security

identity fraud

How identity fraudsters operate

A notorious cyberthief turned security consultant walks us through the “synthetic identity fraud” process, from searching the Dark Web to pulling credit reports to opening accounts.
Twitter

5 Twitter do’s and don’ts

From verifying link destinations to being cautious about what you share, social-media privacy expert Hayley Kaplan outlines how to safely use President Trump’s favorite pulpit.