Mobile Tech Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
News & Product Reviews for Mobile Tech Users
Barium Ferrite (BaFe):
Higher Capacity, Superior
Performance, Longer Archival Life

www.thefutureoftape.com
Sunday, April 20th 
24/7/365 Network Uptime!
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Laptops & Tablets
Mobile Phones
Mobile Gadgets
Mobile Apps
BYOD & MDM
iPad
Mobile Industry News
Wireless Connectivity
Wireless Security
GPS & Maps
MTT Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Network Security

'Doxxing' Incidents Highlight Risk of Disclosing Personal Info


March 13, 2013 10:24AM

Bookmark and Share
"With vast amounts of personal information available about most people online -- much of which is shared voluntarily via social networking sites -- nefarious individuals are finding doxxing to be easier than ever," said security expert Brian Contos. Among those targeted with doxxing were Michele Obama, Britney Spears, Paris Hilton and Ashton Kutcher.

Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.

Against the backdrop of finger-pointing between the U.S. and China on the cybersecurity front, there's a new security scandal of Hollywood proportions going on. More than a dozen celebrities and officials have witnessed their personal information leaked onto the Internet.

The list of victims reads like a Who's Who and includes Secretary of State Hillary Clinton, Beyonce, First Lady Michelle Obama, Jay-Z, Kim Kardashian, Britney Spears, Ashton Kutcher, U.S. Attorney General Eric Holder, Los Angeles Police Chief Charlie Beck and Paris Hilton. The personal information -- everything from Social Security numbers to dates of birth to phone numbers -- was posted on a Web site called Exposed.su.

Both the LAPD and the FBI are investigating.

"LAPD detectives are investigating the recent disclosure of Chief Beck's personal information. Apparently this is not necessarily a hacking incident. It is called 'doxxing.' This has happened to the chief on two other occasions prior to this in a similar nature, post-Occupy L.A.," the LAPD said in a statement. "We are not at liberty to discuss the others mentioned in the Web post. There will be no further comments or press conferences on this matter."

With doxxing, an individual's persona is tracked online, and through deduction and various information services, data meant to be private is exposed and publicized. This differs from hacking, in which a computer or computers are broken into and information is stolen.

The New Doxxing

Brian Contos, worldwide vice president of field engineering at Solera Networks, said doxxing has moved attacks from targeting nameless, faceless organizations and governments to individuals.

"We've seen examples of this type of incident in Latin America, where hacktivists targeted specific individuals at organizations like police forces and published their names, photos, address, phone numbers, and other personal information," he told us. "With vast amounts of personal information available about most people online -- much of which is shared voluntarily via social networking sites -- nefarious individuals are finding doxxing to be easier than ever."

Wanted: Personal Details

The use and impact of this information isn't just limited to users' personal accounts, Contos said. Attackers increasingly look to obtain personal details about unsuspecting employees to inform advanced targeted attacks that can lead to massive data breaches at companies.

"Exacerbating the situation, many organizations are unaware they've been compromised until it's too late," Contos said. "On average, it's taking companies nearly three months to discover a malicious breach and more than four months to resolve one, according to recent research."

Furthermore, many organizations report they don't have the tools, personnel or funding to pinpoint the root cause of breaches. Contos' conclusion: These high-profile attacks underscore the importance of being careful about the information individuals share in public forums, as well as the need for businesses to have a comprehensive security strategy in place so they can respond swiftly when a breach occurs and minimize its impact.

Tell Us What You Think
Comment:

Name:



 Network Security
1. Heartbleed Exploit Could Cost Millions
2. Michaels: Nearly 3M Cards Breached
3. Google Street View Unravels CAPTCHAs
4. Teen Arrested for Heartbleed Hack
5. IBM Adds Disaster Recovery to SoftLayer




 Most Popular Articles
1. HP Rolls Out New Software-Defined Network Products
2. Google Glass Finds a Home in Medical Education, Practice
3. Smartphone Kill Switch Could Save Users $2.6B a Year
4. Avaya Aims To End Network Waiting Game
5. Google Video Shows Off Modular Project Ara Phone

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Cortana Fills Windows Phone Gap
  Galaxy S5 Phone: Less Can Be More
  Beware: Facebook Shares Your Locale
  Google, Rockstar Suit Stays in Calif.
  Google Earnings, Sales Disappoint

 Technology Marketplace

Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
BMC's I.T. solutions unleash the power of your business
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise I.T.
BMC's I.T. solutions unleash the power of your business
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
Heartbleed Could Cost Millions, Could Have Been Prevented
Early estimates of Heartbleed’s cost to enterprises are running in the millions. The reason: revoking all the SSL certificates the bug exposed will come at a very hefty price. Some say it all could have been avoided.
 
Michaels Says Nearly 3M Credit, Debit Cards Breached
Arts and crafts retail giant Michaels Stores has confirmed that a data breach at its POS terminals from May 2013 to Jan. 2014 may have exposed nearly 3 million customer credit and debit cards.
 
Google's Street View Software Unravels CAPTCHAs
The latest software Google uses for its Street View cars to read street numbers in images for Google Maps works so well that it also solves CAPTCHAs, those puzzles designed to defeat bots.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
The innovative headpiece may find its niche in markets where hands-free access to data can be a big advantage. Glass experiments for doctors are already under way, with some promising results.
 

Mobile Technology Spotlight
Review: Siri-Like Cortana Fills Windows Phone Gap
With the new Cortana virtual assistant, Windows catches up with Apple's iOS and Google's Android in a major way, taking some of the best parts of Apple's and Google's virtual assistants, with new tools too.
 
With Galaxy S5, Samsung Proves Less Can Be More
Samsung has produced the most formidable rival yet to the iPhone 5s: the Galaxy S5. The device is the fifth edition of the company's successful line of Galaxy S smartphones, and shows less can be more.
 
Facebook Rolls Out Potentially Intrusive Location-Sharing
Looking for friends? Facebook users in the U.S. will soon be able to see which of their friends are nearby, using a smartphone's GPS. Could be a cool feature in some cases, or way too much information.
 

Navigation
Mobile Tech Today
Home/Top News | Laptops & Tablets | Mobile Phones | Mobile Gadgets | Mobile Apps | BYOD & MDM | iPad
Mobile Industry News | Wireless Connectivity | Wireless Security | GPS & Maps | MTT Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 Mobile Tech Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.