Like the thieves behind the crime, identity theft can take on many disguses depending on the information stolen. When identity theft goes undetected, these crimes can not only cost victims their money, but also their health and well-being. As each kind of identity theft could be more deadly than the next, here are three types of identity theft to avoid:

Child ID Theft

  • What makes it dangerous: Thieves often go after children's identities through stealing data from schools or even taking their relatives' information. Children will likely not know they were victims until they are denied for their first loan, credit card or even housing because of a poor credit history. This blemished credit report could cause them to be denied new lines of credit, which could stunt their financial wealth. 
  • How to avoid this identity theft: Check your child's credit scores by requesting a free credit report and…

While identity theft can take many forms, medical identity theft is not only a complex crime, but devastating for victims. A new report revealed the number of medical identity theft victims surged almost 22 percent in 2014, with more than 2 million victims total, according to the Medical Identity Fraud Alliance. The Fifth Annual Study on Medical Identity Theft found an upward trend of patients affected by medical identity theft that will likely continue into 2015 as hackers target the health care sector, ThirdCertainty reported.

"2015 will be a year of increased attention to the pervasiveness and damaging effects of medical identity theft," Ann Patterson, MIFA senior vice president and program director, said in a statement.

With medical identity theft likely to have a significant impact this year, patients should guard their information. 

Here are three ways to fight against medical identity theft:

shutterstock_114333121
With the daily drumbeat of data breach news, it’s easy for businesses and consumers to get fatigued about data security.

But data breaches present banks with a unique opportunity to educate themselves about security threats and raise awareness with customers—commercial and individual, alike—on how to mitigate risk.
(more…)

When a widespread data breach happens, children are often the most at risk for identity theft. Their clean credit histories make them targets for identity thieves to steal information and open new lines of credit. After the Anthem data breach, millions of children in the U.S. had their personal information exposed, making them vulnerable to identity theft, NBC News reported. As children are highly at risk, parents should take precautions after data breaches to prevent identity theft. 

Here are three ways to protect children from identity theft:

1. Remove Suspicious Activity from Your Child's Credit Report
The first step toward protecting your child's credit after a data breach is to request his or her credit report, according to the U.S. Federal Trade Commission. Reach out to each of the three main credit reporting bureaus, TransUnion, Experian and Equifax…

Robbing a bank is a bold and dangerous move even for criminals, but one hacking group managed to steal up to $1 billion from financial institutions around the world without being detected. A massive cybercrime ring hit banks and financial institutions in 30 countries around the world and many of these data breaches are still active, according to Kaspersky Lab

Sergey Golovanov, principal security researcher for the company's global research and analysis team, called the crime ring a professional cyber-robbery. The criminals were able to infiltrate banks' systems using a combination of hacking techniques and tools, despite these organizations' having various security software. 

"These bank heists were surprising because it made no difference to the criminals what software the banks were using," Golovanov said in a statement. "So, even if its software is unique, a bank cannot get complacent. The attackers didn't even need to…

150213_obama_signs750px1-640x360

PALO ALTO — President Obama threw down a gauntlet here to rally corporations, Congress, and the federal government to address cyber attacks in a selfless way, ThirdCertainty.com reported.

The president signed a milestone executive order Friday urging companies to dramatically advance the sharing of cyber attack intelligence with each other and the federal government.

“This has to be a shared mission,” Obama declared. “The only way to defend America is through government and industry working together, sharing appropriate information as true partners.”

The presidential order is advisory. It is the latest component of the White House’s push to better protect the nation’s critical infrastructure, while also preserving personal privacy.

But the problem has become much bigger than just protecting strategic and military targets….

shutterstock_91547126

Identity theft has always been a problem, but issues like data breaches and a lack of online privacy have brought identity theft concerns to the top of people’s minds. It’s a pretty broad crime, encompassing several things a person can do if they get access to your PII, or personally identifiable information.

One of the worst things that can happen in a privacy breach is exposure of Social Security numbers. They’re wrapped up in most aspects of Americans’ lives — employment, medical histories, taxes, education, bank accounts and so on. The consequences of having your Social Security number end up in someone else’s hands aren’t pretty — most of them are downright terrifying. (more…)

shutterstock_154271519

The other day a reporter asked me who’s to blame for the growing epidemic of identity-related tax fraud. I almost replied, “the government and the bad guys,” but I caught myself before committing to that inaccuracy. “We’re all to blame,” I said.

I believe that breaches, and the identity theft that flows from them, have become the third certainty in life, right behind death and taxes. While it may seem like hyperbole, more than 1 billion consumer records containing some form of personally identifying information (PII) have been exposed to hackers, identity thieves and spies (forget, for the moment, the NSA) over the past 10 years.

(more…)

Screen Shot 2015-02-12 at 11.57.13 AM

With Valentine’s Day on the horizon, online dating services are flourishing. A recent study by IBM Security shows the mobile app versions are rife with security flaws.

In an analysis of 41 popular dating apps available on Google Play, more than half—63 percent—had medium- to high-severity security vulnerabilities, the study shows.

Mobile apps are often free or low-cost. However, they typically seek permission to access key components of the device hardware, as well as tap deeply into user data stored on the device. This sets up a perfect scenario for hackers. (more…)

While cybercriminals regularly go after computers and mobile devices, there are some unexpected targets that could make hacking incidents even more dangerous. 

Here are three frightening things cybercriminals can hack:

1. Vehicles
Although drivers may not think their vehicle is as much of a target for cybercriminals as their electronics, there is the risk that hackers could infiltrate consumers' cars. There is a larger number of electric components in modern day cars that essentially make them giant computers, CNNMoney reported. From Wi-Fi connections to Bluetooth abilities, a car has plenty of entry points that could allow cybercriminals access to their cars and possibly modify its controls.

Since Internet-enabled features could potentially give cybercriminals a way to hack vehicles, lawmakers are calling for more data security protections in cars. Through requiring manufacturers to include security measures with their built-in wireless technology, it could help consumers defend against hackers who aim to…