article thumbnail

Protecting Yourself from Identity Theft

Schneier on Security

Don't reuse passwords for anything important -- ­and get a password manager to remember them all. This essay previously appeared in the Rochester Review , as part of an alumni forum that asked: "How do you best protect yourself from identity theft?".

article thumbnail

Improper use of password managers leaves people vulnerable to identity theft

Tech Republic Security

A password manager can be a useful and effective tool for creating, controlling and applying complex and secure passwords, but if you don’t use it the right way, you can open yourself up to account compromise and even identity theft.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Feds Charge Five Men in ‘Scattered Spider’ Roundup

Krebs on Security

The bot allowed the attackers to use the phished username, password and one-time code to log in as that employee at the real employer website. Evans, Elbadawy, Osiebo and Urban were all charged with one count of conspiracy to commit wire fraud, one count of conspiracy, and one count of aggravated identity theft.

article thumbnail

The Wages of Password Re-Use: Your Money or Your Life

Krebs on Security

When normal computer users fall into the nasty habit of recycling passwords, the result is most often some type of financial loss. Our passwords can say a lot about us, and much of what they have to say is unflattering. Interestingly, one of the more common connections involves re-using or recycling passwords across multiple accounts.

Passwords 338
article thumbnail

FTC Recognizes Identity Theft Awareness Week

Identity IQ

FTC Recognizes Identity Theft Awareness Week. The Federal Trade Commission is commemorating Identity Theft Awareness Week with a series of free events focused on raising awareness and educating consumers about the growing risk of identity theft. So what is identity theft and, how can you protect yourself?

article thumbnail

News alert: SpyCloud accelerates supply chain risk analysis with new ‘IDLink’ correlation capability

The Last Watchdog

Where a traditional threat intelligence or investigations tool may provide a small number of records directly correlated to the search input, IDLink expands the pool of results to include identity data correlated across shared usernames, emails, passwords, and PII – with flexible options around pivoting depth, confidence levels, and visualization.

Risk 286
article thumbnail

Why password management is critical to mitigating data breaches

Tech Republic Security

The Identity Theft Resource Center warns that businesses of all sizes should be vigilant about data security. The COO offers advice about passwords, cloud security, and patch management.