Remove Consumer Protection Remove Identity Theft Remove Passwords
article thumbnail

National Consumer Protection Week: Keeping your personal data safe in a digitally connected world

Webroot

March is a time for leprechauns and four-leaf clovers, and as luck would have it, its also a time to learn how to protect your private data from cybercrime. Each year, the first week of March (March 2-8) is recognized as National Consumer Protection Week (NCPW). Fraud alerts and credit freezes Protect you from identity theft.

article thumbnail

IdentityIQ Releases Report on Newest Scams to Target Your Identity

Identity IQ

This report explores key findings based on IdentityIQ member-reported data and found significant jumps in two major types of scams: peer-to-peer payment apps utilizing platforms such as Cash App, Zelle and Venmo, surging more than 58%, and scams stemming from the theft of personal documents, increasing by 44%.

Scams 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Credit Card Fraud VS. Debit Card Fraud: Are you Protected?

Identity IQ

Consumer protection laws differ in each case and knowing the differences can help to keep your accounts safe from identity theft. While there are protections for both, you can face more liability for fraudulent charges than if you’d used your credit card instead. When Should I Use a Credit Card?

article thumbnail

Can “Buy Now, Pay Later” Apps Be Trusted with My Personal Data?

Identity IQ

The Consumer Financial Protection Bureau recently asked several buy now, pay later, or BNPL, providers for information related to some concerns it has about short-term installment plans. Experts warn that scammers steal people’s identities or take over their accounts to evade detection, making unsuspecting victims foot the bill.

article thumbnail

Scary Fraud Ensues When ID Theft & Usury Collide

Krebs on Security

Although he didn’t technically have an account with MSF, their authentication system is based on email addresses, so Jim requested that a password reset link be sent to his email address. That worked, and once inside the account Jim could see more about the loan details: The terms of the unauthorized loan in Jim’s name from MSF.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

For example: passwords being typed or posted, specific motions or commands used to activate control systems to open or unlock doors, etc.”. That type of information can be extremely valuable for things like identity theft.”. Individual workers’ patterns and habits could be studied as well, to their detriment. “You

article thumbnail

It’s a Holiday Security Breach Blowout

SiteLock

The wargaming site I patronize had its forums compromised and the notification on the site described the, granted, low-level information compromised, though further compromise through password reuse was discussed. Thankfully, we understand how the breaches may have occurred and how to protect ourselves, which I will share with you now.