Tag Archives: data security

FTC Releases Top Complaint Categories for 2011

Identity Theft Once Again Tops the List Statement Released by FTC 2/28/2012 The Federal Trade Commission today released its list of top consumer complaints received by the agency in 2011. For the 12th year in a row, identity theft complaints … Continue reading

Posted in Identity Theft Protection | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

FTC Warns that Mobile Apps May Violate Fair Credit Reporting Act

Agency Sends Letter to Marketers of Six Apps for Background Screening The Federal Trade Commission warned marketers of six mobile applications that provide background screening apps that they may be violating the Fair Credit Reporting Act. The FTC warned the … Continue reading

Posted in Business Identity Theft, Business Law, Identity Theft Protection | Tagged , , , , , , , , , , , , , , , | 1 Comment

Banking Malware Finds New Weakness

Ice IX Steals Phone Numbers to Compromise Accounts A new Zeus variant has the attention of security experts – not because of its sophistication, but because of its automation. Named Ice IX, this new malware targets online banking users’ login … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , | Leave a comment

Do You Know Your Cost of a Lost Laptop?

In 2009 the Cost of a Lost Laptop study was conducted by Ponemon Institute and sponsored by Intel Corporation. It was the first benchmark study to estimate the full cost associated with a lost or stolen laptop. The average value … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , , , , , , , , , , , , | 1 Comment

Do you have the Ultimate Facebook Privacy Settings?

“Facebook’s innovation does not have to come at the expense of consumer privacy. The FTC action will ensure it will not.” — Jon Leibowitz, FTC Chairman FTC: “Facebook has agreed to settle FTC charges that it deceived its users — … Continue reading

Posted in Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , , , , , | 2 Comments