Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: ID Theft

2013 IT Trust Curve study

“The 2013 IT Trust Curve study surveyed 3,200 respondents to assess their organizations’ IT maturity levels and ability to withstand and quickly recover from disruptive incidents such as unplanned downtime, security breaches, and data loss…Today’s business environment is both ripe with opportunity and fraught with risk. This dichotomy is revealing itself in the world ofContinue Reading

TIGTA – IRS Full Compliance With Trusted Internet Connection Requirements Is Progressing

Full Compliance With Trusted Internet Connection Requirements Is Progressing; However, Improvements Would Strengthen Security. September 17, 2013. Reference Number: 2013-20-107. Treasury Inspector General for Tax Administration “The Trusted Internet Connection (TIC) initiative is one of the Administration’s three priorities to information improve cybersecurity and the security of Federal information systems. The TIC initiative aims to improve agencies’ security postureContinue Reading

IRS Case Processing Delays and Tax Account Errors Increased Hardship for Victims of ID Theft

Treasury Inspector General for Tax Administration: Case Processing Delays and Tax Account Errors Increased Hardship for Victims of Identity Theft – September 26, 2013, Reference Number: 2013-40-129. “It took the Internal Revenue Service (IRS) an average of 312 days to resolve tax-related identity theft cases, according to a new report released by the Treasury InspectorContinue Reading

NIST Releases Preliminary Cybersecurity Framework

Improving Critical Infrastructure Cybersecurity - Executive Order 13636 - Preliminary Cybersecurity Framework - November 1, 2013 [snipped] “The Framework Core is a set of cybersecurity activities and references that are common across critical infrastructure sectors organized around particular outcomes. The Core presents standards and best practices in a manner that allows for communication of cybersecurity risk across the organizationContinue Reading

CRS – Cybersecurity: Authoritative Reports and Resources

Cybersecurity:  Authoritative Reports and Resources - Rita Tehan, Information Research Specialist. October 25, 2013 “Cybersecurity is a sprawling topic that includes national, international, government, and private  industry dimensions. In the 113th Congress, 5 bills have been introduced in the Senate and 7 in the House. More than 40 bills and resolutions with provisions related to cybersecurity were introduced inContinue Reading

Phishing Activity Trends Report – 1st Qtr 2013

“The APWG Phishing Activity Trends Report [published July 23, 2013] analyzes phishing attacks reported to the APWG by its member companies, its Global Research Partners, through the organization’s website, and by e-mail submissions to APWG also measures the evolution, proliferation , and propagation of crimeware by drawing from the research of our member companies.Continue Reading

Five indicted in NJ for largest known data breach conspiracy

News release: “A federal indictment made public today in New Jersey charges five men with conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole more than 160 million credit card numbers, resulted in hundreds of millions of dollars in losses and is the largest such scheme ever prosecuted inContinue Reading

Prevent and Report Identity Theft

“Tax ID theft occurs when someone uses your personal information such as your name, Social Security number (SSN), or other identifying information to file a tax return fraudulently and claim a refund early in the filing season. If you believe someone has used your SSN fraudulently, contact the IRS immediately at 1-800-908-4490. You will needContinue Reading

FTC Issues Revised Business Guide on ‘Red Flags’ Identity Theft Rule

News release: “The Federal Trade Commission has issued revised guidance designed to help businesses comply with the requirements of the Red Flags Rule, which protects consumers by requiring businesses to watch for and respond to warning signs or “red flags” of identity theft. The guidance outlines which businesses – financial institutions and some creditors –Continue Reading

EFF – How to Enable Two-Factor Authentication on Twitter (And Everywhere Else)

EFF, Parker Higgins: “Twitter rolled out two-factor authentication last week, joining a growing group of tech companies to support the important security feature. Two-factor authentication can help mitigate the damage of a password breach or phishing attack…Twitter has named its two-factor authentication system “Login Verification,” and its announcement provides a straightforward guide on how and why to useContinue Reading

2013 Data Breach Investigations Report

“Verizon’’s 2013 Data Breach Investigations Report (DBIR) provides truly global insights into the nature of data breaches that can help organizations of all sizes to better understand the threat and take the necessary steps to protect themselves. The breadth and depth of data represented in this year’s DBIR is unprecedented. It combines the efforts ofContinue Reading

IRS Releases the Dirty Dozen Tax Scams for 2013

News release: “The Internal Revenue Service…issued its annual “Dirty Dozen” list of tax scams, reminding taxpayers to use caution during tax season to protect themselves against a wide range of schemes ranging from identity theft to return preparer fraud. The Dirty Dozen listing, compiled by the IRS each year, lists a variety of common scamsContinue Reading