FTC settlement data security: 7 Examples of why it is necessary

4:59 PM
FTC settlement data security: 7 Examples of why it is necessary -

As the digital world grows with the addition of each new user, security threats data continue to afflict some of the world's leading retailers, websites and online storefronts. Cyber ​​criminals are in phase with the online security progress, while finding new and sophisticated ways to breach systems, which is exactly why the Federal Trade Commission seeking to fight with the new regulations .

and the Committee on Trade of the Senate seems to agree, having recently called for stronger federal standards and greater accountability in the protection of customer data after the target debacle last year. And the need for such a law is obvious. The credit card information and email address stolen social security numbers compromised, here are seven examples of violations of data security that the FTC is trying to fight.

1. Massive Security Breach target

Regarding data security threats, even giants are equally sensitive to violations that small companies. Such is the case with retail megastore target, which experienced a security breach amazing during the 2013 holiday shopping season. The retailer has been the victim of hackers, causing more than 40 million stolen credit card statements and 70 million pirated personal files, including email addresses of customers.

With reports ignored safety warnings and other forms of negligence on the part of the target, the FTC investigation into the massive violation. If the FTC believes that Target has taken part in security practices of neglect data, the decision could lead to new regulations for businesses and their customer information backup procedures.

2. Threats to security and Empire Social Media

As the number of social media users increased by the millisecond, it is not surprising that hackers target social sites. Early last year, Zendesk, the customer service provider for sites like Tumblr, Twitter and Pinterest, announced that it has been hacked. The incident, which was minor compared to the violation of the target, however, resulted in hackers get thousands of users of e-mails, which were then probably used for phishing scam attempts.

In a similar incident, Twitter was hacked again in late 2013, as well as certain social powers such as LinkedIn and Facebook, as well as Google and Yahoo. All in all, a violation of malware security hit 93,000 websites, resulting piracy around 2 million passwords and user names. malware flew under the radar for a month while the user login information was compromised.

3. Hacking the college

The pirates are becoming more brazen, up to hack the database of colleges and universities. Indeed, in March 2014, the University of Wisconsin-Parkside was a high-level security breach, where over 15,000 current students and recent graduates have had their personal information hacked by his own university student web portal page .

Although the University of Wisconsin does not yet know the extent of damage, academic investigators believe all the phone numbers and addresses to the sensitive information that security numbers and email addresses social are at risk.

4. Source code leak Adobe

Whether for personal gain, information leakage, or both - cyber criminals hack into online systems for many different reasons. In October 2013, the giant Adobe software reported a breach in which the credit card information of more than 3 million customers was stolen. To add insult to injury, hackers also posted the usernames and passwords of another 150 million customers at different websites on the cyber black market, following the same hacking incident .

Although Adobe reports that cyber criminals were able to infiltrate the system due to a leak rare source code violation created major damage because most victims of piracy had personal banking information relating to their accounts as password clues. Adobe Photoshop users have been at the heart of the breach of security, which is probably due to the popularity of software creating a large number of registered users.

5. Online Safety and Sears

Because the massive companies have a harder time monitoring their online livelihoods because of the size of their databases more the company, the better for hackers. Although no official report was filed yet, Sears is under investigation for possible violation of current security that could expose the personal information of millions of customers.

Sears Holding Corporation currently has digital forensic experts scouring their databases and systems to see whether or not cyber attacks are nor ever was, a threat. Sears takes the matter seriously, going so far as to seek the help of the secret services to assist in the security review. In March 2014, Sears reported that no breach of the system have been found so far.

6. LivingSocial Password Encryption

In spring 2013, the king LivingSocial coupon was the victim of a particularly nasty security breach in the form of cryptographic descrambling over 50 million words password users. Before breaking the system, LivingSocial used a fairly simple password algorithm that could simply not hold up to repeated attempts encryption pirates.

Because protected poorly designed based password storage company data algorithm, hackers were able to essentially reverse the encrypted passwords of customers with ease, which opened the access to their accounts. The security breach LivingSocial customer names and email addresses exposed, allowing hackers to use the information to break into other personal accounts.

7. Attack Two-Fold Target: Violation of safety Aftermath

As security breaches of data for large companies earn nationally and attention in the worldwide, more cybercriminals are jumping on the security being breached and try to get a piece of the pie hacking. This is exactly what happened to the target with the phishing scam happened after security monitoring violation of emails.

To better inform its customers of the situation, Target has sent emails to all customers affected as regards the details of the security breach. As a result, hackers also sent phishing emails disguised as emails targets that have asked customers to check their credit scores using the provided e-mail link.

Although the target sent another series of emails to inform customers not to click on email links that request personal information and other useful online safety tips, it there were still countless clients who have been victims of phishing scam.

with breaches of data happens all across the Internet, the above cases are just a handful of the many reasons why the FTC needs to increase its regulations. Not doing so could result in a financial fallout from the shocking Earth to the global economy.

Previous
Next Post »
0 Komentar