- Phishing attacks are lucrative for these cybercriminals.
- ATM hacks continue to increase, in part due to targeted attacks and new software.
- Smartphone attacks are on the upswing.
There are three ways criminals obtain credit card data, and selling it is enormous business. And data breaching at the point of sale has been a big issue for the past few years. POS attacks are conducted with skimming tactics or by using Trojans. Unless significant changes are made, look for POS attacks to swell up, not shrivel up.
Selling credit card information is such big business that there exist professional wholesalers who specialize in this. Ukrainian, Russiona and many in eastern Europe are some of the largest brokers of and the main suppliers of stolen card data. But the wholesalers who purchase his acquired data are also rolling in the dough.
More on the Russian Hacking Empire
- Lots of DDoS attacks
- Over a quarter of a billion dollars in the sale of nefarious products
- Spam, spam and more spam: an $841 million goldmine
- A rise in the number of crime rings, the result of the development of new ways to commit theft off of users of smartphones.
- In fact, several new crime rings have emerged this year that center on bank theft of mobile device users.
There’s currently just no end in sight for the Russian hackers, and there perhaps never will be, especially since geography is a barrier to prosecution.
6 ways to watch your statements.
- Monitor your paper statements monthly
- Monitor your e-statments when they come in
- Login to your credi card company’s website as often as you can
- Download your credit card company’s smartphone app and check often
- Sign up for Mint or BillGuards credit card alerts
- Go to your credit card company’s website and sign up for text and email alerts for every transaction.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- A Viable Solution to Wave of Skimming and Point of Sale Attacks
Officials are reporting a wave of credit and debit card attacks targeting point of sale swapping, skimming of card data, and hacking into payment processors. Reports say the U.S. Secret Service, among others, are in the process of investigating a multistate crime spree. The Oklahoma Bankers Association commented, “It is beyond apparent our bankers are taking
- 10,000+ Identity Theft Rings In The U.S.
Identity theft is the easiest crime to commit and the hardest crime to get caught for. It has been said numerous times that identity theft is the closest we’ve ever come to the perfect crime. This explains why a recent study by ID Analytics found more than 10,000 identity fraud rings in the U.S. An
- Skimming, Identity Theft and How Online Business Defend Against Cybercrime
Over the past 5 years a scam known as electronic funds transfers at the point of sale (EFTPOS ) or skimming has been prevalent. Consumers commonly swipe both credit and debit cards through the in-store machines to pay for goods and services and hackers have been adept at coming up with ways to skim those
- Security Expert’s Credit Card Hacked
An excellent way to improve one’s level of security intelligence is to follow the writings of Robert X. Cringley, one of my favorite technology know-it-alls. Anyway, Cringley’s credit card was recently hacked. And if his card can be hacked, anyone’s can. Like many cardholders, Cringley received a notification from his credit card company’s fraud department, informing
- What Are The Risks Of Mobile Spam?
Spammers send unwanted emails or texts that are both annoying and frightening. Most spam messages are useless advertisements selling stuff you don’t need or want. In 1995, 8,069 unique pieces of malware were detected. One out of 20 emails were spam, and the Melissa virus infected hundreds of thousands. By 2010, 54 million unique pieces of malware were detected and