![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
40 Million People Hacked - YOU as Identity Theft Victim
Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information. As is pointed out by several newspaper and web articles overthe last few weeks, each recapping long lists of financialinformation data breaches, something's gotta give before weentirely lose trust in financial institutions, data brokersand credit bureaus. How much privacy loss can we takewithout acting? These types of data loss were very likely common and havevery probably been going on for a very long time. Thedifference is that now, THEY ARE REQUIRED BY LAW TO DISCLOSETHOSE LOSSES - not just in California, but in many states.National disclosure laws on data security breaches are beingconsidered in Congress. I suggest that these breaches of data security all came tolight due to the California law requiring disclosure fromcompanies suffering hacking loss or leaks or socialengineering or crooked employees or organized crime ringsposing as "legitimate" customers. All of the above have beengiven as reasons for security lapses or poor securitypolicies. About three years ago, a friend told me his paycheck depositto Bank of America went missing from account records afterhe took his check to the bank on Friday. By Monday, Bank ofAmerica was in the news claiming a computer glitch haddisappeared the entire day's deposits. I mumbled to myself,"I'll bet that was a hack and that hacker just made a hugeoffshore banking deposit with B of A depositors' money." But we didn't find out why it happened in that particularcase because there was no disclosure law in place at thetime. Now we have disclosure laws that mandate notice ofsecurity breaches. Now suddenly - huge financial serviceshacks and devious criminal social engineering outfits posingas legitimate customers and apparently "innocent" losses bytransport companies of backup tapes begin to come to light. This spate of data loss incidents is proof of the need forcorporate "sunshine laws" that make public notice mandatoryof those data losses that threaten customer information. Who is going to lose here - the public, the corporations,the criminals, or the government? I'd prefer that the badguys get the shaft and take down crooked company insidersthat either facilitate data loss by underfunding securityand encryption or participate in data theft or loss in anyform - even if that participation is security negligence. Financial companies and data brokers have been covering upthe losses and keeping quiet about hacks so as not to worryor frighten their customers. But that practice isessentially ended now that they must notify the public anddisclose those losses instead of hushing them up. Keeping the breaches hidden from public view is bad practiceas it maintains the status quo. Disclosure will facilitateinternal corporate lockdowns on the data and all access toit. Disclosure will educate the public to the lack ofsecurity and danger to the sensitive information we allprovide rather casually and routinely to businesses. As the following link to a silicon.com story suggests, wecannot take much more of this lack of regard to privacy andmust lock down financially sensitive data securely and mustbegin to hold data brokers, bureaus and handlers VERYaccountable. Insist to your elected representatives that your financialdata be locked down, encrypted and guarded by thoseentrusted with storing, transporting and using it. Since ourfinancial, medical and legal lives are increasingly beinghoused in digital form and transmitted between data centersof multiple handlers - we need to know it is secure. We alsoneed to know when that security has been breached and ourdata compromised or lost. Thieves are becoming more aware of the ease with which theycan find and access financial data. Hacking is not thesource of the greatest losses. Organized crime has easily found their way into ourfinancial records by simply paying for it by posing as"legitimate" business customers of information brokers suchas ChoicePoint and Lexis/Nexis. Any business can buyfinancial and credit information from those informationbureaus and credit reporting agencies by meeting rather laxrequirements for "need to know" that data. As long as it is possible to purchase our sensitive datafrom brokers and bureaus, organized crime will"legitimately" buy it from those sources, then ruin ourcredit by selling that information at a higher price inidentity theft schemes. Since disclosure laws have come into effect, those breacheshave been made public, credit cards cancelled before lossescan occur and credit reports monitored to watch forsuspicious activity. The bad guys activities are squelchedbecause we are made aware of the possibility our informationhas been compromised. Not all blame can go to financial institutions and databrokers. Protect your own private data by protecting yourcomputer records at home, in the office, on your laptop andin your PDA by using basic keyword security and locking downfiles. Use built in encryption on your operating system andyour home network to keep data secure. Then be certain toclear that sensitive data off the computer when you sell itor throw it away. Data security is something we all need to take seriously andthe corporate breaches are dramatic illustrations of howimportant it has become to build digital fortresses aroundour critical financial, legal and medical information. Mike Banks Valentine is a privacy advocate and blogs aboutprivacy issues at PrivacyNotes.comYou can read more about identity theft issues at:Publish101 Contact MikeValentine for Search Engine Optimizationhttp://www.seoptimism.com
MORE RESOURCES: Tallahassee hospital IT security 'event' has signs of ransomware attack Tallahassee Democrat Gazprom security outfit raises concern of new Russia mercenary army Business Insider false The Hill Indonesian security forces search for NZ pilot taken hostage The Associated Press - en Español DoD and Danish Ministry of Defence Sign Security of Supply ... Department of Defense Ukraine: Meeting under the “Threats to International Peace and ... Security Council Report Security Think Tank: Poor training is worse than no training at all ComputerWeekly.com Water security is a national security issue. Here's why World Economic Forum The Worldwide Cyber Security Consulting Services Industry is Anticipated to Reach $8.614 Billion in 2027 Yahoo Finance Remarks at a UN Security Council Briefing called by Russia on ... United States Mission to the United Nations Joint Statement following a UN Security Council meeting on Syria ... United States Mission to the United Nations River Cree Resort and Casino updates security with Genetec Security Magazine Minerals Security Partnership Governments Engage with African ... Department of State Metro Partnering With DC Police to Enhance Security NBC4 Washington Estonian Intelligence Service Warns Of 'Security Risks' From Russia Radio Free Europe / Radio Liberty Governor Abbott Announces Statewide Plan Banning Use Of TikTok Office of the Texas Governor CEO Of Security Company Sentenced To Five Years In Prison For ... Department of Justice Coal emissions must fall, but energy security is vital World Economic Forum Biden Administration Announces Additional Security Assistance for ... Department of Defense New FTX CEO says security so bad execs could have stolen $500M Business Insider President Biden Announces Appointments to the President’s ... The White House Security Beefed Up At Fulton County Courthouse InkFreeNews.com Deputy Secretary Sherman's Meeting with Poland's National ... Department of State St. Lucie County considers new security cameras following deadly mass shooting WPTV News Channel 5 West Palm Memphis Police Chief Trained With Israel Security Forces The Intercept Analysis | Republicans Are Too Thirsty for Social Security Cuts The Washington Post DHS Announces Process Enhancements for Supporting Labor ... Homeland Security Joint Statement by Canada and the United States on NEXUS Homeland Security Musk's Twitter still violates FTC security pact, new whistleblower says The Washington Post 3 Relatives Get Life in Prison for Killing Security Guard Over Mask Dispute The New York Times |
![]() |
![]() |
![]() |
RELATED ARTICLES
Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. Hacking the Body Via PDA Wireless Device First I would like to stress I am condoning the art of hacking. Nor am I condoning the control and manipulation of the human race by way of frequencies interacting with the biological systems, which run the human body. 7 Ways to Spot a PayPal Scam E-Mail Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members. Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800. File Sharing - What You Need to Know! File sharing on p2p is soaring despite the music and movie industryefforts to curb the practice. Regardless of which side of the arguement you are on it is likely that sharing of copyright materialwill continue in one form or another for the foreseeable future. Crack The Code - Thats A Direct Challenge I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. An Open Door To Your Home Wireless Internet Network Security? This is not some new fangled techno-speak, it is a real tool to be used for the protection of your wireless internet network and LAN. African American SMBs have to realize that if your Internet connection is on 24/7 then your network, and it is a network that your computer is connected to, is at risk. Phishing and Pharming: Dangerous Scams As soon as almost all computer users already got used to -- or at least heard about -- the word "phishing", another somewhat confusing word appeared not long ago. Pharming. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Spyware, What It Is, What It Does, And How To Stop It Spyware is software that runs on a personal computer without the knowledge or consent of the owner of that computer. The Spyware then collects personal information about the user or users of the infected computer. Identity Theft Article - A Phisher Is Trying To Steal Your Identity! Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity. Arming Yourself Against Spyware While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware. Why Malicious Programs Spread So Quickly? It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. Network Security 101 As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. Computer Security What is computer security?Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. ![]() |
home | site map |
© 2006 |