Identity theft

Results: 6705



#Item
991Details of 50,000 Uber drivers breached The Financial Times By Sarah Mishkin February 27, 2015 The personal information of about 50,000 Uber drivers has been accessed by an unknown third party, in one of the largest data

Details of 50,000 Uber drivers breached The Financial Times By Sarah Mishkin February 27, 2015 The personal information of about 50,000 Uber drivers has been accessed by an unknown third party, in one of the largest data

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-03-03 18:14:01
992INFORMATION TECHNOLOGY IN DEVELOPING COUNTRIES A Newsletter of the International Federation for Information Processing Working Group 9.4 and

INFORMATION TECHNOLOGY IN DEVELOPING COUNTRIES A Newsletter of the International Federation for Information Processing Working Group 9.4 and

Add to Reading List

Source URL: www.iimahd.ernet.in

Language: English - Date: 2012-11-29 07:57:26
993TAKE CONTROL  Lock & Key A practical guide to protecting yourself & your assets  What does ‘mutual’ mean to me?

TAKE CONTROL Lock & Key A practical guide to protecting yourself & your assets What does ‘mutual’ mean to me?

Add to Reading List

Source URL: assets.firecu.com.au

Language: English - Date: 2013-10-28 05:51:15
994Learning from Early Attempts to Measure Information Security Performance Jing Zhang1 , Robin Berthier2 , Will Rhee3 , Michael Bailey1 , Partha Pal4 , Farnam Jahanian1 , and William H. Sanders2 1 Dept.  of Computer Scienc

Learning from Early Attempts to Measure Information Security Performance Jing Zhang1 , Robin Berthier2 , Will Rhee3 , Michael Bailey1 , Partha Pal4 , Farnam Jahanian1 , and William H. Sanders2 1 Dept. of Computer Scienc

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:18
995Explaining International Leadership: Electronic Identification Systems BY DANIEL CASTRO  SEPTEMBER 2011

Explaining International Leadership: Electronic Identification Systems BY DANIEL CASTRO SEPTEMBER 2011

Add to Reading List

Source URL: www.itif.org

Language: English - Date: 2013-01-11 14:42:25
996NB pro seminar on the Sony hack

NB pro seminar on the Sony hack

Add to Reading List

Source URL: www.noticebored.com

Language: English - Date: 2015-03-12 16:50:13
997FFO for the 2015 NSTIC pilots

FFO for the 2015 NSTIC pilots

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-02-11 17:04:10
998whitepaper: SMEs and Cyber Heists  SMEs and Cyber Heists CYBER CRIMINALS NOW TARGET SMALL / MEDIUM ENTERPRISES LACKING SOPHISTICATION AND APPROPRIATE SECURITY, SMES MAKE GREAT TARGETS FOR CYBER GANGS

whitepaper: SMEs and Cyber Heists SMEs and Cyber Heists CYBER CRIMINALS NOW TARGET SMALL / MEDIUM ENTERPRISES LACKING SOPHISTICATION AND APPROPRIATE SECURITY, SMES MAKE GREAT TARGETS FOR CYBER GANGS

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2012-01-17 14:15:16
999IronPro® Credit Monitoring versus Identity Monitoring By: Kurtis E. Suhs Vice President / Technology E&O & Privacy National Practice Leader Ironshore Insurance Services, LLC

IronPro® Credit Monitoring versus Identity Monitoring By: Kurtis E. Suhs Vice President / Technology E&O & Privacy National Practice Leader Ironshore Insurance Services, LLC

Add to Reading List

Source URL: www.ironshore.com

Language: English - Date: 2014-06-10 10:04:43
1000NEWS RELEASE FOR IMMEDIATE RELEASE State Agencies Collaborate to Educate Hoosiers About Identity Theft INDIANAPOLIS (Jan. 13, 2014) — Identity theft is a problem that increases every year. More Americans’ identities

NEWS RELEASE FOR IMMEDIATE RELEASE State Agencies Collaborate to Educate Hoosiers About Identity Theft INDIANAPOLIS (Jan. 13, 2014) — Identity theft is a problem that increases every year. More Americans’ identities

Add to Reading List

Source URL: www.ai.org

Language: English - Date: 2015-04-16 11:08:28