compromise.

While this is Amazon’s first public dismissal of an employee for the theft of customer data, it’s...

Read More
October 8, 2018
Comments [0]

Google announced that it will be shutting down consumer use of the long-ailing social platform Google+ after it was revealed that a security bug dating back more than six months was not disclosed by the company.

According to the Wall Street Journal, Google may have opted not to disclose the bug at least in part to avoid regulatory scrutiny, though the platform,...

Read More
October 5, 2018
Comments [0]

A China-linked hacking group is currently on the attack, targeting cloud service providers and managed service providers (MSP) in the U.S., warned the U.S. government and multiple cybersecurity firms.

The hacking group, known as Cloudhopper, APT10 and Red Leaves, has in the past focused, primarily but not exclusively, on theft of intellectual property and cyber espionage operations targeting high-tech industries including telecommunications and manufacturing....

Read More
October 4, 2018
Comments [0]

Apple’s iOS 12 update includes a workaround that can allow a hacker to access a device’s photos and contacts without having the passcode to unlock it.

It does not, however, allow unauthorized users full access to the device, and executing the workaround isn’t exactly an easy thing to do. Security research Jose Rodriguez recently posted a Youtube video showing how to exploit a bug in Siri, the iPhone’s voice assistant with a relatively convoluted ...

Read More
October 3, 2018
Comments [0]

Parents can’t always keep an eye on their children’s digital lives. Some adults aren’t digital natives, and still others simply don’t have time to monitor their kids’ activities.

To complicate matters, the risks posed by cyber criminals changes all the time. Hackers and cyber crooks don’t stand still; they continually adapt, changing their attack methods to find new victims.

More than 1 million children—or 1.48 percent of minors—were victims of...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started