Hacking Identity Theft: Entry points, tools and prevention

Discussion in 'Emsisoft' started by exterminator20, Nov 30, 2013.

  1. exterminator20

    exterminator20 Initiat3 Known Member


    Identity theft has been around as long as there has been identity. Long before the age of computers, people specialized in the art of forgery, to pose as others and to use their assets to their advantage.

    Identity Theft: Ways and means

    Before computers and before what has become the ubiquitous connectivity of modern day life, information was much scarcer. Identify thieves had to work a lot harder to uncover their victim’s details; however, once they found what they wanted it was often much easier than it is today to get away with the crime.

    The emergence of large scale credit bureaus in 1970s marked a new era in identity theft. These bureaus specialized in the collection of individuals’ financial information, and they quickly became targets for maleficent con-men looking for an easy score. Primitive identify theft consisted of cold-calling such credit bureaus and conning customer service reps into giving away the essentials, like a person’s DOB and SSN. Identity thieves could then use these credentials to log onto government databases and access financial activity records.

    Before the Internet became what it is today, these records were about all identity thieves had to work with. Such records were usually just a simple list of where a person held financial accounts, and nothing more. Identity thieves had to use these records as leads, and contact the places where their victim banked directly, over the phone. They’d then have to swindle their way past yet another customer service rep, and hope to get an account number – the prized payoff and score.

    Today, all of this has changed. Smooth talking con-men who could charm their way past yesterday’s customer service reps have been replaced by the modern day hacker, who instead manipulates the encrypted data of 1s and 0s.

    Read the rest at Emsisoft here: http://blog.emsisoft.com/2013/11/28/hacking-identity-theft-entry-points-tools-and-prevention/?ref=news131128&utm_source=newsletter&utm_medium=newsletter&utm_content=tec131128&utm_campaign=news131128
  2. Google Adsense

Share This Page