NCSAM is back for another year, let us see what we can get in to … starting with Identity Theft from blog The Technology blog and podcast
This is for the technology blog and podcast Commentary, articles, and podcasts
NCSAM is back for another year, let us see what we can get in to … starting with Identity Theft
Folks, NCSAM or National Cyber Security Awareness Month is now back for another year. This year has been quite different because of COVID-19 and of course the wild fires around the western United States that has consumed our lives as well.
I want to start this month with an identity theft article which we’ll also talk about in the next Security Box. More specifically, this is talking about identity fraud, not theft per see, but still worth talking about.
The article does talk about covid-19 and the fact that we’re now online more than ever. This is because we can’t go anywhere, and some states have relaxed those rules though but I’d still be caucious. With the advant of us spending more time online, we have more risks.
The bottom line is that personally identifiable information (PII) is the currency of internet crime. And cyber-criminals will do whatever they can to get
their hands on it. When they commit identity theft with this data, it can be a messy business, potentially taking months for banks and businesses to investigate
before you get your money and credit rating back. At a time of extreme financial hardship, this is the last thing anyone needs.
I can’t agree more! I believe this is the perfect paragraph to quote because it is more true this year than in past years. I’m not saying that Identity theft or fraud was not a problem last year, the year before, or even the year before that. We just need to be more proactive now because we’re not outside enjoying the weather, doing our outdoor activities, and seening friends and family.
At-risk personal data could be anything from email and account log-ins to medical info, SSNs, card and bank details, insurance details and much more. It
all has a value on the cybercrime underground and the price fraudsters are prepared to pay will depend on supply and demand, just like in the ‘real’ world.
The question is, how would we be able to scour to see if we’re at risk? Well, there is TOR which is a browser that allows you to connect to addresses ending in onion. You actually need to know what these addresses are, and there is no Google like service to search these things out.
According to one blind individual who did use TOR once, they claim that it is accessible with access technology. The person, who will not be named in this article, does not use the service anymore, and I’ve asked them to come on and talk about their experience of usage, not necessarily what they found. So far, they have declined to do this, and I honestly do not blame them. It is a slippery slope that I definitely would probably not want to touch if I were asked, and I’ve never pushed the issue. The TOR project linked within this article is where you can learn more.
Here is some other information taken from this article which is why I want to cover it in depth.
There are various ways for attackers to get your data. The main ones are:
- Phishing: usually aimed at stealing your log-ins or tricking you into downloading keylogging or other info-stealing malware. Phishing mainly happens
via email but could also occur via web, text, or phone. Around $667m was lost in imposter scams last year, according to the
FTC.- Malicious mobile apps disguised as legitimate software.
- Eavesdropping on social media: If you overshare even innocuous personal data (pet names, birth dates, etc.,) it could be used by fraudsters to access
your accounts.- Public Wi-Fi eavesdropping: If you’re using it, the bad guys may be too.
- Dumpster diving and shoulder surfing: Sometimes the old ways are still popular.
- Stealing devices or finding lost/misplaced devices in public places.
- Attacking the organizations you interact with: Unfortunately this is out of your control somewhat, but it’s no less serious. There were 1,473 reported
corporate breaches in 2019, up 17% year-on-year.- Harvesting card details covertly from the sites you shop with. Incidents involving this kind of “web skimming”
increased 26% in March as more users flocked to e-commerce sites during lockdown.
There are links within this section which were removed from copy/paste, so I highly encourage you to click through to read the entire article.
The article goes on more to talk about the covid-19 challenge. Phishers and other actors are going to dull out information that talks about remedies and other possible credible info that they want to pass along. They do this by impersinating trusted agencies such as the CDC, the WHO, and other institutions that are trying to get out the information dealing with this virus. While people may question the WHO’s involvement in this ordeal, this is not what this post is about.
There is an entire article to read here, and I can’t cover every single thing here that I’d love to cover as part of the podcast. I don’t think I can even do that either. Just go on over and read the great article by Trend Micro entitled Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis and I’m sure we’ll be bringing this up for a nice debate on the podcast. Please stay safe, read the information provided, and learn what you can possibly do so you’re not a target that falls for these schemes. Remember, just because the FBI may have taken fraudulent products and merchandise off the market and out of the criminals hands for now, doesn’t mean they’ll try and come up with more and put up web sites and other ways of selling it in the future.
Want to talk about this? Please get in touch! The blog awaits comments, my email box is open, and awaiting your interaction. Text, imessage, Whats App, and other info is gathered for everyone throughout my web site. Thanks so much for reading!
Informazioni sull'articolo
NCSAM is back for another year, let us see what we can get in to … starting with Identity Theft was released on October 2, 2020 at 1:00 pm by tech in article commentary.
Last modified: October 2, 2020.
Comments (0)
No comments yet.
Leave a comment
You must be logged in to post a comment.
navigation menu
- Archives
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- Categories of this blog
- Subscribe to Blog via Email
- The tech blog’s pages
- Blogroll