How Much is My Information Worth on the Dark Web?

Mark Fisher
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
$
How Much is My Information Worth
on the Dark Web?
®
In the April 5, 2016 report by the
Identity Threat Resource Center
(ITRC) there have been
227 breaches compromising
6,214,514 records containing
personally identifiable information (PII)
The ITRC tracks
data breaches involving:
credit / debit card
numbers
email/password/
username records
protected health
information (PHI)
social security
numbers
But let’s identify the how’s and
why’s - and then what to do to
avoid your information - both
as an individual and as an
organization from getting hacked.
It’s no secret this information is
the new currency on the Dark Web.
How is Data
Compromised?
Most stolen data is being sold in the Dark Web. But for how much?
Here’s what the recent McAfee’s report, Hidden Data Economy estimates:
Bitglass, undertook an experiment in 2015 to
understand what happens to sensitive data once
it’s stolen. In the experiment, stolen data traveled
the globe, landing in five different continents
and 22 countries within two weeks.
Overall, the data was viewed more than 1,000 times and downloaded 47 times;
some activity had connections to crime syndicates in Nigeria and Russia.
Loyalty Programs to
Enhance Profiling
It’s not just credit card information for sale.
On the Dark Web just about any information can be found,
including free online accounts, including loyalty programs.
What’s the value?
At face value, maybe it’s for the reward points.
Digging deeper maybe it’s to profile targets of interest.
A hacker can build an accurate profile by compiling data from the following
loyalty programs: airline and hotel, gas and convenient store, Uber and Amtrak,
fast food and coffee houses, and retail programs.
By having a key identifier, ie. personal email,
the Hacker now knows, “Joe goes to Starbucks,
corner of East and West everyday, orders a
double espresso and then hops on Amtrak #7
Eastbound. He also goes to Subway for lunch
between 2-3pm, corner of Smith and Weston.
Every Sunday he stays home and binge
watches Downton Abbey.”
Loyalty programs without an
e-commerce component are an easy
target to hack because they may not
even use encryption.
Simple child’s play in a
hacker’s world.
Avoidance of a Hack
is Impractical; But Use
Your Best Defenses:
•	Use a shredder - for everything: CDs, invoices, solicitations, etc.
•	Change your passwords monthly
•	Use random passwords with letters, numbers and special characters
•	Use two factor authentication when offered
•	Only trust your information to encrypted (https://) websites
On the Human Side:
•	Turn technology off when it’s not being used
•	Unplug when you are away for more than a day
•	Be smart about smart technology - do you really
need wifi on your garage door? Does your
refrigerator need to communicate with you?
•	Pick up the phone and verify legitimate
business partners
•	Be wary of wire transfer requests and invoice
urgency emails
•	Don’t open emails from unknown senders
•	Don’t open attachments you are not expecting
•	Don’t click on embedded links in emails
•	Cyber security is more than a firewall and antivirus software
•	Defend the perimeter, use monitoring software to see unusual activity
•	Train for the human-factor
•	Know your baseline traffic
On the Technology Side:
Be vigilant and keep watch of your finances, but not while you’re
using the free wifi at the coffee shop.
www.garlandtechnology.com
in Security Projects
How to Guide:
Optimizing Network Design
DOWNLOAD MY GUIDE NOW
®
1 de 20

Recomendados

I2P and the Dark Web por
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
1.4K visualizações33 slides
5 Media Innovations From The Secret Deep Web por
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep WebAmber Horsburgh
27.4K visualizações20 slides
The Dark web - Why the hidden part of the web is even more dangerous? por
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
22.1K visualizações32 slides
The Dark Net por
The Dark NetThe Dark Net
The Dark NetManabu Kobayashi
5.1K visualizações8 slides
Deep web por
Deep webDeep web
Deep webANKIT OJHA
3.8K visualizações23 slides
Research in the deep web por
Research in the deep webResearch in the deep web
Research in the deep webSeth Porter, MA, MLIS
515 visualizações26 slides

Mais conteúdo relacionado

Mais procurados

Why We Need a Dark(er) Web por
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
1.8K visualizações77 slides
Deep Web por
Deep WebDeep Web
Deep WebAbishaiDas
175 visualizações20 slides
Deep and Dark Web por
Deep and Dark WebDeep and Dark Web
Deep and Dark WebMd. Nazmus Shakib Robin
17.6K visualizações14 slides
Rolling in the Deep. ISACA.SV.2016 por
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Bich (Evelyn) Chu
543 visualizações52 slides
Deep Dark Web - How to get inside? por
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
1.8K visualizações32 slides
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr. por
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
26K visualizações36 slides

Mais procurados(20)

Why We Need a Dark(er) Web por Jeroen Baert
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
Jeroen Baert1.8K visualizações
Deep Web por AbishaiDas
Deep WebDeep Web
Deep Web
AbishaiDas175 visualizações
Rolling in the Deep. ISACA.SV.2016 por Bich (Evelyn) Chu
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
Bich (Evelyn) Chu543 visualizações
Deep Dark Web - How to get inside? por Anshu Prateek
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
Anshu Prateek1.8K visualizações
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr. por Trend Micro
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Trend Micro26K visualizações
The Dark Web por Suraj Jaundoo
The Dark WebThe Dark Web
The Dark Web
Suraj Jaundoo3.8K visualizações
Drugs & the Dark Net por Tim Bingham
Drugs & the Dark NetDrugs & the Dark Net
Drugs & the Dark Net
Tim Bingham973 visualizações
Darknet por Hiro Oshikawa
DarknetDarknet
Darknet
Hiro Oshikawa9.7K visualizações
Deepweb and darkweb vinodkumar ancha por vinod kumar
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar3K visualizações
The Dark side of the Web por Paula Ripoll Cacho
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho3.3K visualizações
Cybercrime in the Deep Web (BHEU 2015) por Marco Balduzzi
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
Marco Balduzzi983 visualizações
Dark web por Nikki Noveno
Dark webDark web
Dark web
Nikki Noveno3.6K visualizações
Guide to dark web por Jspider - Noida
Guide to dark webGuide to dark web
Guide to dark web
Jspider - Noida716 visualizações
Dark net por Paolo Razon
Dark netDark net
Dark net
Paolo Razon3.2K visualizações
Darknet por Matthew Kwong
DarknetDarknet
Darknet
Matthew Kwong1.8K visualizações

Destaque

Dark web by Claudine Impas por
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine ImpasClaudine Impas
768 visualizações6 slides
The Dark Web by Kenneth Yu por
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth YuKenny Yu
484 visualizações7 slides
The Dark Web por
The Dark WebThe Dark Web
The Dark WebConnor Willer
3.2K visualizações31 slides
Dark Web and Privacy por
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
4.1K visualizações44 slides
What is ICANN? (Russian) por
What is ICANN? (Russian)What is ICANN? (Russian)
What is ICANN? (Russian)ICANN
676 visualizações9 slides
ICANN 51: DNS Risk Framework por
ICANN 51: DNS Risk FrameworkICANN 51: DNS Risk Framework
ICANN 51: DNS Risk FrameworkICANN
638 visualizações23 slides

Destaque(18)

Dark web by Claudine Impas por Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
Claudine Impas768 visualizações
The Dark Web by Kenneth Yu por Kenny Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
Kenny Yu484 visualizações
The Dark Web por Connor Willer
The Dark WebThe Dark Web
The Dark Web
Connor Willer3.2K visualizações
Dark Web and Privacy por Brian Pichman
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Brian Pichman4.1K visualizações
What is ICANN? (Russian) por ICANN
What is ICANN? (Russian)What is ICANN? (Russian)
What is ICANN? (Russian)
ICANN676 visualizações
ICANN 51: DNS Risk Framework por ICANN
ICANN 51: DNS Risk FrameworkICANN 51: DNS Risk Framework
ICANN 51: DNS Risk Framework
ICANN638 visualizações
E-COMMERCE: The Dark Web por rardthebeast
E-COMMERCE: The Dark Web E-COMMERCE: The Dark Web
E-COMMERCE: The Dark Web
rardthebeast632 visualizações
I2P (Invisible Internet Project) por Shail Shah
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)
Shail Shah1.5K visualizações
Making domain name and IP address policy at ICANN por Stephane Van Gelder
Making domain name and IP address policy at ICANNMaking domain name and IP address policy at ICANN
Making domain name and IP address policy at ICANN
Stephane Van Gelder2K visualizações
The Dark Side of Content Marketing por Scripted.com
The Dark Side of Content MarketingThe Dark Side of Content Marketing
The Dark Side of Content Marketing
Scripted.com1.5K visualizações
The Dark Web por Jan Siy
The Dark WebThe Dark Web
The Dark Web
Jan Siy1.5K visualizações
The Dark Web por jamiecornista
The Dark WebThe Dark Web
The Dark Web
jamiecornista11.6K visualizações
The Dark Net por Paige Rasid
The Dark NetThe Dark Net
The Dark Net
Paige Rasid2.6K visualizações
Deep web (amatuer level) por Ali Saif Mirza
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
Ali Saif Mirza2.1K visualizações
The dark web darwin de leon por Darwin de Leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
Darwin de Leon1K visualizações
The dark web por hellboytonmoy
The dark webThe dark web
The dark web
hellboytonmoy2.7K visualizações
Deep Web & Dark Web por Paolo Vedorin
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark Web
Paolo Vedorin3.2K visualizações
Deep Web por St John
Deep WebDeep Web
Deep Web
St John52.7K visualizações

Similar a How Much is My Information Worth on the Dark Web?

Steps and Tips to Protect Yourself and your Private Information while Online.... por
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
1.4K visualizações30 slides
Idenity Theft por
Idenity TheftIdenity Theft
Idenity TheftTriciaLogsdon
79 visualizações6 slides
csa2014 IBC por
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
728 visualizações28 slides
Identity Theft Presentation por
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
17.2K visualizações26 slides
Personal Data Security in a Digital World por
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital Worldalxdvs
548 visualizações15 slides
SEO2India - Cyber crime por
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Devang Barot - SEO2India
1.5K visualizações42 slides

Similar a How Much is My Information Worth on the Dark Web?(20)

Steps and Tips to Protect Yourself and your Private Information while Online.... por Abzetdin Adamov
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov1.4K visualizações
Idenity Theft por TriciaLogsdon
Idenity TheftIdenity Theft
Idenity Theft
TriciaLogsdon79 visualizações
csa2014 IBC por apyn
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn728 visualizações
Identity Theft Presentation por charlesgarrett
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett17.2K visualizações
Personal Data Security in a Digital World por alxdvs
Personal Data Security in a Digital WorldPersonal Data Security in a Digital World
Personal Data Security in a Digital World
alxdvs548 visualizações
workers participation in management por lily004
workers participation in managementworkers participation in management
workers participation in management
lily004990 visualizações
Cybersecurity for the non-technical por Stephen Cobb
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
Stephen Cobb2.2K visualizações
Computer and internet fraud por Karmaveersinghsankhl
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
Karmaveersinghsankhl157 visualizações
ID Theft and Computer Security 2008 por Donald E. Hester
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
Donald E. Hester3.5K visualizações
The Major Types of Cybercrime por Rubi Orbeta
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta250 visualizações
Tips to secure yourself from identity thefts por weblinkindia1
Tips to secure yourself from identity theftsTips to secure yourself from identity thefts
Tips to secure yourself from identity thefts
weblinkindia1107 visualizações
Cyber Law (Identity Theft) por Jermaine Smith
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
Jermaine Smith82 visualizações
Cyber law (identity theft) por Jermaine Smith
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
Jermaine Smith357 visualizações
Cyber security (2) (2) por ameyjakate
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
ameyjakate94 visualizações
Jax london2016 cybercrime-and-the-developer por Steve Poole
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
Steve Poole155 visualizações
Hacker risks presentation to ACFE PR Chapter por Jose L. Quiñones-Borrero
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
Jose L. Quiñones-Borrero1.4K visualizações
Information Security Awareness Orientation por mohannadalhanahnah
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientation
mohannadalhanahnah217 visualizações
Cyber Crime Cyber Space and Effects .pptx por SahilMishra81
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra8116 visualizações
Cyber Crime, Cyber Space and Effects .pptx por SahilMishra81
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra8155 visualizações

Último

DSD-INT 2023 Process-based modelling of salt marsh development coupling Delft... por
DSD-INT 2023 Process-based modelling of salt marsh development coupling Delft...DSD-INT 2023 Process-based modelling of salt marsh development coupling Delft...
DSD-INT 2023 Process-based modelling of salt marsh development coupling Delft...Deltares
7 visualizações18 slides
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ... por
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...Donato Onofri
795 visualizações34 slides
SAP FOR TYRE INDUSTRY.pdf por
SAP FOR TYRE INDUSTRY.pdfSAP FOR TYRE INDUSTRY.pdf
SAP FOR TYRE INDUSTRY.pdfVirendra Rai, PMP
24 visualizações3 slides
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -... por
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...Deltares
6 visualizações15 slides
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ... por
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...Deltares
10 visualizações32 slides
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports por
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug ReportsBushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug ReportsRa'Fat Al-Msie'deen
5 visualizações49 slides

Último(20)

DSD-INT 2023 Process-based modelling of salt marsh development coupling Delft... por Deltares
DSD-INT 2023 Process-based modelling of salt marsh development coupling Delft...DSD-INT 2023 Process-based modelling of salt marsh development coupling Delft...
DSD-INT 2023 Process-based modelling of salt marsh development coupling Delft...
Deltares7 visualizações
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ... por Donato Onofri
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...
Unmasking the Dark Art of Vectored Exception Handling: Bypassing XDR and EDR ...
Donato Onofri795 visualizações
SAP FOR TYRE INDUSTRY.pdf por Virendra Rai, PMP
SAP FOR TYRE INDUSTRY.pdfSAP FOR TYRE INDUSTRY.pdf
SAP FOR TYRE INDUSTRY.pdf
Virendra Rai, PMP24 visualizações
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -... por Deltares
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
Deltares6 visualizações
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ... por Deltares
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...
Deltares10 visualizações
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports por Ra'Fat Al-Msie'deen
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug ReportsBushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports
Ra'Fat Al-Msie'deen5 visualizações
Copilot Prompting Toolkit_All Resources.pdf por Riccardo Zamana
Copilot Prompting Toolkit_All Resources.pdfCopilot Prompting Toolkit_All Resources.pdf
Copilot Prompting Toolkit_All Resources.pdf
Riccardo Zamana8 visualizações
SAP FOR CONTRACT MANUFACTURING.pdf por Virendra Rai, PMP
SAP FOR CONTRACT MANUFACTURING.pdfSAP FOR CONTRACT MANUFACTURING.pdf
SAP FOR CONTRACT MANUFACTURING.pdf
Virendra Rai, PMP11 visualizações
DSD-INT 2023 European Digital Twin Ocean and Delft3D FM - Dols por Deltares
DSD-INT 2023 European Digital Twin Ocean and Delft3D FM - DolsDSD-INT 2023 European Digital Twin Ocean and Delft3D FM - Dols
DSD-INT 2023 European Digital Twin Ocean and Delft3D FM - Dols
Deltares7 visualizações
Advanced API Mocking Techniques por Dimpy Adhikary
Advanced API Mocking TechniquesAdvanced API Mocking Techniques
Advanced API Mocking Techniques
Dimpy Adhikary19 visualizações
DSD-INT 2023 Machine learning in hydraulic engineering - Exploring unseen fut... por Deltares
DSD-INT 2023 Machine learning in hydraulic engineering - Exploring unseen fut...DSD-INT 2023 Machine learning in hydraulic engineering - Exploring unseen fut...
DSD-INT 2023 Machine learning in hydraulic engineering - Exploring unseen fut...
Deltares7 visualizações
Agile 101 por John Valentino
Agile 101Agile 101
Agile 101
John Valentino7 visualizações
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema por Deltares
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - GeertsemaDSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema
Deltares17 visualizações
Navigating container technology for enhanced security by Niklas Saari por Metosin Oy
Navigating container technology for enhanced security by Niklas SaariNavigating container technology for enhanced security by Niklas Saari
Navigating container technology for enhanced security by Niklas Saari
Metosin Oy13 visualizações
Dapr Unleashed: Accelerating Microservice Development por Miroslav Janeski
Dapr Unleashed: Accelerating Microservice DevelopmentDapr Unleashed: Accelerating Microservice Development
Dapr Unleashed: Accelerating Microservice Development
Miroslav Janeski10 visualizações
SUGCON ANZ Presentation V2.1 Final.pptx por Jack Spektor
SUGCON ANZ Presentation V2.1 Final.pptxSUGCON ANZ Presentation V2.1 Final.pptx
SUGCON ANZ Presentation V2.1 Final.pptx
Jack Spektor22 visualizações
Headless JS UG Presentation.pptx por Jack Spektor
Headless JS UG Presentation.pptxHeadless JS UG Presentation.pptx
Headless JS UG Presentation.pptx
Jack Spektor7 visualizações
DSD-INT 2023 Salt intrusion Modelling of the Lauwersmeer, towards a measureme... por Deltares
DSD-INT 2023 Salt intrusion Modelling of the Lauwersmeer, towards a measureme...DSD-INT 2023 Salt intrusion Modelling of the Lauwersmeer, towards a measureme...
DSD-INT 2023 Salt intrusion Modelling of the Lauwersmeer, towards a measureme...
Deltares5 visualizações

How Much is My Information Worth on the Dark Web?

  • 2. In the April 5, 2016 report by the Identity Threat Resource Center (ITRC) there have been 227 breaches compromising 6,214,514 records containing personally identifiable information (PII)
  • 3. The ITRC tracks data breaches involving: credit / debit card numbers email/password/ username records protected health information (PHI) social security numbers
  • 4. But let’s identify the how’s and why’s - and then what to do to avoid your information - both as an individual and as an organization from getting hacked. It’s no secret this information is the new currency on the Dark Web.
  • 6. Most stolen data is being sold in the Dark Web. But for how much? Here’s what the recent McAfee’s report, Hidden Data Economy estimates:
  • 7. Bitglass, undertook an experiment in 2015 to understand what happens to sensitive data once it’s stolen. In the experiment, stolen data traveled the globe, landing in five different continents and 22 countries within two weeks.
  • 8. Overall, the data was viewed more than 1,000 times and downloaded 47 times; some activity had connections to crime syndicates in Nigeria and Russia.
  • 10. It’s not just credit card information for sale. On the Dark Web just about any information can be found, including free online accounts, including loyalty programs. What’s the value?
  • 11. At face value, maybe it’s for the reward points. Digging deeper maybe it’s to profile targets of interest. A hacker can build an accurate profile by compiling data from the following loyalty programs: airline and hotel, gas and convenient store, Uber and Amtrak, fast food and coffee houses, and retail programs.
  • 12. By having a key identifier, ie. personal email, the Hacker now knows, “Joe goes to Starbucks, corner of East and West everyday, orders a double espresso and then hops on Amtrak #7 Eastbound. He also goes to Subway for lunch between 2-3pm, corner of Smith and Weston. Every Sunday he stays home and binge watches Downton Abbey.”
  • 13. Loyalty programs without an e-commerce component are an easy target to hack because they may not even use encryption. Simple child’s play in a hacker’s world.
  • 14. Avoidance of a Hack is Impractical; But Use Your Best Defenses:
  • 15. • Use a shredder - for everything: CDs, invoices, solicitations, etc. • Change your passwords monthly • Use random passwords with letters, numbers and special characters • Use two factor authentication when offered • Only trust your information to encrypted (https://) websites On the Human Side:
  • 16. • Turn technology off when it’s not being used • Unplug when you are away for more than a day • Be smart about smart technology - do you really need wifi on your garage door? Does your refrigerator need to communicate with you? • Pick up the phone and verify legitimate business partners
  • 17. • Be wary of wire transfer requests and invoice urgency emails • Don’t open emails from unknown senders • Don’t open attachments you are not expecting • Don’t click on embedded links in emails
  • 18. • Cyber security is more than a firewall and antivirus software • Defend the perimeter, use monitoring software to see unusual activity • Train for the human-factor • Know your baseline traffic On the Technology Side:
  • 19. Be vigilant and keep watch of your finances, but not while you’re using the free wifi at the coffee shop.
  • 20. www.garlandtechnology.com in Security Projects How to Guide: Optimizing Network Design DOWNLOAD MY GUIDE NOW ®