Synthetic Identity Theft: When Everybody Knows Your Name

You probably have a place where everyone knows your name — and maybe your address and your birthday and your favorite drink. That place could be your favorite restaurant, your office or your grandma’s house. It doesn’t matter where that place is; when everyone in the room greets you by name, it gives you a […]

The post Synthetic Identity Theft: When Everybody Knows Your Name appeared first on Security Intelligence.

Continue reading Synthetic Identity Theft: When Everybody Knows Your Name

Crypto-Risk: Your Data Security Blind Spot

Start thinking about what your organization can do to manage crypto-risk before today’s encryption and security measures fall prey to tomorrow’s attackers and advanced computing tools.

The post Crypto-Risk: Your Data Security Blind Spot appeared first on Security Intelligence.

Continue reading Crypto-Risk: Your Data Security Blind Spot

IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape

IBM X-Force’s top security predictions for 2019 cover a range of potential attack schemes and consequences, from industry-specific prognostications to a rapid expansion of emerging criminal schemes.

The post IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape appeared first on Security Intelligence.

Continue reading IBM X-Force Security Predictions for the 2019 Cybercrime Threat Landscape

Scraping Social Security Numbers on the Web

One of the most accredited forms of validation for a citizen’s identity is a Social Security Number. A Social Security Number is a significant piece of government-issued identification in the United States. When this information is compromised, i… Continue reading Scraping Social Security Numbers on the Web