{"id":2174,"date":"2007-01-17T00:00:00","date_gmt":"2007-01-17T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/01\/17\/mcafee-inc-reports-on-online-identity-theft-trends\/"},"modified":"2021-12-30T11:40:49","modified_gmt":"2021-12-30T11:40:49","slug":"mcafee-inc-reports-on-online-identity-theft-trends","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/01\/17\/mcafee-inc-reports-on-online-identity-theft-trends\/","title":{"rendered":"McAfee, Inc. Reports On Online Identity Theft Trends"},"content":{"rendered":"<p>McAfee, Inc., announced the availability of a paper from McAfee\u00ae Avert\u00ae Labs highlighting global identity theft trends, including a dramatic increase in online and computer-based identity theft.  According to the report, the number of keyloggers&#8211;malicious software code that tracks typing activity to capture passwords and other private information&#8211;has increased by 250 percent between January 2004 and May 2006.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Identity theft is a global phenomenon that threatens all of us, which means we all need to become more aware, more vigilant and less trusting to protect ourselves,&#8221; said Jeff Green, senior vice president of McAfee Avert Labs.<\/p>\n<p>The white paper reviews identity theft techniques, from non-technical approaches like dumpster diving to sophisticated keyloggers that monitor computer keyboard keystrokes to steal online usernames and passwords.  The McAfee Avert Labs white paper concludes with practical guidelines for preventing identity theft and minimising the risks of being victimised.<\/p>\n<p>http:\/\/www.itbsoftware.com\/pr\/11971<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2174","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2174"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2174\/revisions"}],"predecessor-version":[{"id":4661,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2174\/revisions\/4661"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}