Description:
DESCRIPTION
Solution:
BODY
ipl2 Logo
 
Search:
 
 

Search results for:
Identity Theft Viewing 1 to 10 of 20

Next>>

FDIC: Identity Theft     View
"The FDIC has created this webpage to inform consumers of information the FDIC has made available on identity theft." Includes links to videos, consumer news articles, a 2004 study, press releases, and related material. From the Federal Dep ...
http://www.fdic.gov/consumers/consumer/alerts/theft.html

TrustedID: Identity Theft Data Breach Alerts     View
This blog relates instances of data breaches that could lead to identity theft. Covers items such as lost and stolen laptop computers, student information posted on the Internet, access to computer information by former employees, and improperly disc ...
http://breachalerts.trustedid.com/

Analysis: What Is Wardriving?     View
This August 2008 article explains the computer hacking technique known as wardriving. "Wardriving involves a computer user driving around searching for insecure wireless networks. All the hacker needs to steal credit card and other information f ...
http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article4470120.ece

Identity Theft, 2004     View
This report, based on 2004 data and released in April 2006, "presents data on identity theft victimization and its consequences from the National Crime Victimization Survey (NCVS). ... [Topics include] credit card thefts, thefts from existing ac ...
http://www.ojp.usdoj.gov/bjs/abstract/it04.htm

Special Report on "Phishing"     View
This 2004 report discusses "criminals' creation and use of e-mails and websites ... to deceive Internet users into disclosing their bank and financial account information or other personal data." Covers risks, tips for avoiding phishing sch ...
http://www.usdoj.gov/criminal/fraud/docs/phishing.pdf

Anti-Phishing Working Group (APWG)     View
This consumer protection site provides news about and current examples of e-mail fraud and scams (archived back to September 2003 with commentaries and summaries of known details). Also includes a list of Web resources providing trend reports, help f ...
http://www.antiphishing.org

Pretexting: Your Personal Information Revealed     View
Fact sheet for consumers about pretexting, "the practice of getting your personal information under false pretenses," in which a "pretexter" might gain information by claiming he is from a survey firm, and then use that informatio ...
http://www.ftc.gov/bcp/edu/pubs/consumer/credit/cre10.shtm

Identity Theft Resource Center (ITRC)     View
"ITRC's mission is to research, analyze and distribute information about the growing crime of identity theft. It serves as a resource and advisory center ... for consumers, victims, law enforcement, the business and financial sectors, legislator ...
http://www.idtheftcenter.org/

Protecting Personal Information: A Guide for Business     View
This guide to protecting personal data on customers and company employees focuses on five key principles: "take stock," "scale down," "lock it," "pitch it," and "plan ahead." Includes the guide, relat ...
http://www.ftc.gov/infosecurity/

FTC Father's Day     View
This animated father's day greeting contains "a few 'phish' & tips to keep you net-wise." Includes a link to the fact sheet "How Not to Get Hooked by a 'Phishing' Scam," explaining the scams involving "Internet fraudsters ...
http://www.ftc.gov/dad

Next>>

 


Connect With Us On Facebook MySpace Twitter YouTube Delicious icon Diigo icon WordPress icon
Partners: Drexel | FSU | Illinois | Pittsburgh | Rutgers | Syracuse | UNC | UT Austin | Washington | Join the ipl2 Consortium
ipl2 is hosted by The iSchool at Drexel, College of Information Science and Technology, with major support from the College of Information at Florida State University. Sponsored by Intel and Sun Microsystems Copyright Notice (c) 1995 - 2008 The Regents of the University of Michigan. All rights reserved. (c) 2009, Drexel University, All Rights Reserved.