<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; smishing</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/smishing/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Three data protection strategies to catch a “phish”</title>
		<link>http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/#comments</comments>
		<pubDate>Tue, 31 Jul 2012 23:38:11 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=1509</guid>
		<description><![CDATA[Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected. So how does an organization protect data from vicious phishing and spear-phishing attacks? Here’s [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F31%2Fthree-data-protection-strategies-to-catch-a-phish%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Data+Security,Phishing,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/phishing11.jpg"><img class="aligncenter size-full wp-image-1523" title="phishing1" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/07/phishing11.jpg" alt="" width="500" height="334" /></a></p>
<p>Phishing attacks, despite their long history, continue to be one of the greatest threats to data security. More than 200,000 new viruses are discovered every day, according to malware experts, and they’re usually out of circulation by the time they’re detected.</p>
<p>So how does an organization protect data from vicious phishing and spear-phishing attacks?</p>
<p>Here’s a comprehensive data loss protection plan:</p>
<p><strong>1) Protect your organization’s computers. </strong>Shop for the newest software that provides spam filters, firewalls, anti-virus, anti-spyware and reputation services. Look for data protection programs that offer automatic updates and free patches from manufacturers to fix problems.</p>
<p><strong>2) Consider hiring a vendor that specializes in software data security. </strong>Data security firms can go beyond traditional data protection programs and conduct audits to determine your risk for phishing and data breach. They can isolate emails that have been quarantined and scan outbound emails to see if any data has been extracted outside of your organization. As experts, they can also provide technical support with the latest email data security technology. Be careful, however, not to overlap your own software with that provided by the vendor or you may be spending too much.</p>
<p><strong>3) Educate your computer users. </strong>Data security software is far from full proof so perhaps the most important cyber security strategy is to keep educating your users. Remind them:</p>
<ul>
<li>To be suspicious of emails with generic salutations, typos or those that try to create a sense of urgency.</li>
<li> Not to open attachments they aren’t expecting. If the attachment looks legitimate, ask your users to call the person to verify that they really did send it.</li>
<li>To be wary of email links. Instead of clicking on the link, users may want to visit the website manually by typing the address into their browser. They can also check a link by hovering their mouse over it to see where it came from.</li>
</ul>
<p><div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Experian Data Breach Resolution Resource Center" href="http://www.experian.com/data-breach/data-breach-information.html?WT.srch=ecd_dbres_blog_073112_article  ">Explore Our Resource Center for Videos, Webinars, White Papers and More</a>!</div></div><strong></strong></p>
<p>&nbsp;</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/&via=Experian_DBR&text=Three data protection strategies to catch a “phish”&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F07%2F31%2Fthree-data-protection-strategies-to-catch-a-phish%2F&amp;title=Three%20data%20protection%20strategies%20to%20catch%20a%20%E2%80%9Cphish%E2%80%9D" id="wpa2a_2"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/07/31/three-data-protection-strategies-to-catch-a-phish/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Five top trends in security threats</title>
		<link>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/</link>
		<comments>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/#comments</comments>
		<pubDate>Tue, 31 Jan 2012 18:09:30 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[Business identity theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>
		<category><![CDATA[Social media policy]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=941</guid>
		<description><![CDATA[Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie. ]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2012%2F01%2F31%2Ffive-top-trends-in-security-threats%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=Business+identity+theft,cyber+crime,Cyber+Security,hackers,Identity+Theft,Phishing,Security+Breaches,smishing,Social+media+policy&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg"><img class="aligncenter size-full wp-image-944" title="crime-scene-data-security" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2012/01/crime-scene-data-security.jpg" alt="" width="500" height="375" /></a></p>
<p>Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies.  Symantec’s study <a title="Symantec Security Threat Report" href="http://www.symantec.com/threatreport/topic.jsp?id=highlights" rel="nofollow" target="_blank" class="broken_link"> Internet Security Threat Report </a>offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie.</p>
<div class="dropshadowboxes-container " style="width:600px;"><div class="dropshadowboxes-drop-shadow dropshadowboxes-rounded-corners dropshadowboxes-inside-and-outside-shadow dropshadowboxes-lifted-both dropshadowboxes-effect-default" style="border:1px solid #dddddd; height:;background-color:#ffffff"><a title="Data Breach Response Guide" href="http://www.experian.com/innovation/business-resources/data-breach-response-guide.jsp?WT.srch=ecd_dbres_blog_013112_article_cta">Download Your Free Data Breach Response Guide</a>!</div></div>
<p>According to Symantec, here are the top five threats to beware of:</p>
<p>1. Targeted attacks continue to evolve.  While <a title="Blog Post - How hackers find their targets" href="http://www.experian.com/blogs/data-breach/2011/09/06/how-hackers-find-their-targets/" target="_blank">targeted attacks </a>on the large infrastructures of corporations are attempted almost every day, companies are increasingly being attacked to specifically gain access to their intellectual property.  A prominent example of this would be last year’s “Hydraq” attack on Google, a suspected politically motivated attack to steal sensitive information from Gmail accounts, which prompted Google to threaten to pull its operations out of China.  Given that this attack wouldn’t have been successful without convincing recipients that links and attachments in an email were from a known source, the lesson for future attackers is that the biggest security vulnerability to exploit is our trust of friends and colleagues.</p>
<p>2. Social networks + social engineering = compromise.  Hackers are getting better at learning who we are through social media outlets and posing as friends.  So-called <a title="Blog post - Tips to implement an effective social media policy" href="http://www.experian.com/blogs/data-breach/2011/07/05/tips-to-implement-an-effective-social-media-policy/" target="_blank">social engineering attacks </a>are becoming more sophisticated and harder to detect.</p>
<p>3. Hide and seek (zero-day vulnerabilities and rootkits).  In order to be successful, targeted attacks must penetrate an organization and remain undetected for as long as possible.  So-called “zero day vulnerabilities” help hackers maintain a game of hide and seek.  Zero days occur when a hacker discovers (and exploits) a security vulnerability in a software program before the program’s engineers do, although some believe that the fear of these vulnerabilities as a basis for attacks are worse than the reality.  Rootkits, software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications, are also helpful in keeping hackers undetected.</p>
<p>4. Attack kits get a caffeine boost.  Hackers are profiting on security vulnerabilities by packaging their discoveries into easily downloadable attack kits that are sold in the underground fraud economy.  Symantec believes that these kits played a role in creating over 286 million variants of malware last year.</p>
<p>5. Mobile threats increase.  With the explosive usage of smart phones and other mobile devices, hackers are naturally becoming ever more drawn to this territory as a <a title="Blog post - mobile smishing attacks are on the rise" href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">platform for fraud</a>.   Sophisticated operating systems mean that vulnerabilities are plentiful, and Trojans hidden in legitimate applications sold on app stores offer an effective means to multiply the damage.</p>
<p>Fraudsters will never stop finding ways to capitalize on security weaknesses and wreak havoc on privacy and bottom lines, which is why every business should work with security experts to stay ahead of these threats.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/&via=Experian_DBR&text=Five top trends in security threats&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2012/01/31/five-top-trends-in-security-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Year of the breach: 2011 in review</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/#comments</comments>
		<pubDate>Tue, 20 Dec 2011 23:24:20 +0000</pubDate>
		<dc:creator>kbarney</dc:creator>
				<category><![CDATA[Breach Notification]]></category>
		<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Identity Theft Resource Center]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[privacy legislation]]></category>
		<category><![CDATA[Security Breaches]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=888</guid>
		<description><![CDATA[Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of consumers information was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F20%2Fyear-of-the-breach-2011-in-review%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,Data+Breach,Data+Security,Identity+Theft+Resource+Center,PHI,Phishing,PII,privacy+legislation,Security+Breaches,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg"><img class="aligncenter size-full wp-image-891" title="usb_data_breach_laptop_610" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/usb_data_breach_laptop_610.jpg" alt="Business person inserting usb into laptop" width="610" height="407" /></a></p>
<p><em>Our guest blogger this week is Karen Barney of the <a title="Identity Theft Resource Center" href="http://www.idtheftcenter.org/" target="_blank" class="broken_link" rel="nofollow">Identity Theft Resource Center</a> (ITRC).</em></p>
<p>The number of breaches reported so far in 2011 is down from 2010, yet 2011 is still considered by many to be yet another “Year of the Breach”.    Several high profile events throughout the year have kept the spotlight on the issue of data exposures, especially those where millions of <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">consumers information</a> was obtained by malicious hackers.  Although the information involved, emails and passwords, does not rise to the level of a “personal identifying information” (PII) breach, it is definitely troubling that such a large number of consumers may become targets of phishing and related attacks, which do attempt to get consumers PII.</p>
<p>More and more entities are now tracking data breach occurrences by:</p>
<ul>
<li>Industry sectors (categories): Business,      educational, government, medical, financial</li>
<li>Breach “type” (method of access): hacking,      insider, portable device (“data on the move”), accidental exposure,      subcontractor, and lost or stolen.       In some cases, discarded paper documents.</li>
<li>various attributes: paper or electronic, encrypted,      password-protected, number of records unknown or published</li>
</ul>
<p>While most definitions and terms are relatively consistent between these monitoring sources, there are some notable differences.  Differing filters applied by each monitoring entity as to what qualifies as a data breach on any given list create some divergence in comparison of breach lists.  These filters may range from whether the incident involves specific types of exposed PII to whether a designated minimum number of records have been compromised (i.e. 10 or 500 minimum).</p>
<p>Often it is how a “record” is defined that yields the greatest disparity in determining the number of “records” exposed.  Many breach analysts consider “records” to those persons whose sensitive <a href="../2011/09/27/ensuring-the-security-of-personal-identifiable-information/">personal identifying information</a> (PII), such as Social Security numbers, debit or credit card numbers, financial account numbers, medical record numbers, and driver’s license or state identification numbers have been exposed.  How then, does one then account for compromised non-PII information, such as email addresses, user names, or other non-financial account information?</p>
<p>Many <a href="../2011/09/06/how-hackers-find-their-targets/">hacking incidents</a> this past year didn’t target personal identifying information, but instead focused on emails addresses, passwords and other pieces of non-sensitive personal information.   The challenge for many who analyze breach incident statistics is how to “quantify” the number of breached records that do not involve PII.  Should emails and passwords be counted as “records” in the same way as Social Security numbers and financial account numbers?   As of now, most state laws do not include non-sensitive personal information as triggers for breach notification therefore there is no obligation to report the incident.</p>
<p>&#8220;The law only requires that an entity notify those who had sensitive information compromised, like Social Security numbers,&#8221; says Lisa Sotto, a managing partner for New York-based law firm Hunton &amp; Williams, in a recent interview with BankInfoSecurity.   &#8220;But now we know other things, like e-mail addresses, can lead to compromise through social engineering and phishing.</p>
<p>The challenge then for the incidence response team is determining if a breach notification is required.  If so, “what happened?”, “who needs to be notified”, “what specifics are required?”, “when do we do it?”, “how did it happen?”, and “what have we done to make sure it won’t happen again?”  The answers to these questions should all be part of an established Breach Response Plan.  Other pieces of this plan should include best practice protocols, procedures, corporate training guidelines and employee education.  In addition, an organizational ethic must be created so that all employees realize the importance of protecting personal information.  A corporate environment must be maintained which fosters and strengthens information security awareness at all levels of the organization.</p>
<p>Another important issue to consider in your company’s <a href="http://www.shutterfly.com/home/myshutterfly.sfly" class="broken_link" rel="nofollow">incident response plan</a> is whether it is in the best interest of the company to report a data breach incident when there is no legal obligation to do so.  Under these circumstances, it is critical that the response team identify the best notification and crisis management tactics before a breach ever occurs.   Those companies with strong incident response plans are able to react more quickly and accurately, prevent further data loss (and potential fines), and present factual reporting to the public that minimizes customer backlash and negative publicity.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/&via=Experian_DBR&text=Year of the breach: 2011 in review&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/20/year-of-the-breach-2011-in-review/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Avoiding holiday scams</title>
		<link>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/#comments</comments>
		<pubDate>Tue, 06 Dec 2011 17:24:26 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[breach prevention]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Policy]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity Theft Prevention]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=872</guid>
		<description><![CDATA[With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F12%2F06%2Favoiding-holiday-scams%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=breach+prevention,cyber+crime,Cyber+Security,Data+Breach,Data+Policy,data+privacy,hackers,Identity+Theft+Prevention,PII,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p style="text-align: center;"><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/holiday-1210_intro_390x220.jpg"><img class="size-full wp-image-873 aligncenter" title="holiday 1210_intro_390x220" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/12/holiday-1210_intro_390x220.jpg" alt="" width="390" height="220" /></a></p>
<p>With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape.  Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.</p>
<p>Here, according to <a rel="nofollow" href="http://blogs.mcafee.com/consumer/consumer-threat-alerts/holidays-are-high-time-for-cybercrime" target="_blank" class="broken_link">McAfee</a>, are 12 common holiday scams to beware of:</p>
<p><strong>1. </strong><strong>iPad scams</strong>.  Watch out for bogus offers for free iPads on social media sites and via spam.</p>
<p><strong> </strong></p>
<p><strong>2. </strong><strong>“Help! I’ve been robbed” scam. </strong>Fraudsters send emails appearing to come from the account of friends which state that they’ve been robbed while traveling abroad and need money to be wired in order to get home.</p>
<p><strong> </strong></p>
<p><strong>3. </strong><strong>Fake gift cards. </strong>With these scams, cybercriminals promise fake <a href="http://www.experian.com/blogs/data-breach/2011/03/22/protecting-your-business-from-gift-card-fraud/" target="_blank">gift cards</a> in exchange for personal information that can be used for <a href="http://www.experian.com/blogs/data-breach/2011/01/04/identity-theft-protection-insights/" target="_blank">identity theft</a>.</p>
<p><strong> </strong></p>
<p><strong>4. </strong><strong>Holiday</strong><strong> job offers. </strong>Fake, high-paying, work at home jobs are offered in exchange for <a href="http://www.experian.com/blogs/data-breach/2011/09/27/ensuring-the-security-of-personal-identifiable-information/" target="_blank">personal information</a>.</p>
<p><strong> </strong></p>
<p><strong>5. </strong><strong>“Smishing.” </strong>Scammers “phish” via text message, or <a href="http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/" target="_blank">smish</a>, often posing as a bank or online retailer requesting personal information to address a problem with a target’s account.</p>
<p><strong> </strong></p>
<p><strong>6. </strong><strong>Holiday</strong><strong> rental scams.</strong> Fake, attractive rental properties at low prices are advertised on phony websites in order to lure deposits via wire transfer.</p>
<p><strong> </strong></p>
<p><strong>7. </strong><strong>Recession scams</strong>.  Financial “help” is offered to targets in the form of pay-in-advance credit schemes and pre-qualified low-interest loans, all in exchange for an upfront processing free.</p>
<p><strong> </strong></p>
<p><strong>8. </strong><strong>Grinch-like Greetings. </strong>Fake e-cards are loaded with links to computer viruses and other malware.</p>
<p><strong> </strong></p>
<p><strong>9. </strong><strong>Low price traps. </strong>Auction sites and phony websites are used to offer too-good-to-be-true prices on holiday gifts; the scammers walk away with information and/or money.</p>
<p><strong> </strong></p>
<p>10.  <strong>Charity scams. </strong>Solicitations for phony charities play on the spirit of holiday giving and philanthropic generosity.</p>
<p><strong> </strong></p>
<p><strong>11. </strong><strong>Dodgy holiday downloads.</strong> Watch out for holiday-themed jingles, screensavers and animations distributed via downloads, spam or dubious websites – they could contain malware.</p>
<p><strong> </strong></p>
<p><strong>12. </strong><strong>Hotel and airport Wi-Fi. </strong>During this season of high travel, Wi-Fi hotspots are criminal hangouts, with scammers eager to hack into unprotected networks.</p>
<p><strong> </strong></p>
<p>This holiday season, make sure that you, your employees and your customers are on high alert for the seasonal scams that turn up with the regularity of fruitcake…and are just as unwanted.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/&via=Experian_DBR&text=Avoiding holiday scams&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/12/06/avoiding-holiday-scams/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Mobile smishing attacks are on the rise</title>
		<link>http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/</link>
		<comments>http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/#comments</comments>
		<pubDate>Tue, 21 Dec 2010 16:48:44 +0000</pubDate>
		<dc:creator>ofonseca</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[mobile threats]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[smishing]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=250</guid>
		<description><![CDATA[Mobile devices are important tools to efficiently manage a business and to quickly meet the needs of a customer.  Think about the hit in productivity you’d take if you lost your smart phone or PDA.  Several weeks ago I wrote about the importance of implementing a wireless data policy to protect employee account data from [...]]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F12%2F21%2Fmobile-smishing-attacks-are-on-the-rise%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=cyber+crime,Data+Breach,Data+Security,mobile+threats,Phishing,smishing&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p>Mobile devices are important tools to efficiently manage a business and to quickly meet the needs of a customer.  Think about the hit in productivity you’d take if you lost your smart phone or PDA.  Several weeks ago I <a href="http://www.experian.com/blogs/data-breach/2010/09/07/does-your-company-have-a-wireless-device-data-policy-in-place/" target="_blank"><span style="text-decoration: underline;">wrote about</span></a> the importance of implementing a wireless data policy to protect employee account data from being used to defraud a company.  However, a recent warning issued by the FBI’s <a href="http://www.ic3.gov/default.aspx" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">Internet Crime Complain Center</span></a> points to another danger associated with mobile devices.</p>
<p>Cybercriminals have been increasing their attacks on mobile devices through SMS text messages and fraudulent voice messages.  These tactics are very similar to traditional email phishing scams and ask the recipient to respond to verify an address, credit card number or other form of PII.  <a href="http://www.networkworld.com/community/node/68980" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">For example</span></a>, through a process called smishing, a mobile subscriber receives a text message stating, “ABC credit card is confirming your purchase” and asks the user to visit a URL or call a phone number to verify a credit card number.</p>
<p>Obviously these attacks have serious implications for employees on a personal and professional level.  The <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank"><span style="text-decoration: underline;">financial impact</span></a> to a company could be huge if an employee innocently provided a corporate bank account number as a response to a fraudulent SMS text message.</p>
<p>Fortunately, there are <a href="http://www.cmswire.com/cms/enterprise-20/mobile-enterprise-prevent-identity-theft-and-wire-tapping-009414.php" target="_blank" class="broken_link" rel="nofollow"><span style="text-decoration: underline;">several steps</span></a> employees can take to prevent the chance of becoming a victim. For example, you can advise employees not to respond to text messages or automated voice messages from unknown or blocked numbers.</p>
<p>Advise your employees about these potential dangers before any damages are done.</p>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/&via=Experian_DBR&text=Mobile smishing attacks are on the rise&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div><p><a class="a2a_dd a2a_target addtoany_share_save" href="http://www.addtoany.com/share_save#url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2010%2F12%2F21%2Fmobile-smishing-attacks-are-on-the-rise%2F&amp;title=Mobile%20smishing%20attacks%20are%20on%20the%20rise" id="wpa2a_4"><img src="http://www.experian.com/blogs/data-breach/wp-content/plugins/add-to-any/share_save_171_16.png" width="171" height="16" alt="Share"/></a></p>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2010/12/21/mobile-smishing-attacks-are-on-the-rise/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>