Risk

10/27/2009
03:18 AM
Dark Reading
Dark Reading
Quick Hits
50%
50%

Five Vulnerabilities That Lead To Identity Theft

ID theft security vendor offers advice on five key areas that end users should watch

Why do so many users suffer from identity theft? One company that has been studying the problem has identified five key sore spots that often lead to problems, no matter which users are involved.

In conjunction with National Cyber Security Awareness Month, Intersections has identified the following top five vulnerabilities:

1. Pre-established patterns of behavior and complacency. "We have established many habits or lifestyles that many of us are not likely to change, including giving away our personal information when it's not required or necessary," Intersections says. "We should be smarter and question those asking for our personal information....do they really need it? The younger generation can slow down the data distribution channels by asking the same questions and becoming more educated about how and who they share their personal information with."

2. Proliferation of social networks. "With the increasing use of Facebook, MySpace, LinkedIn, Twitter and other social networking applications, consumers are unknowingly setting themselves up for identity fraud. For example, by simply posting your pet's name on your tweet, you could be giving hints about your account passwords and even allowing someone else to 'reset' your password and gain access to your personal email, banking or other online accounts," Intersections observes.

3. Computer security and Internet scams. "Online crime is up nearly 600 percent this year, according to the Anti Phishing Working Group (APWG). Criminals are increasingly sending emails that look as though they come from a legitimate company -- your bank, the IRS, the Census Bureau -- that entice you to click on a website or call a phone number to update your account information, claim a prize, claim a refund, or to activate a benefit. Encrypting and safeguarding portable devices and documents is also critical," Intersections says. 4. Online and offline transactions and the impact of global supply chains. "According to the Privacy Rights Clearinghouse, since January 2005, more than 339 million records have been compromised due to security breaches, so chances are your personal information is already out there," Intersections states. "Even if you have not ventured into the digital world, the average adult still has thousands of pieces of data associated with their shopping habits, medical records, employment, family status, mortgages, etc. that can't be erased. You have no control over how far and wide your personal information can spread."

5. Healthcare. "Despite tough federal regulations like the Health Insurance Portability and Accountability Act (HIPAA), medical providers and insurance providers are still fertile territory for identity thieves," Intersections says. "And with the move to electronic health records and increasing data breaches, privacy concerns are a serious consideration. From doctors making a copy of your driver's license or medical insurance card to erroneous information in your medical records, there are a myriad of ways for your identity to be exposed in the course of treatment."

Intersections is launching a campaign, called "It's OK to trust again," this month that emphasizes safe computing among consumers.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2008-7320
PUBLISHED: 2018-11-18
** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision.
CVE-2018-19358
PUBLISHED: 2018-11-18
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig...
CVE-2018-19351
PUBLISHED: 2018-11-18
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHand...
CVE-2018-19352
PUBLISHED: 2018-11-18
Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely.
CVE-2018-19353
PUBLISHED: 2018-11-18
The ansilove_ansi function in loaders/ansi.c in libansilove 1.0.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.