{"id":16482,"date":"2019-10-02T08:00:01","date_gmt":"2019-10-02T16:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/02\/news-10222\/"},"modified":"2019-10-02T08:00:01","modified_gmt":"2019-10-02T16:00:01","slug":"news-10222","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/02\/news-10222\/","title":{"rendered":"In Identity Theft the Target is You!"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 02 Oct 2019 13:52:23 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"188\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/04\/hipaa-compliant-medical-dental-forms-sm-300x188.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/04\/hipaa-compliant-medical-dental-forms-sm-300x188.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/04\/hipaa-compliant-medical-dental-forms-sm.jpg 320w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The hard truth is that identity data is the new gold\u2014and criminal panhandlers are mining it for sale and distribution on the Dark Web.<\/p>\n<p>Indeed, the internet provides ways for big data breaches to result in disastrous leaks of huge databases of personal information, resulting in detailed profiles of individuals\u2014based on their internet behaviors, including social media activities, online shopping, financial transactions and more\u2014being sold for nefarious purposes.<\/p>\n<p>It\u2019s all about identity theft. What does it mean for digital citizens like us? And what can we do about it?<\/p>\n<p><strong>The Mining of Identity Data<\/strong><\/p>\n<p>In 2019, data of all kinds is being criminally mined on the internet, but the theft and sale of identity data in particular is rising dramatically. How is this possible? In today&#8217;s highly-connected society, we\u2019re constantly being asked to provide personal information to retailers, surveys, medical professionals, and other data collection efforts. We constantly disclose our name, address, social security number, health status, purchasing history, credit card numbers, and more. Anytime there\u2019s a breach in an online database holding such data, by accident or malicious hacker intent, cybercriminals pounce on it to mine it for the identity gold.<\/p>\n<p>\u201cIdentity theft and identity fraud\u2026refer to all types of crime in which someone wrongfully obtains and uses another person\u2019s personal data\u2026,\u201d says the <a href=\"https:\/\/www.justice.gov\/criminal-fraud\">US Department of Justice, Criminal Division, in its Fraud Section report<\/a>, reminding us what it\u2019s all about. Data breaches are the goldmine for this kind of theft.<\/p>\n<p>One of the more recent breaches collected, packaged and sold about <a href=\"https:\/\/thehackernews.com\/2019\/03\/data-breach-security.html\">26 Million new accounts on the Dark Web<\/a> by hacking several websites, including online shopping, career and learning platforms. A longer list of breaches\u2014see <em><a href=\"https:\/\/www.csoonline.com\/article\/2130877\/the-biggest-data-breaches-of-the-21st-century.html\">The 18 Biggest Data Breaches of the 21<sup>st<\/sup> Century<\/a><\/em><em>, <\/em>as well as Wikipedia\u2019s<em> <a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_data_breaches\">List of Data Breaches<\/a><\/em>\u2014reveals how chronic it\u2019s become. Because our personal data is often stored on internet sites, many of which are crucial to our way of life, we forget that simply registering and providing personal details can lead to more precise and accurate description of our location, our healthcare information, and even information indicated on our government issued IDs. And its sale on the Dark Web is a very bad outcome.<\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Dark_web\">The Dark Web<\/a> (or Darknet) refers to that part of the internet that hides your identity and location when you\u2019re on it. Dark Web websites are accessible only through Tor (the \u201cOnion Routing&#8221; browser) and through I2P (the Invisible Internet Project&#8221;). Historically, one of the reasons for the creation of the Dark Web was to provide US Navy intelligence officers a means to maneuver on the internet without being recognized or traced. The Tor network achieves anonymity by bouncing the request through a large number of intermediate servers and employing a layered encryption system on the identification of the source IP where the search originated, so that no one knows where the request for a webpage or site ultimately comes from. I2P specializes in allowing the anonymous hosting of websites, so the target IP address is unknown to the searcher.<\/p>\n<p>In short, browsing the Dark Web allows you to anonymously access \u201canonymized\u201d websites, not all of which are bad, but also many sites that are, collectively known as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Darknet_market\">Darknet markets<\/a>. The former category includes SecureDrop, which lets news organizations receive anonymous submissions. \u00a0The latter category included Silkroad 1.0, which was launched in February of 2011; and 2.0, which was finally shut down in November of 2014 by the FBI. The Dark Web or Darknet is still a channel for all kinds of illegal activities, including a place for radical extremists to spread propaganda\u2014and remains a region on the internet for the sale of illegally gotten identity data.<\/p>\n<p><strong>Protecting Your Identity<\/strong><\/p>\n<p>Although data protection laws state that any personal data set that\u2019s stored online has to be stripped of identifiers such as name and social security, true compliance is difficult to maintain or enforce\u2014so each one of us has the ultimate responsibility to protect our data to stay safe online. Here are some practical steps you can take to help protect your identity:<\/p>\n<p><strong>Accounts and Usernames:<\/strong> Think carefully when choosing your username for your online accounts and email addresses. Choose something that does not closely identify with your full name or other personal information.<\/p>\n<p><strong>Passwords:<\/strong> If you use several internet services, social media accounts, and email addresses, you\u2019ll need a lot of passwords. Tempting as it is, avoid using the same password for all your accounts. Use a unique password for each account, one that you can remember, but that\u2019s not easy to guess. We highly recommend using <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/password-manager.html\">Trend Micro Password Manager<\/a> to generate strong passwords, to keep them safe, and to change them frequently. Banking apps and other payment system apps also utilize two-factor authentication, which you should take advantage of for more secure transactions and purchases.<\/p>\n<p><strong>Privacy:<\/strong> Keep your personal information private online and enable strong privacy controls on your social media accounts.<\/p>\n<p><strong>Protect your devices:<\/strong> Don\u2019t leave your mobile devices and laptops unattended and enable PIN and password to unlock them.<\/p>\n<p><strong>Remediation:<\/strong> If you hear of a major online data breach, sit up and take notice: you might need to take active steps to remediate the situation. As with the <a href=\"https:\/\/www.ftc.gov\/equifax-data-breach\">Equifax Data Breach of 2017<\/a>, where sensitive data on 143 Million Americans was exposed, remediation may mean locking or freezing your credit on each of the credit bureaus: <a href=\"https:\/\/www.equifax.com\/personal\/\">Equifax<\/a>, <a href=\"https:\/\/www.experian.com\/\">Experian<\/a>, and <a href=\"https:\/\/www.transunion.com\/\">TransUnion<\/a>. With other types of breaches, it may simply mean closing an account or canceling a credit card. As with the credit bureaus, many banks have identity protection services which you can also avail yourself of.<\/p>\n<p><strong>Trend Micro ID Safe<\/strong><\/p>\n<p>Apart from the best practices outlined above, you should also install <strong>Trend Micro ID Safe<\/strong> for <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.trendmicro.idsafe\">Android<\/a> and <a href=\"https:\/\/itunes.apple.com\/us\/app\/trend-micro-id-safe\/id1452967428?mt=8\">iOS<\/a> on your mobile devices, to monitor and help remediate any known security issues with your identity data.<\/p>\n<p><strong>What is ID Safe?<\/strong> ID Safe checks if any of your personal information stolen from data breaches is circulating on the Dark Web for sale or distribution by cybercriminals. It identifies which accounts were breached and the kind of data posted, then notifies you, so you can take steps to change your account credentials or remediate any potential effects of the illegal distribution or sale of your personal data.<\/p>\n<p><strong>Top-notch Security.<\/strong> To ensure the highest level of security when handling your personal information, ID Safe first hashes the data you enter on the app (essentially converting the text to an irreversible number) using the SHA-256 hashing standard\u2014the world\u2019s most secure\u2014 before sending it through an encrypted connection to check it against a comprehensive Dark Web database.<\/p>\n<p><strong>Easy to Use Tools<\/strong>. You can quickly check if your personal data has reached the Dark Web with just a few taps, using its various tools:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><strong>Email Checker. <\/strong>See if the email address you use for online accounts has appeared on the Dark Web due to a data breach. If it finds your address, the app shows exactly which accounts suffered the breach, so you immediately know which passwords to change.<\/li>\n<li><strong>Credit Card Checker<\/strong>. Find out if someone has stolen your credit card number and put it on the Dark Web.<\/li>\n<li><strong>Password Checker<\/strong>. You should not only use unique passwords for all of your accounts, but also choose passwords that nobody else has ever used. ID Safe can see if you have used a password currently in circulation on the Dark Web.<\/li>\n<li><strong>Dark Web Personal Data Monitor<\/strong>. ID Safe can scour the Dark Web for sensitive personal information like your bank account numbers, driver\u2019s license data, social security number, and passport details, then immediately alert you if they ever appear there.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>GDPR Compliant<\/strong>. Finally, you should know that Trend Micro takes your privacy seriously and complies with the European Union\u2019s General Data Protection Regulations (GDPR) to protect your data. Read ID Safe\u2019s data collection\u00a0notice here:<\/p>\n<p><a href=\"https:\/\/esupport.trendmicro.com\/en-us\/home\/pages\/technical-support\/1121937.aspx\">https:\/\/esupport.trendmicro.com\/en-us\/home\/pages\/technical-support\/1121937.aspx<\/a><\/p>\n<p>For more information and to download ID Safe, go to <a href=\"https:\/\/itunes.apple.com\/us\/app\/trend-micro-id-safe\/id1452967428?mt=8\">Trend Micro ID Safe on the iOS App Store<\/a> and <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.trendmicro.idsafe\">Trend Micro ID Safe on Google Play<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/in-identity-theft-the-target-is-you\/\">In Identity Theft the Target is You!<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/in-identity-theft-the-target-is-you\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 02 Oct 2019 13:52:23 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"188\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/04\/hipaa-compliant-medical-dental-forms-sm-300x188.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/04\/hipaa-compliant-medical-dental-forms-sm-300x188.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/04\/hipaa-compliant-medical-dental-forms-sm.jpg 320w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The hard truth is that identity data is the new gold\u2014and criminal panhandlers are mining it for sale and distribution on the Dark Web. Indeed, the internet provides ways for big data breaches to result in disastrous leaks of huge databases of personal information, resulting in detailed profiles of individuals\u2014based on their internet behaviors, including&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/in-identity-theft-the-target-is-you\/\">In Identity Theft the Target is You!<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10789,5897],"class_list":["post-16482","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-consumer","tag-privacy"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16482"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16482\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16482"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}