Protect Yourself From Credential Stuffing

Protect Yourself From Credential Stuffing

If you are reusing the same username and password for multiple apps and websites—you may be at risk of a potential cyber threat called credential stuffing. What is credential stuffing? Credential stuffing occurs when hackers use stolen information, such as usernames...

read more
Identity Theft and Fraud: The Differences

Identity Theft and Fraud: The Differences

By Jamie Wagner, Ph.D. Protecting Your Identity In today’s world of data breaches, compromised passwords and credit card fraud we’ve become accustomed to the idea of identity theft and identity fraud. It’s become so status quo that those two phrases are interchanged...

read more