Identity Theft and Data Security Breaches

Identity Theft and Data Security Breaches News

View All News

Identity Theft and Data Security Breaches Get Started

Bring yourself up to speed with our introductory content

  • synthetic identity theft

    Synthetic identity theft is the fraudulent use of stolen personally identifiable information (PIF) that is combined with made-up details to create a false identity. The thief may steal an individual's social security number, for example, and use it ... Continue Reading

  • medical identity theft

    Medical identity theft is the illegal access and use of someone’s personally identifiable information to fraudulently obtain medical service, prescription drugs or medical insurance coverage. The types of information stolen can include name, social ... Continue Reading

  • rainbow table

    A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. Rainbow tables are often used by password cracking software for network security attacks. Continue Reading

View All Get Started

Evaluate Identity Theft and Data Security Breaches Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Identity Theft and Data Security Breaches

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Identity Theft and Data Security Breaches Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve