A question for you to consider: Imagine a world where music is created by a random set of numbers. Who owns the music? Is it the programmer? Is it the user who gave specifications for the music? It’s certainly an odd question to ask, and unsurprisingly, one without a clear…
Articles Posted in Technology
The Equifax Breach: Part Four Analysis
As the Equifax breach continues to become a complicated issue, certain lessons can be learned for other businesses handling personal information. Namely, what not to do in their business operations? In the wake of the cybersecurity breach, it had been reported that Equifax was aware of the security gaps, and…
The Equifax Breach: Part Three Analysis
As the Equifax breach has developed recently, another issue has come up, namely the arbitration provision within its website, which has caused consumer outrage and confusion. So, why does this provision matter? If consumers want to get their credit frozen, or check to see if they were affected, surely Equifax…
The Equifax Breach: Part Two Analysis
Let us move on to the ways to protect ourselves in the future by using a credit freeze or fraud alert. These options can protect your personal, private, and confidential information after a security breach and effectively add extra protection against identity theft. We have discussed them briefly in the…
The Equifax Breach: Part One Analysis
Equifax presents an interesting question to consumers. Somehow, an entity that no consumer may have had an actual interaction with has their information, and had leaked it out onto the world. For example, names, phone numbers, credit card numbers, social security numbers, addresses, e-mails were collected and released to unauthorized…
Internet Scams: What Are Your Options?
You may have been considering legal actions due to a recent internet scam. Or, you may be wondering what other options you may have for dealing with the issue outside of the legal sphere. Naturally, legal recourse may provide financial or equitable remedies (e.g., temporary restraining orders) but usually there…
What Are Online Scam Factors?
So, despite your best efforts, you may have been cat-fished, doxed or otherwise victim to an online scam. Your information is probably now out into the Internet and a stranger that you may have trusted now has personally identifying information. So, your next question may be “well, what comes next?”…
What Are Catfishing Motives?
Now that we’ve discussed Catfishing as a scam, let’s go into further detail regarding the motives. Like any scam, there must be some benefit to the scammer. This benefit is the primary motive for anyone to commit a catfishing scam. Previously, we mentioned that among other things, the perpetrator may…
Catfishing Scams
If you have been online, it is possible that a person has attempted to “catfish” you. However, you may not have been able to adequately understand it because you were not looking for the telltale signs. It is a type of an online scam, like phishing, meant to take advantage…
Cryptocurrency and Bitcoin Split
Now, aside from Bitcoin and other digital currencies spawning from video games and consumer-oriented companies, it’s important to be aware that there are other types of digital currencies or so-called “cryptocurrencies.” These operate more similarly to Bitcoin in how they generally lack a centralized system that assigns value (compared to…