An estimated 8.6 million households had at least one person age 12 or older who experienced identity theft victimization in 2010, said the Bureau of Justice Statistics (BJS).
Workers are planning to do more online holiday shopping this year while on the job, with many using their own personal smartphones and tablets, a new survey shows.
Facebook pages are covered by New Jersey's identity-theft law, a judge has ruled in upholding charges against a woman who allegedly trashed her ex-boyfriend by creating a false Facebook account in his name and peppering it with unpleasantries.
While some see security video as the current fair-haired security solution, well, look again. Today, and into the future, a primary driving force comes wrapped in the concept of identity, credential and access management. It goes way beyond the early days of pioneering Wiegand effect cards, interestingly owned by Echlin, a car parts manufacturer that first used the technology in vehicle distributors.
At the start of each school year, parents and students fill out countless forms and applications that require personal information, such as social security numbers and date of birth — information that criminals can use in identity theft schemes.
Matt Marcon of MGM Communications in Glendale, Ariz., found that his customers needed a better intercom system. Marcon is a dealer who sells and installs communication systems for self-storage facilities, and he says the old-fashioned intercom systems – press a button and hope someone was there to respond – were hurting, not helping, his customers’ businesses.
The University of Arizona, like major research universities across the country, found that many of its grants and contracts were tied to higher levels of access security. Access to buildings with old-fashioned keys and locks or cards with magnetic strips swiped into pin pads didn’t provide the amount of security the University was looking for. So the school made the switch to smart cards.
We often confuse the concept of identity with the card that carries it, but in reality, “identity” can reside on a mobile phone, a USB stick, or some other medium.