identity theft
Big Data: Observing a Phishing Attack Over Years
Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve sensitive or private information such as usernames, passwords, and credit card details. Attacks of this kind have been around since 1995, evolving in sop…
The Dark Side of Technology
Cisco Champions ask Challenging Questions. This is the third and final blog in our series presented by Carlos Dominguez and Jimmy Ray Purser. You can read the first blog by Carlos addressing connectivity and the less tech-fortunate here and the second blog by Jimmy Ray on the future of the CCIE her…
LexisNexis Breach Highlights Identity Theft Risks
Who are you? Removing the obvious existential questions for a minute, your identity is often represented as a bundle of personally identifiable information (PII). In the United States PII begins at birth with a name, date of birth, and social security number (SSN). This morning’s KrebsOnSecurity pos…
1