identity theft

July 14, 2014

SECURITY

Big Data: Observing a Phishing Attack Over Years

Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve sensitive or private information such as usernames, passwords, and credit card details. Attacks of this kind have been around since 1995, evolving in sophistication in order to increase their success rate. Up until now, […]

October 31, 2013

DIGITAL AND SOCIAL

The Dark Side of Technology

Cisco Champions ask Challenging Questions.  This is the third and final blog in our series presented by Carlos Dominguez and Jimmy Ray Purser. You can read the first blog by Carlos addressing connectivity and the less tech-fortunate here and the second blog by Jimmy Ray on the future of the CCIE here. I recently had […]

September 25, 2013

SECURITY

LexisNexis Breach Highlights Identity Theft Risks

Who are you? Removing the obvious existential questions for a minute, your identity is often represented as a bundle of personally identifiable information (PII). In the United States PII begins at birth with a name, date of birth, and social security number (SSN). This morning’s KrebsOnSecurity post details the unauthorized access of computer systems (via malicious code) at Lexis Nexis and Dun […]