TITLE

iDENTITY FRAUD

PUB. DATE
June 2010
SOURCE
Finweek;6/17/2010, Special section p4
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article offers information about identity fraud or theft. It indicates that identity fraud is an attempt to get sensitive information including names, passwords and credit card details. According to Jayson O'Reilly, identity thieves and hackers are targeting home computers due to less or inadequate security protection on personal computers. It also provides steps in solving identification theft and telephone tactics that can be used to protect oneself from fraud.
ACCESSION #
52331425

 

Related Articles

  • Who's Got My Keys? Sparks, John // Newsweek (Atlantic Edition);11/28/2005 (Atlantic Edition), Vol. 146 Issue 22, p6 

    The article focuses on identity-stealing software programs known as keyloggers, which are easy to make from online kits. Keyloggers install themselves onto computers without users' knowledge, recording keystrokes as the user types in passwords, account numbers and personal data. Identity theft...

  • Who's Got My Keys? Sparks, John // Newsweek;12/19/2005, Vol. 146 Issue 25, pE2 

    The article focuses on identity-stealing software programs known as keyloggers, which are easy to make from online kits. Keyloggers install themselves onto computers without users' knowledge, recording keystrokes as the user types in passwords, account numbers and personal data. Identity theft...

  • Who's Got My Keys? Sparks, John // Newsweek (Pacific Edition);11/28/2005 (Pacific Edition), Vol. 146 Issue 22, p6 

    The article focuses on identity-stealing software programs known as keyloggers, which are easy to make from online kits. Keyloggers install themselves onto computers without users' knowledge, recording keystrokes as the user types in passwords, account numbers and personal data. Identity theft...

  • Job offer or identity-theft scam? Fisher, Anne // Fortune;9/5/2005, Vol. 152 Issue 5, p162 

    Offers a look at how people searching for jobs on the Internet can protect themselves from identity theft. Prevalence of identity thieves who gather information from résumés on Internet job sites and then match it up with a fake Social Security number; Suggestion that job hunters post an...

  • TAKING A BITE OUT OF IDENTITY THEFT. Lewis, Peter // Fortune;5/2/2005, Vol. 151 Issue 9, p36 

    The article mentions how companies mishandle personal data and recommends using a paper shredder at home. Last year, according to a Better Business Bureau report, more than nine million Americans were victims of identity theft. Security experts say that, contrary to popular belief, the majority...

  • PAYING the price.  // Information Security;Apr2006, Vol. 9 Issue 4, p34 

    Discusses the information security breach that occurred at CardSystems Solutions in May 2005. Extent of the damage caused by computer hackers on the company; Measures implemented by Joe Christensen, vice president of security and compliance at CardSystems, to help the company earn compliance...

  • Threats. Lindenmayer, Isabelle // American Banker;12/2/2005, Vol. 170 Issue 230, p5 

    The article reports on various methods of fraud, forgery and identity theft discovered recently. The holiday shopping season has provided new opportunities for criminals. Moreover, because 90% of babies are issued a social security number before they leave the hospital and because they do not...

  • Limits of token gestures. King, Stuart // Computer Weekly;4/4/2006, p22 

    This article presents views of the author on computer security. Although the author does not advocate providing a blood sample to enable him to log into his bank account from home, he likes the idea of his bank providing him with an extra form factor and using two-factor authentication. No...

  • THE FIGHT AGAINST IDENTITY THEFT.  // Consumer Reports;Jun2005, Vol. 70 Issue 6, p5 

    Focuses on identity theft and how consumers can protect themselves against it. How companies that hold sensitive personal information are failing to protect it from hackers; Need for stronger legislation related to identity theft; Three things that the Consumers Union is trying to accomplish in...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics