Identity Theft and Data Security Breaches

Identity Theft and Data Security Breaches News

  • September 15, 2014 15 Sep'14

    Apple Pay security: Hope abounds, but questions linger

    Security controls integrated into the new Apple Pay mobile payment system could strengthen the payment security ecosystem, but unanswered questions remain, like the ramifications of a lost iPhone.

  • September 09, 2014 09 Sep'14

    Home Depot confirms data breach began in April

    The home improvement retailer confirms its customers' payment card data was breached in an incident that is believed to have begun in April, likely compromising millions of card accounts.

  • September 09, 2014 09 Sep'14

    Home Depot confirms data breach began in April

    The home improvement retailer confirms its customers' payment card data was breached in an incident that is believed to have begun in April, likely compromising millions of card accounts.

  • September 05, 2014 05 Sep'14

    Goodwill breach highlights need for service provider due diligence

    News roundup: The recent Goodwill security breach has been blamed on a third-party service provider, highlighting the need for due diligence. Plus: Mobile device theft; Android app vulnerabilities and a 12-year-long cyber-espionage network.

View All News

Identity Theft and Data Security Breaches Get Started

Bring yourself up to speed with our introductory content

  • synthetic identity theft

    Synthetic identity theft is the fraudulent use of stolen personally identifiable information (PIF) that is combined with made-up details to create a false identity. The thief may steal an individual's social security number, for example, and use it ... Continue Reading

  • medical identity theft

    Medical identity theft is the illegal access and use of someone’s personally identifiable information to fraudulently obtain medical service, prescription drugs or medical insurance coverage. The types of information stolen can include name, social ... Continue Reading

  • rainbow table

    A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. Rainbow tables are often used by password cracking software for network security attacks. Continue Reading

View All Get Started

Evaluate Identity Theft and Data Security Breaches Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Identity Theft and Data Security Breaches

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Identity Theft and Data Security Breaches Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close