Blog Posts Tagged with "Identity Theft"
Top Five Vishing Techniques
December 17, 2010 Added by:Robert Siciliano
The name comes from “voice,” and “phishing,” which is, of course, the use of spoofed emails designed to trick targets into clicking malicious links. Instead of email, vishing generally relies on automated phone calls, which instruct targets to provide account numbers...
Comments (0)
Report: Identity Theft Dings U.S. Victims for $17 Billion
December 16, 2010 Added by:Headlines
The total cost to U.S. victims of identity theft is estimated to be a staggering $17 Billion dollars, according to a report issued by The Bureau of Justice Statistics (BJS). The monumental sum includes direct losses to fraudsters and out-of-pocket costs in the aftermath of an incident...
Comments (0)
Universities Produce Paydirt for Criminal Hackers
December 13, 2010 Added by:Headlines
Criminal hackers have found Universities to be a prime target in their efforts to amass confidential details that can be employed in identity theft rackets. According to a report by AppSec, 2.3 million records have been illegally accessed at 158 institutions in the United Sates since 2008...
Comments (0)
Botnets Can Lead to Your Identity Theft
December 08, 2010 Added by:Robert Siciliano
Networks of bots, otherwise known as drones or zombies, are often used to commit cybercrime. This can include “stealing trade secrets, inserting malware into source code files, disrupting access or service, compromising data integrity, and stealing employee identity information...
Comments (0)
IRS Remains Fully Reliant on Social Security Numbers
December 05, 2010 Added by:Robert Siciliano
At present, the IRS, along with many other government agencies and corporations, relies on Social Security numbers and will do so for years to come. This continued reliance will inevitably result in additional data breaches and therefore, more stolen identities...
Comments (0)
Leaked Social Security Numbers Put Personal Security at Risk
November 30, 2010 Added by:Robert Siciliano
Every city, state, and town has its own set of regulations determining the collection and management of public records, including birth, death, marriage, court, property, and business filings. Many of these documents include Social Security numbers. And many are posted on the Internet...
Comments (0)
Spear Phishers Know Your Name
November 27, 2010 Added by:Robert Siciliano
When phishing attacks are directed at company officers or senior executives, it’s called whaling, appropriately enough. I don’t know who sits around and coins this stuff but it makes analogical sense. Spear phishers target their victims in a number of ways...
Comments (0)
Phishing Scammers Getting a Jump on Tax Season
November 22, 2010 Added by:Headlines
Recent alerts concern emails purported to be sent from the Electronic Funds Transfer Payment System which inform the recipient that there is a problem with their tax payments. The email contains a link to a spoofed website that contains malicious malware that will infect the visitor's computer...
Comments (0)
15 Facebook Fiascos to Watch Out For
November 22, 2010 Added by:Robert Siciliano
If you think for one second that what you post on Facebook is for you and your friends’ eyes only, you simply don’t understand how the Internet works. Many sites are capable of pulling data from the bowels of Facebook, despite any privacy settings you may have in place...
Comments (0)
Savvy and Secure Shopping for the Holiday Season
November 19, 2010 Added by:Theresa Payton
Before you start your online shopping, make sure you have the latest web browser and update your virus protection. Avoid making purchases if you are using free wireless and you cannot validate the security and privacy of your transaction. Never give payment or personal information via email...
Comments (1)
Colorado Supreme Court: Stolen SSN is not ID Theft
November 18, 2010 Added by:Robert Siciliano
The court ruled that since he had used his real name, and the Social Security number was only one of many pieces of identifying information, he did not assume a false identity, and did not hold himself out to be another person. The use of a false Social Security number is irrelevant..
Comments (2)
Ten Worst Places for Your Social Security Number
November 08, 2010 Added by:Robert Siciliano
Thirty-two percent of all ID theft victims had their social security number compromised according to Javelin’s 2010 Identity Fraud Survey Report. In honor of National Identity Protection week, McAfee set out to reveal the most dangerous places to leave your social security number...
Comments (1)
Identity Theft Consumer Education is Paramount
October 26, 2010 Added by:Robert Siciliano
Everything from phishing emails, spoofed websites, un-patched or unprotected PCs, open wireless connections, lack of attention to statements, not shredding data, too much information in a wallet, and overall lack of attention to personal security allows fraud to flourish...
Comments (0)
Five Ways Identities Are Stolen Online
October 22, 2010 Added by:Robert Siciliano
Cybercrime has become a trillion dollar issue. In a recent survey, hundreds of companies around the world estimated that they had lost a combined $4.6 billion in intellectual property as a result of data breaches, and spent approximately $600 million repairing the damage. Based on these numbers, McAfee projects that companies lost more than a trillion dollars in the last year.
Comments (1)
A New Twist on Identity Theft Hits Home
October 16, 2010 Added by:Theresa Payton
The report indicates that alleged scammers hacked into Mildenhall's email account. From there they were able to get to his personal and property documents. They sold the house and sent the cash to bank accounts in China. In the meantime, Roger Mildenhall, is half a million dollars poorer...
Comments (7)
Half Billion Records Breached in 5 Years
October 14, 2010 Added by:Robert Siciliano
Hackers are no longer wreaking havoc for its own sake, deleting files, or tormenting IT administrators. Now, they’re stealing proprietary data. Instead of fun and fame, today’s hackers are motivated by illegal financial gain...
Comments (0)
- The Rise of Ransomware and the Consequences for SMBs
- Trump Administration Starts the Ball Rolling with the National Cyber Strategy
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them