article thumbnail

IDIQ Names Veteran Michael Scheumack Chief Marketing Officer

Identity IQ

Temecula, California, October 11, 2022 – IDIQ , an industry leader in identity theft protection and credit report monitoring, has named Michael Scheumack to the role of chief marketing officer. IDIQ is a leader in the identity theft protection and credit monitoring space. IdentityIQ. based call center.

article thumbnail

Canadian Flair Airlines left user data leaking for months

Security Affairs

Flyflair.com belongs to the Canadian ultra-low-cost carrier Flair Airlines, founded in 2005. Second, personal information could be used for phishing, identity thefts and other attacks, targeting individuals,” our researchers said. The leak consisted of publicly accessible environment files hosted on the flyflair.com website.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Data Breaches You May Have Missed

Identity IQ

This leaves victims of the data breaches vulnerable to identity theft. These records contained logs of conversations between Microsoft support and customers going back to 2005. Here are five recent data breaches you may have missed. Small Business Administration.

article thumbnail

Scammers, profiteers, and shady sites? It must be tax season

Malwarebytes

In 2005 the domain had switched to an outfit selling software to organize and store files. Remember that a social security number, birth date, and a bank account number is all the information a cyber-criminal needs to perform identity theft. And the consequences of that theft can be devastating.

article thumbnail

Alleged FruitFly malware creator ruled incompetent to stand trial

Malwarebytes

As a member of the club, he competed in a local programming competition, helping the team to win in both 2005 and 2006. Despite this, he was active in extracurricular activities. In high school, he participated in a computer club. During the lengthy trial, it was the child pornography charge that seemed to be of most concern to the defense.

Malware 82
article thumbnail

The 2019 Database Gold Rush

SiteLock

As you can see in the chart below from Statista, data breaches rose more than tenfold between 2005 and 2017. This is valuable personal data that can be used for anything from targeted advertising to identity theft in extreme cases.

Backups 98
article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Cybercriminals can utilize the botnet to carry out malicious activities, such as phishing, identity theft and bypassing security to access private networks. About the essayist: Ashley Lukehart has been writing about the impact of technology and IT security on businesses since starting Parachute in 2005. Less common types.