Publicity of attacks on information systems is increasing. Examples of two news stories are shown here.
Identity Thieves Prosper in Information Age
Identity thieves assume the identities of other individuals and use these identities to obtain credit cards, loans and other things of value. The old methods used to obtain information still apply: stealing credit card statements, bank checks, and other personal information from mailboxes. However, the openness of the Internet has given identity thieves access to a wealth of personal information stored in the databases of online data brokers, who collect and sell personal information. These online brokers gather data from public records, credit applications, and consumer-provided forms, such as warranty registration cards. In a typical case of identity theft, thieves use stolen credit cards to purchase reports, ranging in price from $25 to $280, from online brokers. These reports often contain Social Security numbers, employment information, and driving records. This information is then used to obtain phony drivers’ licenses, order more credit cards, and withdraw money from bank accounts.
According to the U.S. Department of Justice, Internet fraud, including identity theft, is one of the fastest growing white-collar crimes. However, there are certain things you can do to minimize the risk of identity theft. Don’t give out personal information to others without asking how it will be used. Make sure there is a compelling reason for giving your Social Security number to someone. Pay attention to credit card and bank statements. If there are strange charges on your statements, or if the statements are late in the mail, call the company involved. You should also pick up your mail promptly and shred personal documents and personally identifiable information, including unwanted credit card applications, before throwing them away. Finally, review your credit report periodically for unusual listings.
Virus relies on Human Psychology
As computer users become increasingly wary of email attachments from unknown sources, virus developers are relying on human psychology as well as technology to spread malicious code. Virus writers use social engineering techniques to manipulate users into letting down their guard. Emails soliciting donations to a relief fund or offering information on an intriguing topic, be it political or pornographic, may cause users to forget caution in their desire to help. Such email attachments, with titles designed to elicit an emotional response or appeal to a user's curiosity, entice recipients to open files, give out credit card numbers and other personal information, or clog up and slow down systems by forwarding phony emails on to numerous friends and colleagues. Unfortunately, even the most up to date anti-virus software cannot completely protect systems from this type of threat. If users are not educated to recognize social engineering techniques, the combination of a lethal virus and a titillating subject line could be disastrous.