Following the news about 26,500 National Lottery accounts are feared to have been hacked, according to its operator Camelot. The firm said it did not believe its own systems had been compromised, but rather that the players’ login details had been stolen from elsewhere.
“We recommend regularly changing your login credentials, using strong passwords that conform to best practices, and never re-using the same identifier across more than one account. Additionally, it is important that customers do not click on any link that they may receive in an email from Camelot, as criminals typically impersonate brands immediately after a breach, pretending to offer official advice to worried consumers.”
“The key takeaway for all consumers from this breach is that password security is important, and especially, do not use the same password everywhere! It’s lucky that only a very few accounts were affected and there was no money lost, however, it illustrates that all pieces of information are valuable to hackers who in these cases typically investigate accounts for future fraud once they obtain access.It’s an unfortunate fact of life these days that breaches continue seemingly unabated. Our personal records are being shared on the dark web – sometimes years after the breach occurs. Data breaches continue to build upon each other, with each breach adding additional intelligence to achieving the goal of complete profiles of identities for a large segment of our population up for sale on the dark web. Where credit card fraud was all the rage a couple years ago, it is this kind of account takeover that is on the painful and dramatic rise. There are behaviorally-based methods that online merchants, banks, and providers, are going to need to deploy that will help keep consumer accounts safe, even if valid credentials are presented. These solutions give true insight into who sits behind the device – and provide a high-level of trust that it is the consumer, and not a fraudster using our identity information online. You can, and should, start expecting organizations you interact with to use these multi-layered and behavioral-based solutions to protect your online accounts.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.