Read more about identity theft
Bookmark and Share
  • Convenience still overrides security for mobile shoppers

    17.12.2013

    Despite a huge increase in shopping on mobile handsets, shoppers do not have security in place to protect the identity and credit card data stored on the devices, according to Tripwire.

  • Online behaviors that increase the risk of identity theft

    16.12.2013

    PrivacyGuard released the results of a survey aimed at observing and identifying a number of online behaviors that consumers willingly partake in that could put them at risk of fraud and identity theft.

  • Uncontrolled privileged access still a major issue

    20.11.2013

    The NSA’s notorious insider breach has caused 52 percent of IT security professionals to reconsider their approach to user and systems administrator privileges, yet the majority aren’t taking action, according to Avecto.

  • Why cybercriminals want your personal data

    12.11.2013

    Over the past few years, the personal data theft landscape has changed as online behaviors and activities evolve.

  • Social identity theft protection

    16.10.2013

    Riskive unveiled FriendGuard, a free app that leverages advanced math and science to protect individuals and families against social identity theft and malware attacking their social accounts.




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //