The latest victim of cybercrime is Dow Jones & Co., which revealed that it was attacked by hackers seeking customer contact information. While contact info was the target of the breach, up to 3,500 payment card accounts may have been compromised. Ken Westin, senior security analyst with Tripwire have the following comments on it.

[su_note note_color=”#ffffcc” text_color=”#00000″]Ken Westin, Security Analyst for Tripwire :

Fraud fuels data breaches; the number of large data breaches we see every day proves the link between these two crimes. The rise of underground markets where hackers and fraudsters engage in commerce with one another has created a black market economy that generates demand for our personal information. The power of the Internet continues to strengthen the links between these two types of crimes allowing both to become more lucrative.

Our personal information is harvested by attackers from any business that collects and stores it. The initial breach is just the beginning of a long con which can play out over months or years with the goal of robbing individuals of large sums of money.

All financial services businesses are hot targets for cybercrime and fraud because their customers are more likely to be wealthier, and therefore be more lucrative targets.”[/su_note][su_box title=”About Tripwire” style=”noise” box_color=”#336588″]Tripwire logoTripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.[/su_box]

Subscribe
Notify of
guest

0 Expert Comments
Inline Feedbacks
View all comments
Information Security Buzz
0
Would love your thoughts, please comment.x
()
x