A Massachusetts man found himself trying to prove his identity this spring after a facial recognition system pegged his driver's license as a fake. The problem: He wasn't using a fake license. He merely looked like another driver.
An FBI agent who posed as a cybercriminal named for a Teenage Mutant Ninja Turtles character talks about how he helped bring down a worldwide network of identity thieves, got a rep as a most-wanted spammer without having to spam, and dealt with all the egos in the world of Internet thugs.
Also in today's links: swimming in chemicals, rescuing frogs and more.
I like to think I'm protective of my sensitive personal info. I rip bills and credit card offers into confetti before throwing them out, I never give out my Social Security number, and I can spot a phishing scheme with the best of them. But I've recently come to realize that the safeguarding of my most intimate personal details is completely out of my hands.
Upcoming ways to foil hackers and catch computer thieves
By Matt SchneidermanPosted 06.25.2008 at 12:53 pm 1 Comment
Identity theft used to involve someone rifling through your garbage. But now more than half a million laptops—full of tax returns and love letters—are stolen every year, estimates computer insurer Safeware. And even if your computer never leaves your sight, hackers can weasel into it over the Internet. Here are three technologies that will safeguard your digital data, whether it's on an office desktop or a stolen laptop.
During a week of attempting to cloak every aspect of daily life, our correspondent found that in an information age, leaving no trace is nearly impossible
By Catherine PricePosted 02.08.2008 at 12:51 pm 75 Comments
In 2006, David Holtzman decided to do an experiment. Holtzman, a security consultant and former intelligence analyst, was working on a book about privacy, and he wanted to see how much he could find out about himself from sources available to any tenacious stalker. So he did background checks. He pulled his credit file. He looked at Amazon.com transactions and his credit-card and telephone bills. He got his DNA analyzed and kept a log of all the people he called and e-mailed, along with the Web sites he visited.