The PRIVATE WiFi Blog

Search By Topic:

Popular Topics:



PRIVATE WiFi

The PRIVATE WiFi Blog

News & Features | Apr 14th, 2011

‘Spear Phishing’ Email Fears Spike in Wake of Epsilon Data Breach At Banks, Retail Giants

Elaine Rigoli

You’ve probably heard of phishing – it’s when a hacker pretends to be a trusted source in order to gain access to your online user name or email password.

In comparison, spear phishing involves more directly targeted emails in which the hacker already knows your personal details. This makes scamming appear more legitimate and much easier.

That’s why identity-theft fears are running rampant in the wake of the massive data breach at online marketer Epsilon. A hacker breached an Epsilon database that included millions of names and email addresses from customers who have “opted in” to emails from more than 50 large companies like Disney, Marriott, Hilton, Tivo, Best Buy, Target, Chase, US Bank, Capital One, Walgreens, Home Shopping Network, and Kroger.

Spear phishing is much harder to detect than regular phishing because the scammer already knows, for example, that you get your prescriptions filled at Walgreens, purchase your groceries at Kroger, bank at Chase, and take your kids to Disney every summer. As you can imagine, these spear-phishing scam emails are more directly targeted, increasing the odds you could have your identity compromised.

Epsilon -- which sends approximately 109 million daily email messages – has said only customer names and emails were leaked.

But many are starting to question exactly what Epsilon collects about consumers. For example, the Wall Street Journal notes a scary fact that implies they have more information than just names and email addresses:

“Companies like Epsilon know not to send a promotion for a winter coat to someone who lives in Miami, for example, or an email boasting low rates for mortgage refinances to people who don't own their homes.”

Even scarier? Epsilon is involved in loyalty programs to help companies know more about their customers – think about that the next time some checkout lady asks for your email! On its own website, Epsilon says its “powerful technology” tracks customers’ “transactions” – that would be your shopping history; “member profiles” – that would be all about you; and “program-specific data elements” – well, that could mean anything!

If you’re not sufficiently freaked out by your lack of privacy while shopping at brick-and-mortar and online shops, check out what else Epsilon manages on the behalf of countless corporations.

Online Safety Barriers

So while Epsilon tries to manage this public-relations nightmare, others are growing increasingly concerned. As one victim of the Epsilon email theft pointed out after hearing that “just his email” had been stolen from Epsilon, “It’s like, well, that's what you're telling me today. Are you going to be telling me something else tomorrow?"

It’s certainly a good idea to be wary of spam emails -- be extra cautious of any company or person attempting to get you to share your password or screen name via email. Another way the bad guys will try to steal your identity is by sending you a legitimate-looking email from your favorite retailer – for example, Target – and sharing a link for you to click to verify information. Don’t click on that link, as it will probably take you to a site with a virus or other phishing attack.

This Fox News video features security analyst Robert Siciliano, an industry expert with The Identity Theft Resource Center®, who shares even more wide-ranging security tips to protect yourself online in the wake of the Epsilon hacking.

Siciliano confirms that this latest data breach will put the issue of phishing on the map for everyone.

“We’re all going to get email after email – phishing emails – from bad guys trying to solicit our user names, passwords, credit card information, maybe other personal identifying information to take over existing accounts or open new accounts,” he says.

 

Associated Topics:

Associated Topics:

Comments

Related Posts

Protecting Your Identity with the Internet of Things

Thought Leadership
Eva Velasquez | May 21st, 2015

The internet of things—or IOT, as it’s commonly known—was once the stuff of science fiction, a newfangled “wave of the future” concept only experienced at futuristic demonstrations like the World’s Fair. But now many of these devices are already in use in millions of households around the world. They’ve become an interesting yet somehow still unknown entity in the world of technology, and industry experts have stated these products will be the norm just a handful of years from now. Read More

Avira Offers PRIVATE WiFi’s VPN As Part of New Bundle

News & Features
Jared Howe | May 14th, 2015

Germany-based security company, Avira, just announced the release of a new bundled product which includes both their Antivirus Pro and PRIVATE WiFi.  This bundle protects users from both malware infection and data theft. Read More

How To: Safari Privacy and Security Settings

how-to
Jared Howe | May 5th, 2015

To edit the security settings for Safari:

  1. Go to Safari > Preferences.
  2. Click the AutoFill tab.
  3. On this tab, select what types of forms your browser fills in automatically.
    Note: In general, you should remove all the checkboxes

Read More

How To: Internet Explorer Privacy and Security Settings

how-to
Jared Howe | May 5th, 2015

Internet Explorer has security measures in place to help protect you as you browse the web.

Follow these steps to adjust these settings:

  1. Within Internet Explorer, go to Tools > Internet Options. The Internet Options window appears.
  2. Select the

Read More

X

Thank you for subscribing to our newsletters

Your email has been added to our system. You will be e-mailed shortly with a request to confirm your membership. Please make sure to click the link in that message to confirm your subscription.