Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Search Engine Lists Stolen Data

TrustedID launches free service to help consumers find out if their data has been compromised

Experts now estimate that about half of all computer users have had their personal information compromised or stolen at some point in their lives.

Which half are you in?

A new, free service from TrustedID, an identity management tool vendor, aims to help consumers find out. The service, called StolenID Search, lets users search more than two million pieces of compromised information to see if their information is on the list.

StolenID Search, unveiled yesterday, will initially cover two types of information: credit cards and Social Security numbers. Individuals can enter their information into a secure search engine, and the search results will return a simple "found" or "not found" response, telling the user whether their data matches any held by TrustedID.

Individuals who receive notification of a match will be directed to additional resources that will help show them how to protect themselves, the company says.

"Identity theft is a growing issue for consumers today and one that is an immense financial and time consuming strain on resources," says Jay Foley, co-founder and executive director of the Identity Theft Resource Center, a nonprofit organization that focuses on identity theft. "A service such as StolenID Search is providing an important step in the awareness education of consumers by allowing them to verify exposed data and take steps to defend themselves."

"The knowledge that your information has been compromised can be critically important in preventing identity theft," says Scott Mitic, CEO and founder of TrustedID. "The key is to find out about the compromise before the information is used to perpetrate a crime. Often, individuals are not even aware that their information has been breached, or that the breach may be ongoing."

According to a study by Javelin Group, a research firm, identity theft victims typically don't discover their information has been stolen until 12 months after a thief first used it. But there is an advantage to finding out quickly, the research firm says. Victims who detected the crime by monitoring their accounts online had average loses of $551; victims who relied on monitoring paper statements had average loses of $4,543.

— Tim Wilson, Site Editor, Dark Reading

  • TrustedID Inc. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/9/2020
    Omdia Research Launches Page on Dark Reading
    Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
    Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
    Jai Vijayan, Contributing Writer,  7/10/2020
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-07-13
    Affected versions of Atlassian Jira Server and Data Center allow remote attackers to access sensitive information without being authenticated in the Global permissions screen. The affected versions are before version 8.8.0.
    PUBLISHED: 2020-07-13
    The Gadget API in Atlassian Jira Server and Data Center in affected versions allows remote attackers to make Jira unresponsive via repeated requests to a certain endpoint in the Gadget API. The affected versions are before version 8.5.4, and from version 8.6.0 before 8.6.1.
    PUBLISHED: 2020-07-13
    Affected versions of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the Add Field module. The affected versions are before version 8.7.0.
    PUBLISHED: 2020-07-13
    The avatar upload feature in affected versions of Atlassian Jira Server and Data Center allows remote attackers to achieve Denial of Service via a crafted PNG file. The affected versions are before version 8.5.4, from version 8.6.0 before 8.6.2, and from version 8.7.0 before 8.7.1.
    PUBLISHED: 2020-07-10
    Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...