Identity Theft

September 13, 2017
Comments [0]

Dora the Explorer turns out to be something of a spy. And that’s a problem for many parents in the digital age.

The long-reaching arm of online advertising for children is increasingly coming under legal assault as parents seek to limit what large media companies, like Disney and Viacom, can conduct in surreptitious audience monitoring.

Viacom, whose brands include Nickelodeon, the producer...

Read More
September 7, 2017
Comments [0]

You’ve seen the dramatic footage of rescues and calamities, shots of stranded families, pets, and wildlife—even giant carp—and you’ve probably had the same reaction many other Americans had the past few weeks: “How can I help?”

There are myriad ways you can ease the suffering and hardship being experienced in the wake of Hurricane Harvey, but there are also a number of pitfalls to watch out for.

... Read More
September 4, 2017
Comments [0]

Data compromises and the identity-related crimes that flow from them are now the third certainty in life, right behind death and taxes. That said, there is plenty you can do to stay as crime-proof as possible.

According to Risk Based Security, more than 4.2 billion records were compromised worldwide in 2016 alone....

Read More
September 1, 2017
Comments [0]

With the announcement of Verizon Up, a new wireless rewards program that provides users with customer incentives, first-dibs opportunities on things like VIP tickets and other exclusive deals, we thought it was time to review how reward marketing plans work.

First, the good news: Verizon Up is free!

Like their intrusive cousin the loyalty program, reward-based marketing schemes usually...

Read More
August 17, 2017
Comments [0]

When Apple announced a serious hardware flaw last week, and the critical security patch that addressed it, my first thought was perhaps arbitrary: “That exploit would work at the gym.” My next thought: what else would?

The discovery of a zero-day exploit affecting hardware—specifically a WiFi chip embedded in the main processors of Apple...

Read More
August 10, 2017
Comments [0]

With the announcement of Verizon Up, a new wireless rewards program that provides users with customer incentives, first-dibs opportunities on things like VIP tickets and other exclusive deals, we thought it was time to review how reward marketing plans work.

First, the good news: Verizon Up is free!

Like their intrusive cousin the loyalty program, reward-based marketing schemes usually...

Read More
August 4, 2017
Comments [0]

“These apps are brutal,” Ondrej Krehel told me during a conversation about spyware, or “spouseware” as the software is sometimes called.

“It doesn’t matter what ‘intended use’ these app developers claim in their sales pitches. They are increasingly being used by teens to spy on their love interests,” Krehel said. “It’s quite prevalent.”

Krehel is CEO and founder of LIFARS, a digital forensics...

Read More
July 27, 2017
Comments [0]

Consumers face a grim reality when it comes to securing personal information. In the past year alone, 1.4 billion records were lost or stolen in data breaches.

Yet attempts to help become noise. Every day your customers are bombarded with news about everything from weak passwords to email scams and data breaches. They’re told their data is at risk wherever they share information. But are they really listening?

... Read More
July 26, 2017
Comments [0]

Another summer is ready to come to a close, but there’s still time to squeeze in one last vacation before fall.

Here are some important travel tips that you can use at any time of year to keep your identity safe from scammers and thieves.

Plan with caution – A travel scam can start the minute you begin planning for a trip. Browsing online for airfare or accommodations can lead you to dishonest sites. Some... Read More
July 23, 2017
Comments [0]

No matter how many criminal complaints you read, the expression “JV” always sends chills down your spine. But this line, from a complaint filed April 27 in a California federal court, stands out.

“Petersen stated that he recently received via email from JV#1 a video of JV#1’s younger brother…masturbating in a bathroom. Petersen stated that JV#1 told Petersen he had recorded JV#2 without (his) knowledge. Petersen believes JV#2...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started