Get a Pentest and security assessment of your IT network.

News

How Identity Theft Works

It’s still pretty easy for a good social engineer to steal an identity and exploit it swiftly. Identity thieves can collect data from many sources, including trash and recycling bins, discarded mail. IT organizations should never use online resources that are widely available over the Web. Sites that deal with family reunions, genealogy, and sports statistics may seem harmless, but they can become great resources for valuable personal data. IT departments should constantly monitor themselves for vulnerabilities, says author. A vulnerability can often be found in a system that may seem to be relatively unimportant to the enterprise.”]

Source: https://www.darkreading.com/analytics/how-identity-theft-works

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin