Wednesday, June 29, 2022
  • Penetration Testing in 2022: Key Trends and Challenges
  • DE:CODED – Firewall speeds and VPN risks
  • Whitepaper: Is “One-Click Remediation” Intentionally Misleading SOC Teams?
  • An Essential Synergy: Security Monitoring and Vulnerability Management
  • The Role of IAM in Maintaining Cloud Security

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Scraping Social Security Numbers on the Web

SBN

Scraping Social Security Numbers on the Web

by Tripwire Guest Authors on October 21, 2018

One of the most accredited forms of validation for a citizen’s identity is a Social Security Number. A Social Security Number is a significant piece of government-issued identification in the United States. When this information is compromised, it can lead to serious problems where an individual to impersonate someone.

DevOps Connect:DevSecOps @ RSAC 2022

A citizen may never know that their Social Security Number has been compromised, but even if they do, it can still take several months (or years) to obtain a new one. When a Social Security Number is compromised, whether it’s known or not, a malicious entity can leverage it to impersonate them to achieve various goals including utilizing their health care and opening credit lines.

The most important steps to take once it is believed that a Social Security Number has been compromised is to first file an identity theft report with the local police. Secondly, place a fraud alert on your credit file indicating that a potential identity theft has occurred. This can be done by contacting a credit reporting agency such as Equifax, TransUnion or Experian.

Identity fraud is more common than many citizens believe. A study done by Javelin Strategy and Research in February of 2018 revealed that the rate of fraud victims per year is increasing.

Javelin

Many incidents of identity fraud can be traced back to data breaches of major companies that deal with and store sensitive information of citizens. A recent example of a large amount of Social Security Numbers being leaked is the Equifax data breach discovered in July of 2017. In this breach, 145.5 million were reportedly affected. Due to this breach, digital attackers might have sold victims’ Social Security Numbers online and/or shared freely by malicious entities.

When hackers and identity thieves look to share information or advertise information they’re looking to (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/featured/scraping-social-security-numbers-on-the-web/

October 21, 2018October 21, 2018 Tripwire Guest Authors Featured Articles, security, Social Security, ssn
  • ← Choosing the Right Industrial Cybersecurity Framework
  • Hotel Room Security and Privacy with Special Guest Patrick McNeil – WB39 →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

NSA Wants To Help you Lock Down MS Windows in PowerShell
NIST Sets SSE Framework in Final SP 800-160 Guidance
Cybercriminals Hit Travel and Hospitality – Hard
ADPPA US Privacy Law: Coming Soon in Wake of Roe v. Wade Redo
Hermit Previews Sophisticated Spyware To Come
How Should API Keys be Stored?
Hackers Are Still Exploiting Log4Shell Vulnerability, Warns CISA
On the Dangers of Cryptocurrencies and the Uselessness of Blockchain
Cybersecurity News Round-Up: Week of June 20, 2022
A “whole-of-state” approach to cybersecurity

Upcoming Webinars

Thu 30

Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines

June 30 @ 11:00 am - 12:00 pm
Jul 19

Finding the Ransomware Threat INSIDE Your Backups

July 19 @ 3:00 pm - 4:00 pm
Jul 25

Applying the 2022 Open Source Findings to Software Supply Chain Risk Management

July 25 @ 3:00 pm - 4:00 pm
Jul 27

How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader

July 27 @ 1:00 pm - 2:00 pm
Aug 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 0
Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Security Awareness Security Boulevard (Original) Threat Intelligence 

Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity

May 23, 2022 Mike Hodge | May 23 Comments Off on Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Establishing a Root of Trust in Embedded Linux and IoT
Cybersecurity Endpoint Industry Spotlight IoT & ICS Security Security Boulevard (Original) Vulnerabilities 

Establishing a Root of Trust in Embedded Linux and IoT

April 18, 2022 Anita Buehrle | Apr 18 Comments Off on Establishing a Root of Trust in Embedded Linux and IoT

Top Stories

Cerby Emerges From Stealth to Transform Application Security
Application Security Cybersecurity Endpoint Featured Identity & Access Mobile Security News Security Awareness Security Boulevard (Original) Spotlight 

Cerby Emerges From Stealth to Transform Application Security

June 28, 2022 Michael Vizard | Yesterday 0
Russian Hackers Declare War on Lithuania — Killnet DDoS Panic
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Endpoint Featured Governance, Risk & Compliance Identity & Access Identity and Access Management Incident Response IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Russian Hackers Declare War on Lithuania — Killnet DDoS Panic

June 28, 2022 Richi Jennings | Yesterday 0
ADPPA US Privacy Law: Coming Soon in Wake of Roe v. Wade Redo
Application Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Identity & Access Identity and Access Management IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches 

ADPPA US Privacy Law: Coming Soon in Wake of Roe v. Wade Redo

June 27, 2022 Richi Jennings | 1 day ago 0

Security Humor

XKCD 'Extended NFPA Hazard Diamond'

XKCD ‘Extended NFPA Hazard Diamond’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.