Capital One Data Security Breach Why the largest bank in Virginia was just fined $80 million and why you should care In March 2019 Capital One suffered a data security breach in which the social security numbers, bank account numbers, and credit card applications of over 100 million people were compromised when a software engineercontinue reading…
Credit Reporting Disputes
Increased Push To Use Alternative Credit Data Presents New Risks And New Opportunities
There have been recent efforts by the major three credit reporting agencies, Equifax, Experian, and TransUnion (“CRAs”) to secure access to “alternative” credit data in addition to traditional credit data. Traditional credit data includes information from your auto loans, mortgage, credit inquiries, and student loans; and these sources are what have long been used tocontinue reading…
Most Of Us Don’t Read Those Long-Form User Agreements. What Are We Agreeing To When We Accept?
The Importance of Reading Terms & Conditions Do you read the long-form “Terms and Conditions” that many web-based services require users to sign? If you don’t, are you aware of what you are agreeing to? Considering the length of these documents and the legalese in which it is written, it’s safe to say that most ofcontinue reading…
What Is Synthetic Identity Theft?
Identity Theft Is Evolving Identity thieves continue to find new ways to commit fraud and their methods are becoming more difficult to track down. The latest technique is called “synthetic identity theft.” Synthetic Identity Theft Synthetic identity theft is a type of fraud that uses various bits of disparate stolen data from different people (e.g.continue reading…
What Is Typosquatting? Hackers Find A Way To Capitalize On Mistakes You Don’t Know You’re Making.
Typos Can Be a Big Mistake During the course of our day, it is not surprising that we might make typos when doing work online or browsing the internet. Unfortunately, hackers are aware of this and have found a way to exploit these mistakes. Typosquatting “Typosquatting” is a scheme that hackers use to take advantage ofcontinue reading…