Search By Topic:

Popular Topics:



News & Features | Mar 29th, 2011

Actress Rose McGowan Nabs Cybercrook After ‘Violating and Frustrating’ Online Identity Theft

Elaine Rigoli

Celebrity Rose McGowan recently came out publicly as a victim of online identity theft.

McGowan’s email account was hacked, with the thief intercepting all of her messages and gaining access to all of her vital personal information.

She told the show Entertainment Tonight:

"For the last six months, somebody created an email and all of my emails -- incoming and outgoing -- have been going to this email, whoever that person is. It’s very violating and it’s frustrating.”

The actress worked with authorities to catch the man who stole her identity by sending her personal correspondence to a mystery location. Luckily, they were able to catch the man responsible for this crime.

Hacking for the Thrill of It

The sad reality is that what happened to Rose McGowan is not an isolated incident.

In fact, the FBI is conducting a wide-ranging investigation to determine who is hacking more than 100 celebrities’ email accounts and mobile devices for the "thrill" of selling the stars’ personal details, photographs, and other identifiable information.

According to, the FBI met with actress Vanessa Hudgens at her lawyer's office for more than an hour to get some leads into who is victimizing her and other A-list celebs like Natalie Portman, Jessica Alba, Selena Gomez, Scarlett Johansson, and Miley Cyrus.

Fox Anchor ‘Locked Out’ After Email Identity Theft

If it’s happening to all those celebrities and other public figures, how can you ensure it’s not happening to you?

Just listen to the crazy tale of what happened to Fox News anchor Dave Briggs. Despite the giggles among the anchors in the video below, what happened to Briggs was incredibly serious. The news team interviews security analyst Robert Siciliano about how easy it was “for one slimy person” to accomplish hacking into his email.

Siciliano, an industry expert with The Identity Theft Resource Center®, suggested that somewhere along the line, Dave's password was compromised, his account was hacked, or he may have accessed email in a public wifi hotspot.

A still-shaken Briggs asks Siciliano what he should have done, as the hacker “changed my personal questions and changed my passwords, I was locked out. What are you supposed to? No one would help me!”

Watch the video to learn what to do if this ever happens to you:


Associated Topics:

Associated Topics:


Related Posts

Cyber Security Training Just As Important at C-Level

Thought Leadership
Eva Velasquez | Mar 24th, 2015

The need for better online safety training to prevent data breaches is a hot topic right now. Coupled with stronger computer and network policies, companies want to prevent the hacking events that leave businesses susceptible to a data breach. While it’s no secret that employees in both the private sector and government service can unintentionally expose organizations to hackers, what is surprising is a report by Wombat Security that shows that 33% of CEOs fell for phishing attacks that led to network access. Why are they falling for this kind of internet activity? Read More

E-filing: The Fastest and Safest Way to File Taxes?

Thought Leadership
Eva Velasquez | Mar 9th, 2015

E-filing your annual return to the IRS offers speed and convenience and when coupled with industry-approved software that can plug in the values for you, a lot of the headaches traditionally associated with doing your taxes are eliminated. However, there are some potential dangers that you should be aware of, such as insecure public WiFi networks and online tax fraud. Read More

How Are You Celebrating Safer Internet Day 2015?

News & Features
Jared Howe | Feb 9th, 2015

Safer Internet Day (SID), which falls on February 10th this year, helps promote safe and more responsible use of technology and mobile phones, especially for young children and teenagers.  This day of awareness and education gets more important every year because, for better or worse, the Internet is a part of our everyday lives.

Read on to get more involved. Read More

How To: Managing Your Xoom Security

Jared Howe | Jan 23rd, 2015

Motorola’s Xoom tablet is a powerful tool, but it’s also a security risk. Below are some simple rules you can follow to make sure your Xoom security is kept at a high level.

Lock Your Screen

You can lock your Read More


Thank you for subscribing to our newsletters

Your email has been added to our system. You will be e-mailed shortly with a request to confirm your membership. Please make sure to click the link in that message to confirm your subscription.