|By Peter Silva||
|July 23, 2014 09:30 AM EDT||
Do you avoid stores that have had a credit card breach?
You are not alone. About 52% of people avoid merchants who have had a data breach according to a recent Lowcards survey. They surveyed over 400 random consumers to better understand the impact of identity theft on consumer behavior. 17% said they or a family member was a victim of identity theft over the last year with half the cases being credit card theft. 94% said they are more concerned or equally concerned about ID theft. They estimate that there were 13.5 million cases of credit card identity theft in the United States over the last 12 months.
These concerns are also changing the way some people shop.
Over half (56%) are taking extra measures to protect themselves from identity theft. Some of these behaviors include using a debit card less (28%), using cash more (25%), ordering online less (26%) and checking their credit report more (38%). These are all reasonable responses to the ever challenging game of protecting your identity and is important since 89% of security breaches and data loss incidents could have been prevented last year, according to the Online Trust Alliance’s 2014 Data and Breach Protection Readiness Guide.
The game is changing however, and mobile is the new stadium. Let’s check that scoreboard.
Most of the security reports released thus far in 2014, like the Cisco 2014 Annual Security Report and the Kaspersky Security Bulletin 2013 show that threats to mobile devices are increasing. We are using them more and using them for sensitive activities like shopping, banking and storing personally identifiable information. It is no wonder that the thieves are targeting mobile and getting very good at it. Kaspersky’s report talks about the rise of mobile botnets and the effectiveness since we never shut off our phones. They are always ready to accept new tasks either from us or, a foreign remotely controlled server with SMS trojans leading the pack. Mobile trojans can even check on the victim’s bank balance to ensure the heist is profitable and some will even infect your PC when you USB the phone to it.
Distribution of exploits in cyber-attacks by type of attacked application
I guess the good news is that people are becoming much more aware of the overall risks surrounding identity theft and breaches but will the convenience and availability of mobile put us right back in that dark alley? Mobile threats are starting to reach PC proportions with online banking being a major target and many of the potential infections are delivered via SMS messages. Sound familiar?
Maybe we can simply cut and replace ‘PC’ with ‘Mobile’ on all those decade old warnings of:
Watch what you click!
- Some consumers changing habits because of data breach, ID theft worries, report finds
- LowCards Exclusive Study: Identity Theft Concerns Shifting Shopping Habits of Americans
- Kaspersky Security Bulletin 2013. Overall Statistics for 2013
- Mobile Payments and Devices Under Attack
- An SMS Trojan with Global Ambitions
- Mobile Malware Milestone
- Mobile Threats Rise 261% in Perspective
- Nine Security Best Practices You Should Enforce
Dec. 10, 2016 01:00 PM EST Reads: 368
Dec. 10, 2016 01:00 PM EST Reads: 1,230
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to small, medium and large businesses, is the industry’s single source for the cloud. Fusion’s advanced, proprietary cloud service platform enables the integration of leading edge solutions in the cloud, including clou...
Dec. 10, 2016 01:00 PM EST Reads: 602
Dec. 10, 2016 12:45 PM EST Reads: 2,131
Dec. 10, 2016 12:30 PM EST Reads: 1,964
Dec. 10, 2016 12:15 PM EST Reads: 7,459
Dec. 10, 2016 12:15 PM EST Reads: 2,279
Dec. 10, 2016 12:00 PM EST Reads: 1,079
Dec. 10, 2016 12:00 PM EST Reads: 2,396
Dec. 10, 2016 12:00 PM EST Reads: 2,406
Dec. 10, 2016 12:00 PM EST Reads: 481
Dec. 10, 2016 12:00 PM EST Reads: 772
Dec. 10, 2016 11:30 AM EST Reads: 2,021
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
Dec. 10, 2016 11:00 AM EST Reads: 696
Infrastructure is widely available, but who’s managing inbound/outbound traffic? Data is created, stored, and managed online – who is protecting it and how? In his session at 19th Cloud Expo, Jaeson Yoo, SVP of Business Development at Penta Security Systems Inc., discussed how to keep any and all infrastructure clean, safe, and efficient by monitoring and filtering all malicious HTTP/HTTPS traffic at the OSI Layer 7. Stop attacks and web intruders before they can enter your network.
Dec. 10, 2016 11:00 AM EST Reads: 506