07:47 PM
George V. Hulme
George V. Hulme

Protecting Your Identity: It's About Much More Than Tech

When thinking about identity theft, we often get caught up in the big retail hacks, the lost and unencrypted backup tapes, and how we interact with Web sites. But that's often the wrong focus. Here's why.

When thinking about identity theft, we often get caught up in the big retail hacks, the lost and unencrypted backup tapes, and how we interact with Web sites. But that's often the wrong focus. Here's why.I just read a story in the Mille Lacs County Times about a case of identity theft. The couple in this story pleaded guilty to numerous identity theft charges in federal court. Nothing especially out of the norm there, but the lesson to be learned is in how they were accused of doing it.

The couple pleaded to stealing mail, documents, blank checks, account information, and a slew of other types of documents. They allegedly created counterfeit checks and defrauded merchants from about $50,000 is stuff and services.

The story is available here. Here's how it looks like they were caught:

In September 2006, the Benton County Sheriff's Office searched a vehicle that had been occupied by the couple just moments earlier. Authorities seized documents pertaining to other individuals, including passports, birth certificates, bank statements, credit cards, completed checks, blank checks, motor vehicle certificates, and driver's licenses.

In March 2007, authorities executed a search warrant at the couple's home in Ramsey where they seized numerous checks without information, computer discs containing check writing software, four laptop computers, printers, lamination devices, and stolen mail.

The gist of the story: Low-tech means were used to capture information to be used for identity theft and merchant fraud, while some high-tech equipment was used to create false documents.

The moral: Don't leave documents with sensitive or personal information lying around, and shred any sensitive documents before tossing them into the trash.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-07-27
The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.

Published: 2015-07-26
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space cha...

Published: 2015-07-26
The ff_mjpeg_decode_sof function in libavcodec/mjpegdec.c in FFmpeg before 2.5.4 does not validate the number of components in a JPEG-LS Start Of Frame segment, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via craft...

Published: 2015-07-26
Honeywell Tuxedo Touch before relies on client-side authentication involving JavaScript, which allows remote attackers to bypass intended access restrictions by removing USERACCT requests from the client-server data stream.

Published: 2015-07-26
Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch before allows remote attackers to hijack the authentication of arbitrary users for requests associated with home-automation commands, as demonstrated by a door-unlock command.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!