Buy the books at
www.amazon.com/author/paulbabicki
====================================================
Identity thieves used stolen data 9
minutes after it was posted online
money.cnn.com
by Selena Larson @selenalarson
May 26, 2017: 12:43 PM ET
When personal data is dumped online,
it can take just nine minutes for bad guys to start using it, according to a
report from the Federal Trade Commission.
Over the course of three weeks in April and May, the FTC analyzed what happens when hacked personal data is shared
online.
Researchers created 100 fake consumers and gave them
fictitious personal information like names, emails and passwords, and either a
credit card, Bitcoin wallet, or online payment account. Then they posted the
collection of data on a site popular with leaking stolen credentials, once on
April 27 and a second time on May 4.
According to Dan Salsburg, acting chief at the FTC's Office
of Technology Research and Investigation, the the FTC observed two types of
identity thieves -- those who want to test credit cards' authenticity to resell
them, and those who tried making big purchases on things like clothing or
hotels.
"There are people laying there in wait, ready to pounce
on stolen credentials," Salsburg told CNNTech.
Nine minutes after the publication on May 4, thieves began
using the data -- a Twitter (TWTR,
Tech30)
bot picked up the posting, which could have helped speed up hacking attempts.
On April 27, it took one and a half hours before the fake credentials were
used.
All told, there were over 1,200 attempts to access accounts
belonging to the fake consumers. That includes a total of $12,825.53 attempted
credit card purchases and 493 attempts to access emails.
There are ways you can prevent cybercriminals from using
your data, even if it's published online. Salsburg said some of the test accounts
were protected by two-factor authentication, a security feature that requires a
second code in addition to your password (usually texted to your phone) to log
in to your account.
It's not a perfect solution -- if your phone gets stolen,
thieves could have access to your backup codes. But it is a simple and
effective security tool.
Identity thieves did not access the fake
accounts with two-factor authentication enabled +++++++++++++++++++++++++++++++++++++++++++++++++++++=================================
Good Netiquette And A Green Internet To All! =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting.
We can be contacted at:
===============================================================In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
www.amazon.com/author/paulbabicki
Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
Additionally, I am the president of Tabula Rosa Systems,
a “best of breed” reseller of products for communications, email,
network management software, security products and professional
services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology market.