Privacy

Eyeball

Biometrics: Physical Attributes vs. Behavioral Patterns – The Privacy Debate

Account takeovers are increasingly affecting a growing population of online user accounts due to a confluence of threats, such as weak consumer password practices, frequent mass data breaches and brute force attacks against web properties. The scope, scale and frequency

Biometrics: Physical Attributes vs. Behavioral Patterns – The Privacy Debate Read More »

T-Mobile logo

Experian breach exposes 15 million T-Mobile customers to threat of identity theft

If you’re a T-Mobile customer or applied for T-Mobile service at any point between September of 2013 and September of 2015 then you’re probably one of the 15 million customers compromised by the latest data breach at Experian. The credit

Experian breach exposes 15 million T-Mobile customers to threat of identity theft Read More »

passwords

Anyone can know your password, but there’s only one you

If the only thing separating a cyber criminal, online stalker or identity thief from your personal data and information is a password or PIN you’ve already lost. There are three primary methods of authentication but “something you know” is the

Anyone can know your password, but there’s only one you Read More »

Scroll to Top