Page 5 - End of Year 16 Page Booklet QTY 50
P. 5

We examined how consumers’ data was affected after breaches in the following industries: social

             media, travel, financial and healthcare.




                                   SOCIAL MEDIA AND OVERSHARING OF DATA



             Some of the most talked about breaches involve social media platforms or community based
             mobile applications. The most notable compromised social media platform in 2018 was Facebook.

             Impacted by multiple incidents, including the Cambridge Analytica data misuse, one significant
             breach was caused by a vulnerability in coding that allowed hackers to access “tokens” for 50

             million accounts. Tokens keep users logged in automatically, giving hackers the ability to view any
             information users had in their profiles: name, employment information, relatives, phone numbers,

             date of birth, etc. Users that utilized the Facebook authorization to log in to other platforms, like
             Instagram and e-commerce sites, potentially allowed hackers access to those accounts as well.



             Google+ was breached twice impacting 53 million users. A security bug allowed third-party

             developers to access public user profile data since 2015. If a user gave permission to an app to
             access their public profile data, the bug also let developers pull non-public profile fields for the user

             and user’s friends including: full names, email addresses, birth dates, gender, profile photos, places
             lived, occupation and relationship status. Quora (100 million users impacted) and MyFitnessPal (150

             million users impacted) were also breached, allowing hackers access to usernames/emails and
             passwords as well as personal fitness data in the case of MyFitnessPal.



             The use of the same username/password or Facebook login credentials over multiple platforms

             allows a single breach to impact many accounts. Hackers use the compromised data in an effort to
             credential crack various platforms in order to gain more access to information. Unique usernames

             and passwords as well as minimal sharing of personal data allows consumers to minimize their
             risk of identity theft.













                       © IDENTITY THEFT RESOURCE CENTER 2019  |  IDTHEFTCENTER.ORG
                         © IDENTITY THEFT RESOURCE CENTER 2019  |  IDTHEFTCENTER.ORG
   1   2   3   4   5   6   7   8   9   10