You are here:-Admin

About Admin

This author has not yet filled in any details.
So far Admin has created 13 blog entries.

Identity Theft from Cell Phones

Intercepting data from your cell phone can be done as easily as getting you to log into a "Free Wifi" network.  As soon as you sign in to a network, any data that you send through the connection can be captured and used.  When you sign into a new network on your laptop, Windows automatically

By | October 11th, 2015|Categories: News|Tags: , , , |0 Comments

Can Pictures Be An Identity Theft Risk?

A picture is worth a thousand words and could even be worth a few thousand dollars from your bank account.  An image of your face matched with your name has never been more dangerous for scams than in today's technological environment.  Fake social media accounts with your face and name can be used as bait

By | October 11th, 2015|Categories: News|Tags: |0 Comments

Tutorials and Guides Coming Soon!

Identity Theft Recovery Center will be providing Tutorials and Guides from professionals about what to do with your identity theft issues.  Please check back soon!

By | October 11th, 2015|Categories: Tutorials|Tags: , , , |0 Comments