Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 23 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Sport Teams and Events Are Buried Treasure for Hackers

by The Gurus
July 8, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

Large sports teams and large sporting events are attractive to cyber criminals on several levels. Not only are they highly visible and present large targets of opportunity for criminals who may be looking to earn a name for themselves, teams also amass large repositories of valuable performance and health stats and analytics on players and games.
Thieves and hackers are attracted to the huge publicity a large hack could potentially get, and also to the large repository of valuable data large teams collect and maintain. This data can be sold to legitimate industries including the media and fantasy sports gamers, but also bookies and organised crime involved in illegal betting and gambling. Opponents and rival events could also be interested in getting a leg-up on their rival with insider information.
Also, these organisations conduct a high volume of e-commerce transactions. Teams and events are increasingly transacting online for bookings and sales, and of course, are fully embracing mobile payment options making them at risk for malware and phishing attacks, akin to the risk profile that large e-comm  and m-comm vendors have.
First of all, the team or organisation could be targeted for a breach that exposes personally identifiable information of their customers, fans, and even their players and staff. Several large attacks in recent years have borne this out, for example the 2015 “Team Sky” attack that went after performance data in order to discredit Tour De France leader Froome. Sometimes these attacks can also be politically motivated, as in the FC Barcelona attack that sought to embarrass the team on their twitter account.
If the breach has been successful in gathering identity data, this info can often lie dormant while the hacker attempts to amass more data points in order to add value. The data is compiled into sets called “fullz”. Once complete, these identity packages sell for more, and can be used by fraudsters to take over accounts in all kinds of places, or on the team and event sites to purchase tickets or collectables for resale.
Sports teams, just like high profile retailers, can protect against these identity thieves by ensuring they fully understand who is turning up at the account login page. The advantage they have is that fans typically return again and again and a behavioural biometric tool could be a very useful in building a solid profile of the good user in order to provide real-time verification.
By not waiting until transaction, but building a more complete identity profile of the user over time, behavioural biometrics (BB) tools empower online vendors to investigate at any point when high-risk activity is detected but present no friction to users until the vendor chooses to introduce it. This can greatly enhance the customer’s experience at login or checkout. With the knowledge that false declines can account for 32% of lost customers, basically handing the customer to a competitor, removing friction for customers you are a certain are good customers will improve their experience with that brand.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

414,949 D-Link cameras, IoT devices can be hijacked over the net

Next Post

Mind the reality gap: 5 dangerous misconceptions when sharing our personal data

Recent News

Ferrari Data Breach: The Industry has its say

Ferrari Data Breach: The Industry has its say

March 22, 2023
security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information