- CyberCrime Center
June 10, 2014
For roughly one out of two adult Americans, somewhere on the planet there’s a total stranger who knows more personal things about them than even their own mothers. And we’re not talking about the NSA or Dr. Phil.
CNNMoney had the Ponemon Institute tally up the number of hacked accounts in the USA over the past year. Based on Ponemon Institute research and numbers from the Identity Theft Resource Center, which conducts training and presentations on best practices and risk reduction for business and consumers, 432 million accounts have been hacked. There’s no knowing the exact number because says CNNMoney companies like AOL and eBay “aren’t fully transparent about the details of their cyber breaches.”
In his piece on money.cnn.com, Jose.Pagliery details the breaches that have taken place in the last year, how the nature and perception of hackers has changed, and the effect of ongoing breaches on the public. The following has been edited to fit our format. You can find the complete article by clicking on this link.
Each record typically includes personal information, such as your name, debit or credit card, email, phone number, birthday, password, security questions and physical address.
It’s enough to get hunted down by an abusive ex-spouse. It makes you an easier target for scams. And even if only basic information about you is stolen, that can easily be paired with stolen credit card data, empowering impostors.
Cyberattacks are growing so numerous that we’re becoming numb to them. Researchers at IT company Unisys say we’re now experiencing “data-breach fatigue.” Even the most recent numbers make for a dizzying list:
Why does this keep happening? Shopping, banking and socializing are now chiefly digital endeavors for many people. Stores rely on the Internet to conduct and process all transactions. As a result, your data is everywhere: on your phone, laptop, work PC, website servers and countless retailers’ computer networks.
Second, hacks are getting more sophisticated. Offensive hacking weapons are numerous and cheap. And hackers have learned to quietly roam inside corporate networks for years before setting off any alarms.
Remember the 1990s caricature of a typical hacker? Pierced, Goth and malcontent? Forget it. The age of small time rabble rousing has given way to large-scale theft with targeted, militaristic precision.
“Now attackers are very focused,” said Brendan Hannigan, who leads the security systems division at IBM. “There are teams of them, and they create malware to attack specific organizations.”
It doesn’t help that the security of the entire Internet relies on a few underfunded volunteers. Or that so many people use outdated software, such as Windows XP, which no longer receives security updates. That leads to pervasive problems like the Heartbleed bug or the recent Internet Explorer flaw that allowed attackers to take over your computer.
“It’s becoming more acute,” said Larry Ponemon, head of the Ponemon Institute. “If you’re not a data breach victim, you’re not paying attention.”
ThreatMetrix® builds trust on the Internet by offering market-leading advanced fraud prevention and frictionless context-based security solutions. These solutions authenticate consumer and workforce access to mission critical applications using real-time identity and access analytics that leverage the world’s largest trusted identity network.
ThreatMetrix secures enterprise applications against account takeover, payment fraud, fraudulent account registrations, malware, and data breaches. Underpinning the solution is the ThreatMetrix® Global Trust Intelligence Network, which analyzes over 500 million monthly transactions and protects more than 160 million active user accounts across 2,500 customers and 10,000 websites.
The ThreatMetrix solution is deployed across a variety of industries, including financial services, enterprise, e-commerce, payments, social networks, government and insurance.
For more information, visit www.threatmetrix.com or call 1-408-200-5755.
Posted by Dan Rampe
Tags: Account Takeover, Account Takeover Fraud, Bank Fraud, Botnets, Building Trust on the Internet, CNP fraud, Context-Based Authentication, Cookieless Device Identification, Cookies, Credit Card Fraud, Cyber attacks, Data Breach, Device Detection, Device Fingerprint, Device Fingerprinting, Device ID, Device Identification, Fraud Prevention, Hacking, Identity Spoofing, Identity theft, Malware, Malware Detection, Malware Protection, Man-in-the-Browser Detection, MitB, Mobile fraud, Online Fraud, Phishing, Phishing Detection, PII, ThreatMetrix, ThreatMetrix Cybercrime Index, ThreatMetrix Global Trust Intelligence Network, ThreatMetrix Web Fraud Map, Trust Tags, TrustDefender Cybercrime Protection Platform, Web Fraud