Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 6 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Social media logins more valuable than credit cards

by The Gurus
March 31, 2014
in Editor's News
Share on FacebookShare on Twitter

Logins for social media accounts are now more valuable than credit card details to attackers.
 
According to the Telegraph, recent data breaches have caused a glut of data to flood onto the market, meaning that their value have dropped from between $20-$40 to $2, while access to social media accounts such as Twitter can vary from $16 to more than $325.
 
According to research by RAND and Juniper, while there is a value attached to credit card details, and immediately after a large breach, freshly acquired credit cards command a higher price, after time prices fall because the market becomes flooded.
 
The report said: “This cycle continues with each new large breach. Access to botnets and DDoS capabilities are cheaper because there are so many more options (same for exploit kits). The price of PII/PHI is falling (although some believe that its value is rising).”
 
Lancope CTO TK Keanini, said: “Today the credit card industry has made it more expensive for cyber crime operations when it comes to monetising stolen credit card data. However, the theft of a person’s identity in social media means that you now have trusted access to hundreds, if not thousands of people for a small window of time.
 
“During this time you can instruct them cleverly to download crimeware that will in turn steal more credentials to not only credit card data but any financial system.
 
“Whether defending your personal information or your companies information, you need to think like the adversary and that adversary is a part of a complex and highly effective supply chain. The data they want to take has value in some part of that supply chain and it may not be obvious because you don’t see it as directly monetized like a credit card dumps. This is why we must continuously monitor and adapt to the changing threat environment as they in turn do the same to our defences.
 
“Over the coming years, these dark markets are going to be more visible because 1) they are interesting and newsworthy and 2) it is where the business of cyber security is being invented and practiced. The business paradox they face is to become more visible and grow their market share or remain dark and exclusive slowing their revenue growth. The adversaries are treating cyber security as a business problem; it is about time that their victims do the same.”

FacebookTweetLinkedIn
Tags: Access Managementdata breachSocial Media
ShareTweetShare
Previous Post

CREST talk about current threats

Next Post

88 per cent change their cloud buying behaviour post Snowden

Recent News

Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023
london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information