Celebrities aren't the only targets of data thieves
Adam Levin is chairman of Identity Theft 911(Photo: Identity Theft 911)Story HighlightsAverage cybercriminal is after bragging rights, quick cashLaw enforcement facing several hurdlesSEATTLE – The disclosure of celebrities' personally identifiable information, or PII, is grabbing headlines this morning. But it's just another day in the teeming cyberunderground.Caches of names, addresses, Social Security numbers, date of births and payment card data have long been widely posted on the Internet. Hackers sometimes do it to brag or make a political point. But most often, stolen PII flows into forums and exchanges, and are posted for sale -- for simple criminal profit."In most cases, when data is improperly accessed, it is peddled through black market sites," says Adam Levin, chairman of Identity Theft 911. "Oftentimes it is sold and resold."The average cybercriminal is after quick cash, not military or industrial secrets, says Roel Schouwenberg, senior researcher, Kaspersky Lab."Celebrities are a special category as they garner so much attention, which can also mean the criminal just wants to expose them," says Schouwenberg. "Because they attract so much attention there's a much higher chance of a persistent law enforcement effort to catch the perpetrators."Hampering law enforcement is the fact that cybercrime typically occurs across multiple borders. "The issue is which law enforcement agency exercises jurisdiction and what their resources are," Levin says. "They can go after the website, but many of these websites are offshore and it is impossible to collaborate with the authorities which could do something about it."Rich celebrities can put their attorneys and private investigators on the job, cleaning up. The average person is wise to make himself or herself less of a target, says Troy Gill, Senior Security Analyst at message security firm AppRiver"First, practice using lengthy passwords that contain numbers, letters and special symbols. Also use two-factor authentication whenever available…
Read more...