When news of a data breach emerges, victims are warned about the potential for identity theft and related crimes. But every so often, the data breach is only discovered because identity theft has already happened. That was the case for Tidewater Community College (TCC), who had over three thousand employees’ complete employment profiles—with Social Security numbers, birthdates, and other identifiable information—accessed by an unauthorized person.
Financial aid is a crucial part of the college application process, and for many students that means filling out countless applications for scholarships, grants, and loans. Unfortunately, one of the inherent requirements for requesting large amounts of education money is the release of highly sensitive, personal identifying information.
When patients are undergoing treatment for potentially life-threatening illnesses, the last thing they need to worry about is identity theft. Unfortunately, that’s no longer the case for 2.2 million individuals whose identifying information was stolen in a breach of 21st Century Oncology.
Spoofing, phishing, spearphishing, boss phishing…the latest trend in data breaches may fall into a number of different categories, but it has something that other methods don’t have: it’s almost certain that the victim will fall for it. Why? Because his job could depend on it.
In late January, Krebs on Security reported on a data breach that apparently affected some Wendy’s restaurant locations, seemingly all located in the Midwest. The breach is believed to have affected the POS payment mechanisms in stores, as a number of financial institutions have reported suspicious card activity on their customers’ debit cards following visits to certain Wendy’s locations. Apparently? Seemingly? Suspicious? Where are the details of the data breach?