Category Archives: Blog

Social Networks

Social Networks
[vc_row][vc_column][vc_column_text] Social Networks Social networks have experienced massive surges in popularity since their creation. Social Networks that seemed small and mediocre when they first began, such as Twitter and Facebook, now have millions of members worldwide. With this popularity comes success for the site owners and convenience for its users. However, there is a dark side to social […]

Shoulder Surfing

Shoulder Surfing
[vc_row][vc_column][vc_column_text] Shoulder Surfing Shoulder surfing is defined as the practice of spying on the user of a cash-dispensing machine or other electronic device in order to obtain their personal identification number or password. Direct observation techniques’ can be used which involves looking over someone’s shoulder to obtain this type of information. Shoulder surfing can be […]

Fraud Alert

Fraud Alert
[vc_row][vc_column][vc_column_text] What is a Fraud Alert? Having a Fraud Alert on your credit report is a way to notify creditors and lenders to put additional security measures to verify your identity before they can extend a loan or a credit line in your name. This action is taken to prevent a thief from opening an […]

Financial Identity Theft

Financial Identity Theft

What is Financial Identity Theft? Financial identity theft occurs when an individual’s identifying information is stolen for the purpose of committing some kind of financial fraud, usually to the detriment of the victim. Beyond monetary losses, victims can face repercussions in other areas of their lives. Negative marks in their credit information can lead to […]

Cyber Crime

Cyber Crime
[vc_row][vc_column][vc_column_text] Cyber Crime Cyber Crime is any crime committed using a computer and a telecommunication network. The target could be another computer, with the intention of stealing information, completely damaging the system, or taking over it. The target could also be individuals, like in cases of fraud and identity theft through phishing and social engineering. […]

LifeLock Review

LifeLock Review Identity theft has increasingly become a common occurrence, especially in the US. The US Federal Trade commission has documented more than 15 million identity theft cases in recent years. This makes it among the fastest growing criminal enterprises. To address the problem, several companies have sprung up to provide commercial identity theft protection […]

Phishing

Phishing
[vc_row][vc_column][vc_column_text] What Is Phishing? Phishing is the act of sending a message/email to a user falsely claiming to be an established legitimate enterprise in an attempt to procure the user’s private information, such as passwords. A phishing email/message usually directs the user to a website which looks very much like the real/legit website. They are […]

Identity Theft

Identity Theft
[vc_row][vc_column][vc_column_text] Identity Theft Identity theft occurs when someone steals your important personal information and uses it without your permission (and knowledge). Identity theft is a serious crime, and can wreak havoc on victim’s credit history, reputation and finances. Moreover, it often takes a lot of patience, time and money to resolve identity theft. Fortunately, there are several effective preventative […]