Industry News Recap: Android Malware Targets Activists

By | March 28th, 2013|Uncategorized|

This week, Kaspersky Lab discovered the first-known targeted attack to use Android malware, which targeted Tibetan activists and other ethnic groups in China. "The malware [used] a combination of e-mail hacking, ‘spear phishing’ and a Trojan built specifically for Android smartphones," said Ars Technica.Mashable said that the malware was "sent as an attachment in an [...]

Industry News Recap: Evernote Hacked

By | March 8th, 2013|Uncategorized|

This past week, Evernote had the misfortune of being the latest hacking victim. More than 50 million users were asked to reset passwords. Here’s a recap of what a couple articles had to say about the hacking.The Los Angeles Times reported that “hackers were able to gain access to users’ email addresses, their user names [...]

Malware Threats to be Aware of in 2013

By | November 29th, 2012|Uncategorized|

As we mentioned in our last blog post, malware is surging. According to McAfee, mobile malware grew two-fold last quarter, and Kaspersky found that there has been rapid growth in the number of malware programs targeting Android devices specifically. Most notably, McAfee says there was a 23% increase in new types of malware last quarter [...]

UDID’s and Non-Credit Monitoring

By | September 12th, 2012|Uncategorized|

Last week, 12-million Apple UDID’s were exposed in a breach that stemmed from the company BlueToad. Luckily, UDID’s don’t have much relevance to your personal identity. Nevertheless, this news did get us thinking about types of information that you should monitor that may not be as obvious as your social security number, credit report or [...]

Securing Your Digital Life: Lessons from the Mat Honan Hack

By | August 9th, 2012|Uncategorized|

With just a few easy details in hand, a hacker can drastically change your life. Wired technology reporter Mat Honan’s digital life was recently abolished by a couple of hackers who ultimately sought access to his three-letter Twitter handle, @Mat. Within a matter of minutes, they deleted his Google account, erasing years of communication with [...]

FBI Leads Undercover Operation Against Cyber Crime

By | July 3rd, 2012|Uncategorized|

Experian’s CyberAgent technology scans more than 10,000 underground websites and forums per day—more than 600,000 individual web pages—for personal identifying information (PII) being bought and sold. This PII includes bits like Social Security Numbers, email addresses, passwords and credit and debit card numbers. In fact, the credit and debit card numbers often come with the [...]

Hacker Speak

By | May 18th, 2012|Uncategorized|

Don’t know a mule from a ripper? Here is a quick tutorial on what you need to know when talking about the seedy underworld where hackers buy and sell stolen credit cards, identities and more.  Bins – Bank bins are the first 6 digits of a card. Carders (see below) selling credit cards will advertise [...]

Password Complexity: Why It Makes a Difference in a Breach

By | May 15th, 2012|Uncategorized|

By: Joel Carleton, Experian Director of Cyber EngineeringWe’ve all heard that it’s important to pick long, complicated passwords. What you may not realize is why this becomes crucial in the context of a breach. While ensuring you don’t pick from some of the most common passwords is important, it’s still not enough. Some background information on how passwords [...]

Marc Ostryniec Presents at ID360

By | April 24th, 2012|Uncategorized|

The Center for Identity at the University of Texas at Austin held the first annual ID360 Conference this week. Experian was there  in support of our VP of sales Marc Ostryniec, who presented on how proactive credential monitoring can reduce the risk of fraud that is an inherent problem when employees mishandle company credentials or [...]

Do You Know Who (Or What) Your Friends Are?

By | November 7th, 2011|Uncategorized|

With more than 800 million users worldwide, Facebook has become the defacto standard in social networking platforms.  One of its most important features, the ability to quickly and easily scan whether or not you know people by looking at common connections, has expanded networks across the entire world. You all know this already…  but how [...]

Load More Posts