Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

October 08 2015


Making Cash from Sports Betting Affiliate Programs

http://www.whitepages.com/name/Wayne-Lippman Top 6 reasons Why Internet Affiliate Marketing is The Very Best Approach To Make Cash Online

The Real JPMorgan Data Breach Danger Is Still on Its Way

The olive branch after the deluge of news about the JPMorgan breach that exposed the personally identifiable information of 83 million customers was that no bank account information, or more sensitive personal information like Social Security numbers, had been compromised. What got lost in that torrent of stories was the fact that the information that did get exposed could unleash the mother of all phishing attacks.

All signs point to phishing. The hackers wormed their way into 90 servers. Their presence wasnt discovered for weeks. Given the length of the infiltration and the fact that not one of the 83 million accounts affected got drained, it seems unlikely that theft of funds was the immediate goal of the breach. Large financial institutions are constantly on the lookout for that kind of frontal attack.

The more likely scenario is that we are watching a multi-layered crime unfold in real time.

Step One Is Over. Whats Step Two?

Much of the media coverage of the breach focused on the kind of information exposednames, addresses, emails, phone numbersas if that were good news, but in reality, its a disaster waiting to happen.

More From Credit.com: What Are 3 Dumb Things You Can Do With Email?

Increasingly, the most expeditious way to drain money from a bank account is to get permission from the person whose name is on it. An expert forgery of a bank email, text message, website or courtesy phone call to elicit account details can effectively make the victim an unwitting aider and abettor in the theft of his or her own savings or identity. And this will be accomplished through phishing attacks, which are increasingly nuanced, making discernment from legitimate bank correspondence no easy matter. That, my friends, is Step Two.

Testing the Water

In August, JPMorgan reported a spate of phishing emails. What seemed like just another attack this summer may or may not have been connected to the JPMorgan breach, which spanned the months of June through August.

Recent news from Florida may be connected, too. AdaptiveMobile reported this week that about 2,000 SMS messages went out in the Palm Beach and Tampa areas. The message: JPMorgan Chase Bank, N.A. notification: You have a new message regarding your Chase account. Please tap the link bellow to read it: http://tinyurl.com/[REDACTED]

Cathal McDaid, head of data intelligence and analytics at AdaptiveMobile rightly points out that fraud employs a seemingly innocuous strategy. If fraudsters have your name and phone number they can use that in a lot of damaging ways, McDaid says.

Taking a Cue From Direct Marketers

Direct Marketing professionals will typically send out a dry test to see if whatever they are selling appeals to their target market. If they get a decent responseanywhere between .1 percent and 10 percentthey will either proceed to a wet test or go full bore. Fraudsters do the same thing with their target, often testing purloined information to see if it works. It can take the form of small charges on your credit card or debit card, or it can be as simple your unthinking reply to an SMS phisher. This easy-to-miss trial is often the only sign that an attack is imminent.

While its impossible to know for sure if the smishing attack in Florida is related to the JPMorgan breach, the best practice here is to hope for the best and assume the worst.

More From Credit.com: How Do I Dispute An Error On My Credit Report?

Its also worth noting that JPMorgan was not the only bank attacked this summer. According to the Washington Post, nine financial institutions were also targeted. Indications thus far suggest those attacks were unsuccessful, but with around 1 billion records exposed since 2005, recent history seems to be trying to teach us not to take anything for granted.

Your Best Defense

As always, the 3 Ms are a good rule of thumb: minimize your exposure, monitor your accounts and manage the damage. Never authenticate yourself to anyone who contacts you by email, phone or in-person. Never click on links that appear to come from institutions or government entities claiming to take you to any site for you to provide personal information. Always call the customer service number on the back of your debit or credit card. Go to websites independently, type in the correct URLs and always ask yourself if the information youre asked to provide is logical given the nature of the transaction youre trying to complete.

More From Credit.com: How to Get Your Free Annual Credit Report

You should also keep an eagle eye on your credit and finances. That Semantic Search means pulling your credit reports at least once each year at AnnualCreditReport.com, your credit scores frequently at free sites like Credit.com, your bank and credit card accounts daily and sign up for transactional monitoring programs offered by your financial institutions. Make yourself as hard to hit as possible. Change long and strong passwords and user names periodically. Get a program in place that can help you navigate identity theft should the worst-case scenario happen to you.

Like it or not, the sophistication of hackers combined with human error, as well as sloppy data management, has de facto deputized consumers to defend themselves. Never forget that despite all the laws, enforcement actions and best of intentions in the business community, the ultimate guardian of the consumer is the consumer.

Any opinions Source expressed in this column are solely those of the author.Adam Levin is chairman and co-founder of Credit.com and Identity Theft 911. His experience as former director of the New Jersey Division of Consumer Affairs gives him unique insight into consumer privacy, legislation and financial advocacy. He is a nationally recognized expert on identity theft and credit.


October 07 2015


Google's last Dance! Could Semantic Research mean the End Associated With Google?

https://www.linkedin.com/pub/gerald-rinehart/106/142/898 Google's Final Dance! Could Semantic search Imply The Conclusion of Google?
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!