|
|
ICT-Hotlist Topic
New Intel security report about online marketplaces for account and financial information.
Published : 2015-11-23.
Last updated : 2017-05-02.
A very interesting report: "The Hidden Data Economy, The Marketplace for Stolen Digital Information" about:
- Hidden in Plain Sight: The stolen data used to be available on hard to find hidden sites.
The report shows the data is a lot easier to find.
Your stolen data is thus available for more and more (mis)users.
- Financial Data: Think of payment card data including CVV data
and passwords. Sellers even provide information (references) to show that
they are reliable thieves and can be trusted to provide the sold data.
- Login Access: Accounts sold that provide access to organisations trusted
networks at different levels and to production plants.
- Access to Online Services: Accounts that provide access to music sites,
streaming services and loyalty programs that probably can be used on
other sites.
(Password Rule:Do not use the same account and password for all the websites)
- Identities: Stolen identities is the most frightening category, where
someone can take over your financial life and or missuse you health information.
This report was researched and written for Intel security (McAfee) by:
- Charles McFarland
- François Paget
- Raj Samani
Scripts and programming examples disclaimer
Unless stated otherwise, the script sources and programming examples provided are copyrighted freeware.
You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation.
However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data.
Make sure you have verified full backups and the associated restore software available before running any script or programming example.
Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
|