<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; mobile threats</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/mobile-threats/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>World-class scammers vie for Olympic gold</title>
		<link>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/#comments</comments>
		<pubDate>Tue, 07 Aug 2012 17:49:26 +0000</pubDate>
		<dc:creator>mbruemmer</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[mobile threats]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1532</guid>
		<description><![CDATA[Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold&#8211;in the form of stolen credit card numbers, PINs, consumers’ personal identities. One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more sinister cousin, counterfeiting. Paying for tickets [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F07%2Fworld-class-scammers-vie-for-olympic-gold%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Fraud,Identity+Theft,mobile+threats&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/scammers-vie-for-Olympic-gold.png"><img class="aligncenter  wp-image-1539" title="scammers vie for Olympic gold" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/08/scammers-vie-for-Olympic-gold.png" alt="" width="480" height="233" /></a></p>
<p>Swimmers may be stealing the spotlight, but it’s scammers who are taking home the gold&#8211;in the form of stolen credit card numbers, PINs, consumers’ personal identities.</p>
<p>One familiar con trotted out this year (and every Olympics) is ticket fraud, including what Britons call ‘ticket touting’ (scalping) and its more sinister cousin, counterfeiting. Paying for tickets that are never delivered is another way unwary buyers are tricked into giving up personal and/or credit card information.</p>
<p><strong>Beware the cyber threats</strong></p>
<p>Acknowledging the widespread use of smartphones, tablets and similar devices to retrieve Games-related content, the UK’s national fraud reporting center, Action Fraud, cautions fans to browse wisely, warning that worms, viruses and other malware can penetrate mobile devices just as easily as PCs.</p>
<p>Top malware delivery threats listed on Action Fraud’s blog site include:</p>
<ul>
<li><strong>Search Engine Poisoning</strong> – The most prevalent form of malware delivery (40% of all malware infections), in which attackers link what appear to be legitimate search result “bait” pages to malware infected sites.</li>
<li><strong>Drive-by-Downloads</strong> – Technique that automatically downloads malware when devices interact with an infected website, email, pop-up ad or other apparently authentic Olympic content.</li>
<li><strong>Information Phishing</strong> – Disguised links from Facebook and Twitter abound this year. When clicked, infected links, in the shortened bit.ly/ format, for example, <a title="Data protection strategies to catch a phish" href="http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/">can instantly extract, disable or destroy a device’s content or operating system.</a></li>
</ul>
<p><strong>Staying off the scammers’ scorecards</strong></p>
<p>A fraudster’s goal is to rip you off in record time and disappear into the shadows with their<br />
ill-gotten gains.  To avoid being victimized during the Olympics (or anytime) follow these common-sense rules for browsing and buying:</p>
<ul>
<li>Never click a link from someone you don’t know.</li>
<li>Avoid giving personal or credit card information to anyone whose identity and organization you can’t positively confirm.</li>
<li>For Olympics news or memorabilia, frequent only sites known to be credible and trustworthy, such as London2012.com.</li>
</ul>
<p>Such simple precautions can make for a winning Olympics experience, and help send the fakes, frauds and phonies home empty handed.</p>
<p>Have you or a friend encountered scammers during the Olympics? Take a minute to briefly share your story.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/&via=Experian_DBR&text=World-class scammers vie for Olympic gold&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F08%2F07%2Fworld-class-scammers-vie-for-olympic-gold%2F&amp;title=World-class%20scammers%20vie%20for%20Olympic%20gold" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/08/07/world-class-scammers-vie-for-olympic-gold/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The top 5 cyber security threats to future of mobile banking</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/#comments</comments>
		<pubDate>Tue, 24 Jul 2012 17:46:34 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[mobile threats]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1487</guid>
		<description><![CDATA[As mobile banking grows in popularity, so do the dangers of data breach and identity theft. In fact, these data security dangers are so significant they could threaten the future of the mobile financial services industry. To get a better understanding of the industry’s cyber security woes, a powerful trade group conducted a comprehensive survey [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F24%2Ftop-5-cyber-security-threats-to-future-of-mobile-banking%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Breach,Data+Security,mobile+threats&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/nobile-banking.png"><img class="aligncenter size-full wp-image-1490" title="nobile-banking" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/nobile-banking.png" alt="" width="400" height="250" /></a></p>
<p>As mobile banking grows in popularity, so do the dangers of data breach and identity theft.</p>
<p>In fact, these data security dangers are so significant they could threaten the future of the mobile financial services industry.</p>
<p>To get a better understanding of the<a title="The Right Choice for your Cyber Insurance Panel" href="http://www.experian.com/data-breach/cyber-insurance.html"> industry’s cyber security woes</a>, a powerful trade group conducted a comprehensive survey of mobile experts from 50 financial institutions. BITS, the technology division of the Financial Services Roundtable, conducted the poll to find out the top <a title="A Mobile Test of Human Threats" href="http://www.experian.com/blogs/data-breach/2012/07/17/a-mobile-test-of-human-threats/">mobile data protection threats </a>and the best way to combat them.</p>
<p>Here’s what they found:</p>
<p><strong>1) Mobile data protection must keep up </strong>with the lighting-speed pace of innovation.</p>
<p><strong>2) Consumers are scared to use mobile banking</strong>. Financial institutions must change public perception of data security measures, which means data protection measures must work.</p>
<p><strong>3) Cooperation on mobile data protection and data security is a must.</strong> Everyone involved, such as device manufacturers, network operators, financial institutions and app developers, must work together to develop effective mobile data protection solutions.</p>
<p><strong>4) Consumers must take greater responsibility for their own data security.</strong> Consumers need to be more careful about not losing their smart phones and protecting the data inside of them. They should guard their phones the same way that they guard their wallets.</p>
<p><strong>5) Balancing data security and data privacy.</strong> As consumers want more convenience, financial institutions need to find the right balance between allowing them to conduct more transactions, but still making sure their personal data is protected from data breach and identity theft. Financial institutions need to educate their customers on data protection methods, like having them lock their smart phone with a <a title="Password Management" href="http://www.experian.com/blogs/data-breach/2012/06/19/password-management/">password</a>.</p>
<p>Do you have similar concerns? What are your biggest worries regarding mobile banking and data security/<a title="The State of Identity Theft" href="http://www.experian.com/blogs/data-breach/2012/06/11/infographic-the-state-of-identity-theft/">identity theft</a> issues? Let us know. We’d like to hear them.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Download the Data Breach Response Guide by Experian" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_072412_article ">Download your free Data Breach Response Guide</a>!</div></div>
<div class="OUTBRAIN" data-src="DROP PERMALINK HERE" data-widget-id="AR_1" data-ob-template="experian" ></div>
<p> <script type="text/javascript" src="http://widgets.outbrain.com/outbrain.js"></script></p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/&via=Experian_DBR&text=The top 5 cyber security threats to future of mobile banking&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F24%2Ftop-5-cyber-security-threats-to-future-of-mobile-banking%2F&amp;title=The%20top%205%20cyber%20security%20threats%20to%20future%20of%20mobile%20banking" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/24/top-5-cyber-security-threats-to-future-of-mobile-banking/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Mobile smishing attacks are on the rise</title>
		<link>http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/#comments</comments>
		<pubDate>Tue, 21 Dec 2010 16:48:44 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[mobile threats]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=250</guid>
		<description><![CDATA[Mobile devices are important tools to efficiently manage a business and to quickly meet the needs of a customer.  Think about the hit in productivity you’d take if you lost your smart phone or PDA.  Several weeks ago I wrote about the importance of implementing a wireless data policy to protect employee account data from [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F12%2F21%2Fmobile-smishing-attacks-are-on-the-rise%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Data+Breach,Data+Security,mobile+threats,Phishing,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Mobile devices are important tools to efficiently manage a business and to quickly meet the needs of a customer.  Think about the hit in productivity you’d take if you lost your smart phone or PDA.  Several weeks ago I <a href="http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/" target="_blank"><span style="text-decoration: underline;">wrote about</span></a> the importance of implementing a wireless data policy to protect employee account data from being used to defraud a company.  However, a recent warning issued by the FBI’s <a href="http://www.ic3.gov/default.aspx" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Internet Crime Complain Center</span></a> points to another danger associated with mobile devices.</p>
<p>Cybercriminals have been increasing their attacks on mobile devices through SMS text messages and fraudulent voice messages.  These tactics are very similar to traditional email phishing scams and ask the recipient to respond to verify an address, credit card number or other form of PII.  <a href="http://www.networkworld.com/community/node/68980" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">For example</span></a>, through a process called smishing, a mobile subscriber receives a text message stating, “ABC credit card is confirming your purchase” and asks the user to visit a URL or call a phone number to verify a credit card number.</p>
<p>Obviously these attacks have serious implications for employees on a personal and professional level.  The <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank"><span style="text-decoration: underline;">financial impact</span></a> to a company could be huge if an employee innocently provided a corporate bank account number as a response to a fraudulent SMS text message.</p>
<p>Fortunately, there are <a href="http://www.cmswire.com/cms/enterprise-20/mobile-enterprise-prevent-identity-theft-and-wire-tapping-009414.php" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">several steps</span></a> employees can take to prevent the chance of becoming a victim. For example, you can advise employees not to respond to text messages or automated voice messages from unknown or blocked numbers.</p>
<p>Advise your employees about these potential dangers before any damages are done.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/&via=Experian_DBR&text=Mobile smishing attacks are on the rise&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F12%2F21%2Fmobile-smishing-attacks-are-on-the-rise%2F&amp;title=Mobile%20smishing%20attacks%20are%20on%20the%20rise" id="wpa2a_6"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>