Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
Smartphone use continues to increase. More than one third of Americans have dropped landlines and only use mobiles. It is very possible that within the next 10 years, the landline will be obsolete and...
You’ve been here before: You’re at work, you get a notification via a popup, then an email, then a text reminding you of an appointment on your calendar. For most busy professionals, this is pretty no...
You probably know that iPhones are high on the wish list of thieves all over the country—so much so that data from the New York City Police Department reveals that iPhone and iPad thefts have soared 4...
People talk—A LOT. They can’t stop talking. Talking, getting something off your mind and out there feels good. Talking takes the pressure off one’s mind; our mouths are like relief valves for our head...
Honesty is the best policy, right? I’ve spent my life being honest, and do you know what is the most important lesson I’ve learned is? The truth hurts. And when you (meaning me too) says it like it is...
Just about anything wireless is hackable today. Everything—from PCs to mobiles to tablets to home automation devices to pacemakers to insulin dispensers and even cars—are hackable. And now “smart” toi...
The uber rich have many reasons to invest in uber security. I met a woman who won a $300 million lottery, and she had some unfortunate stories about how low people go to get at and to moneyed individu...
Business or commercial identity theft happens when thieves use an existing business’ name to get credit, or they may bill a business’ clients for products and services. Sometimes the Social Security n...
Identity theft is first and foremost a problem because we rely on numerical identifiers that attach humans to credit and a variety of services. Once a criminal gets hold of those identifiers, he can s...
Encryption is the science of encoding and decoding secret messages. It began as cryptography—the ancient Greeks used it to protect sensitive information that might fall into the hands of their enemie...
Medical identity theft is the deadliest form of identity theft—and I say this without hyperbole or exaggeration. When financial gain is the general motivation for stealing medical information, insuran...
Grey charges: “Deceptive and unwanted credit and debit card charges that occur as a result of misleading sales and billing practices.” Technically, grey charges aren’t considered fraud because the leg...