Do credit monitoring and ID protection services do much for breach victims?

It has become a staple for companies that are hit by big data breaches: extending free crediting monitoring and identity protection services to customers whose sensitive personal information is at risk. There’s nothing wrong with companies doing that, say consumer advocates — but those advocacy groups also say breached companies can do much, much better. The latest company to get hit by hackers and then offer credit monitoring or identity protection services, Geico, last week outlined a package that’s a little improved above the usual versions, one advocate said. These existing services seem to offer help, yet in some cases that benefit is limited and in others it’s difficult to measure their effectiveness. But overall, there’s little incentive for companies to offer improved redress, consumer advocacy groups contend. “Most breached entities go with credit monitoring because it’s a relatively inexpensive thing for someone to contract with to provide,” said Susan […]

The post Do credit monitoring and ID protection services do much for breach victims? appeared first on CyberScoop.

Continue reading Do credit monitoring and ID protection services do much for breach victims?

Send a Picture of my ID and a selfie of me holding it to a Questionable Website

Some website asked for the verification of my identity to make a purchase of online goods. I didn’t think twice and send them a picture of both sides of my country’s ID (not USA) and a selfie holding it to the website asked to submit. When… Continue reading Send a Picture of my ID and a selfie of me holding it to a Questionable Website

Smashing Security podcast #221: God bless his hairy palms

FatFace stumps up $2 million to its ransomware extortionists, an IT administrator is caught with his pants down, Mobikwik blames its users for a data breach, and we burgle a house… virtually.

All this and much much more is discussed in the latest … Continue reading Smashing Security podcast #221: God bless his hairy palms

The importance of a zero trust-based approach to identity security

97 percent of senior security executives say attackers are increasingly trying to steal one or more types of credentials, a CyberArk survey reveals. As organizations move assets to the cloud, increase third-party access to corporate resources, and enab… Continue reading The importance of a zero trust-based approach to identity security

Total combined fraud losses climbed to $56 billion in 2020

While total combined fraud losses climbed to $56 billion in 2020, identity fraud scams accounted for $43 billion of that cost. Traditional identity fraud losses totaled $13 billion, Javelin Strategy & Research reveals. With traditional fraud, cons… Continue reading Total combined fraud losses climbed to $56 billion in 2020

How to stay ahead of the rise of synthetic fraud

While banks have been successful in reducing card fraud in recent years, a new and rising threat has emerged: synthetic identity fraud. By combining real and falsified information on digital platforms, financial criminals have been able to commit this … Continue reading How to stay ahead of the rise of synthetic fraud

The cost of synthetic fraud to reach new highs

A TransUnion research finds instances of synthetic fraud and outstanding balances for suspected synthetic accounts at U.S. financial institutions have declined significantly after the WHO declared COVID-19 a global pandemic. However, new analysis by Ai… Continue reading The cost of synthetic fraud to reach new highs

Smashing Security podcast #213: No security smarts at Mensa, long-term identity theft, and GameStop’s share frenzy

Mensa – the social club for people with high IQs – is accused of not being so smart about security, an Indian TV journalist gets an unbelievable job offer from Harvard, and we take a look at what’s being going on with GameStop short selling.

All thi… Continue reading Smashing Security podcast #213: No security smarts at Mensa, long-term identity theft, and GameStop’s share frenzy

Consider the Human Angle in Your Threat Modeling

When it comes to threat modeling, many businesses plan as if there were only a few possible scenarios in which cybersecurity or privacy-related incidents could occur. We need to plan for more cybersecurity hazards than just basic social engineering, insider threats and product vulnerabilities. Both our businesses and our customers face threats that are messier than […]

The post Consider the Human Angle in Your Threat Modeling appeared first on Security Intelligence.

Continue reading Consider the Human Angle in Your Threat Modeling