Quantcast
Channel: LifeLock Articles
Browsing latest articles
Browse All 41 View Live

Sony Playstation Network Breach

In an April 26, 2011 blog post on the Sony PlayStation site, the company warned that an unauthorized person was believed to have obtained the names, addresses, email addresses, birth dates, and...

View Article



Danger of Malware

Malware can gain access to your computer through an email attachment or a link to an infected or counterfeit website. It can then transmit personal information you may have stored, including banking,...

View Article

Social Networks and ID Theft

More than half of U.S. adults actively use social sites such as Facebook and Twitter.1 Identity thieves are discovering the potential for financial gain by incorporating pieces of the everyday...

View Article

Smartphone Data Theft

According to comScore, 97.9 million Americans owned smartphones in the last quarter of 2011.1 Smartphone proliferation, including the iPhone, Android, Windows and Blackberry platforms, has certainly...

View Article

Seniors at Risk for ID Theft

Seniors are prime identity theft targets for a number of reasons. They often have saved a lot more money than younger people who are just starting out. At the same time, they have less people around to...

View Article


Online Rental Scams

Online rental fraud starts with a listing, most often on a free listing site because it costs them ZERO and they don’t have to provide their own credit card number. The address is probably real. And...

View Article

Millennials — Easy Bait for ID Thieves

Millennials. Eighties Babies. Echo Boomers. The Connected Generation. You may think of them as tech savvy and device dependent. Identity thieves think of them as an easy victim. It’s like taking candy...

View Article

Military ID Fraud

Deployed troops are often a long way from home and way too busy to keep an eye on potential identity threats. The United States military has recognized the increased threat to military personnel and is...

View Article


Medical ID Theft

Medical ID theft involves stealing an individual’s personal identity information or health records and using it to obtain free healthcare or commit insurance fraud. Each year, it is estimated that more...

View Article


Internet Privacy and ID Theft Protection

You’re being tracked online. The sites you visit, the products you purchase and even the location of your computer. It is often a harmless way for marketers to learn what products you like so they can...

View Article

ID Theft Recovery Steps

Worst case scenario, an identity thief steals your money. Or maybe some tricky fraudster is using your identity across the nation. That doesn’t mean you should panic. Luckily, there are steps you can...

View Article

Friends and Family ID Theft

Identity theft can happen from those you least expect it from—friends and family. In fact, it’s more common than you might think. In a study by the Department of Justice, only 8% of all identity theft...

View Article

Employment ID Theft

With a nationwide crackdown and numerous immigration laws pending, an anticipated side effect is an increase in the amount of employment identity theft. As employers more frequently check employee...

View Article


Scam E-Mail ID Theft

Did you really win the prize? Does a foreign bank have money for you from an unknown relative? If you’re like most people, you have something in your spam folder or an unrecognized email in your inbox...

View Article

ID Theft Protection — A Do it Yourself Task

In today’s economic environment, “do it yourself” has become a mantra for saving money. If people have the necessary expertise and the time to complete the task, it can be a sure way to get it done for...

View Article


Visa and MasterCard Alert Banks of Major Security Breach

Visa and MasterCard are reporting a security breach by a third-party U.S. based card processor. Estimates of the number of cardholders affected vary widely, but both Visa and MasterCard are alerting...

View Article

Identity Theft and Your Credit Score

When you apply for a car loan, mortgage or credit card, lenders want to know their level of risk in approving the loan. Your credit score is the measurement of your credit worthiness, and is a major...

View Article


Corporate Data and ID Theft

The names are well-known—Citibank, Sony, Google and many others—and each is a respected, successful leader in their industry. But they shared at least one thing in common in 2011: hackers were able to...

View Article

How Companies Protect Your Data

Have you ever left your home, turned the corner and suddenly wondered whether you left the garage door open or the back door unlocked? It’s triggered by a natural desire to keep your home secure.

View Article

Children ID Theft Protection

A Carnegie Mellon CyLab study, the largest child ID theft report ever published, came to some sobering conclusions. First, 10.2% of children in the report had someone else using their Social Security...

View Article

Counterfeit Website ID Theft

These days, that email from your bank in your inbox could be real—or a phishing attempt. Today’s thieves are busy impersonating legitimate businesses via email and websites in order to acquire your...

View Article


Debit vs. Credit Card ID Theft

Which type of card protects you the best? With over 1.5 billion credit cards and more than half a billion debit cards in use in the U.S.1, millions of consumers have a choice, but some cards are safer...

View Article


What is a breach?

A “breach” is defined as a gap, a crack or the result of a rupture. Breaches cause bad things get in and good things get out.

View Article

Did you pack your identity?

A vacation isn’t very relaxing once you’re identity—and the money in your checking account—has been stolen. But with all the hustle and unfamiliarity involved in traveling, it’s easier to make mistakes.

View Article

Identity Thieves Rob The Grave

In complete disregard of respect or compassion, identity thieves are after a new, even more helpless target. The bull’s-eye? Great credit. No pulse.

View Article


Identity Theft: How big is the threat, really?

When people access your personal information for personal gain, it’s called identity theft. But that doesn’t mean the bad guys had to uncover every bit of your personal information. Some of these...

View Article

The Buyer’s Guide: Information Protection vs. Identity Theft Protection

Not all forms of protection are created equal. And there are a lot of misconceptions out there about what identity theft protection actually is. Some services may guard your finances—which is...

View Article

Protecting Your Password Infographic

Maintaining your online security is imperative in today’s growing digital era. Over 8 million Americans were victims of identity theft in 2011.

View Article

File Sharing

Forget everything you’ve learned about the golden rule and sharing with others. When you’re online, it’s survival of the cautious. One of the most common ways identity thieves get a hold of information...

View Article



Criminal Activity: Prosecuting Identity Thieves

One of the most devastating aspects of identity theft is that the crime can often go completely undetected—the criminals walk away without any consequences. To make matters worse, only a small portion...

View Article

Mobile Wallet

What’s the difference between your smartphone and your wallet? Sooner than you think, not much.

View Article

Protecting Kids from ID Thieves

Modern life has taken a lurch in recent years toward greater transparency. We share our locations, our desires, our likes and dislikes, who we are with and who we think about, day and night, live...

View Article

Jury Duty Identity Scam

You’re relaxing at home, perhaps after work or while watching the game. Suddenly the phone rings. The caller claims to be a jury duty coordinator or an officer of the court and they’ve got some real...

View Article


Is Your Small Business a Big Target for Identity Thieves?

According to Javelin Strategy & Research, “Small business owners are being disproportionally victimized by identity thieves.” So the short answer to the question is YES, you sure could become a...

View Article

Laws & Attraction: Dating an Identity Thief

Most people have had their share of dating horror stories—bad breath, rude behavior, maybe a blind date gone wrong. But what about a date that ends up stealing thousands of dollars?

View Article

Phishing With Bait

Phishing is a way identity thieves steal your information by pretending to be a company, organization, or entity that you know and trust. Phishing generally begins with an electronic communication,...

View Article


New Account Fraud: The Cost of Remediation

There’s a major difference in receiving a pre-approved credit card in the mail and receiving an actual credit card in the mail. The former implies a creditor wants your business. You can shred the...

View Article


Fake ID Identity Theft

Finally. Away from home and on your own. But you’re not old enough to buy a beer at that hot new club. So maybe you’re thinking ... just thinking ... about getting a fake ID. So you check out some...

View Article

Fish Out of Water

Let’s try to have some compassion; identity thieves are people, too. True, they’re often looking to steal your money, use your health insurance, gain employment or start a new small business with your...

View Article

Data Breach Infographic

In 2012, government agencies, banking institutions and businesses around the world leaked millions of personal records. These records include social security numbers, addresses, medical details and...

View Article

Malware Infographic

Malware is technology’s monster under the bed: an unseen menace developed to damage computer systems and steal private information. 32% of the world’s computers are now infected with malware, causing...

View Article

Browsing latest articles
Browse All 41 View Live




Latest Images