{"id":79606,"date":"2015-10-15T04:13:34","date_gmt":"2015-10-15T08:13:34","guid":{"rendered":"http:\/\/countingpips.com\/?p=79606"},"modified":"2015-10-15T10:11:59","modified_gmt":"2015-10-15T14:11:59","slug":"can-you-really-protect-your-online-data","status":"publish","type":"post","link":"https:\/\/www.investmacro.com\/forex\/2015\/10\/can-you-really-protect-your-online-data\/","title":{"rendered":"Can You Really Protect Your Online Data?"},"content":{"rendered":"<div id=\"inves-3129411968\" class=\"inves-below-title-posts inves-entity-placement\"><div id =\"posts_date_custom\"><div align=\"left\">October 15, 2015<\/div><hr style=\"border: none; border-bottom: 3px solid black;\">\r\n<\/div><\/div><p>By <a href=\"http:\/\/WallStreetDaily.com\/\"><u>WallStreetDaily.com<\/u><\/a> <img loading=\"lazy\" decoding=\"async\" class=\"attachment-home-th wp-post-image\" style=\"display: block; margin-bottom: 5px; clear: both;\" src=\"http:\/\/www.wallstreetdaily.com\/wp-content\/uploads\/2015\/10\/10-15-online-data-security.jpg\" alt=\"Cyber Security: Can You Really Protect Your Online Data?\" width=\"510\" height=\"300\" \/><\/p>\n<p>By <a href=\"http:\/\/www.wallstreetdaily.com\/author\/greg-miller\/\">Greg Miller<\/a>, <em>Senior Technology Analyst<\/em><\/p>\n<p>In Tuesday evening\u2019s Democratic Primary Debate, the candidates were asked about the biggest threat facing America\u00a0 today.<\/p>\n<p>Naturally, Middle East volatility and the rise of ISIS were cited, in addition to nuclear weapons falling into the wrong hands.<\/p>\n<p>But it was somewhat surprising that only one candidate \u2013 former Virginia Senator Jim Webb \u2013 mentioned cyber crime.<\/p>\n<p>Cyber crime continues to be a constant menace to businesses and consumers alike \u2013 and it\u2019s far easier to perpetrate than making physical war or acquiring nuclear weapons.<\/p><div id=\"inves-340477115\" class=\"inves-in-content inves-entity-placement\"><hr style=\"border: 1px solid #ddd;\">\r\n<div id=\"inpost_ads_header\">\r\n<p style=\"font-size:10px; float:left; color:#666;\">Free Reports:<\/p><\/div>\r\n<div id=\"inpost_ads\"> \r\n<p style=\"font-size:15px; float:left;\"><a href=\"https:\/\/goo.gl\/1ApBOV\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/investmacro.com\/wp-content\/uploads\/2018\/06\/graph_techs_PD.png\" align=\"left\" width=\"80\"  height=\"55\"\/><\/a>\r\n\t     <a href=\"https:\/\/goo.gl\/1ApBOV\"><b><u>Get Our Free Metatrader 4 Indicators<\/u><\/b><\/a> - Put Our Free MetaTrader 4 Custom Indicators on your charts when you join our Weekly Newsletter<\/p><br><br>\r\n<br>\r\n<br>\r\n<p style=\"font-size:15px; float:left;\"><a href=\"https:\/\/goo.gl\/f3RrHX\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/investmacro.com\/wp-content\/uploads\/2019\/01\/cot_pie_80.png\" align=\"left\" width=\"80\"  height=\"55\"\/><\/a>\r\n\t    <a href=\"https:\/\/goo.gl\/f3RrHX\"><b><u>Get our Weekly Commitment of Traders Reports<\/u><\/b><\/a> - See where the biggest traders (Hedge Funds and Commercial Hedgers) are positioned in the futures markets on a weekly basis.<\/p><br><br>\r\n<\/div>\r\n<hr style=\"border: 1px solid #ddd;\">\r\n<br><\/div>\n<p>We\u2019ve covered this topic many times.<\/p>\n<p>In August, for example, I covered the particularly embarrassing <a href=\"http:\/\/www.wallstreetdaily.com\/2015\/08\/27\/spotify-cyber-security\">hack<\/a> of internet \u201cdating\u201d site Ashley Madison, which exposed the details of millions of cheaters, as well as how <a href=\"http:\/\/www.wallstreetdaily.com\/2014\/12\/30\/fitbit-ipo\/\">Fitbit<\/a> put details of some users\u2019 sex lives on the internet.<\/p>\n<p>As quickly as we put new safeguards in place, unscrupulous hackers find a way to break through. So how safe is your digital data?<\/p>\n<h2>Samsung and Google Suffer the Wrath of Hackers<\/h2>\n<p>We\u2019ve recently seen two other serious data breaches.<\/p>\n<p>The first instance involves <strong>Samsung Electronics Ltd.<\/strong> (<a href=\"http:\/\/finance.yahoo.com\/q?s=SSNLF&amp;ql=0\" target=\"_blank\">SSNLF<\/a>), which revealed that hackers had infiltrated LoopPay, the backbone of the Samsung Pay mobile payment system.<\/p>\n<p>Samsung was quick to claim that specific customer data had <em>not<\/em> been stolen. But that wasn\u2019t really the point. If hackers can learn enough to identify vulnerabilities, they can get customers\u2019 data at the point of sale or some other way, instead of taking it directly from the network.<\/p>\n<p>More shocking was the fact that it took Samsung <em>five months<\/em> to even discover that its system had been invaded. So it\u2019s premature for the company to be so confident about what was and wasn\u2019t stolen.<\/p>\n<p>The second case involves <strong>Google Inc.\u2019s<\/strong> (<a href=\"http:\/\/finance.yahoo.com\/q?s=googl&amp;ql=1\" target=\"_blank\">GOOGL<\/a>) Android operating system. Earlier this year, the company created a patch to fix a software bug called Stagefright. The company thought that had solved the problem\u2026 but the issue recently resurfaced and is now spreading though music and video files rather than text messages.<\/p>\n<p>In addition, a new vulnerability has millions of Android users in Asia and Europe seeing tons more ads and even seeing hackers take over their entire phones. Android\u2019s problem is compounded by the fact that its fixes are slow to trickle out to users.<\/p>\n<p>So with all these breaches, how can you keep your online data safe?<\/p>\n<h2>We\u2019re Screwed, Right?<\/h2>\n<p>I\u2019m sorry to be the bearer of bad news, but the simple answer is that there\u2019s no failsafe way to keep your data from falling into the wrong hands (unless you go completely \u201coff the grid,\u201d of course).<\/p>\n<p>Heck, even the National Security Agency, one of the most secretive and security-conscious organizations on Earth and undoubtedly the world\u2019s leading encryption authority, can\u2019t keep its data safe. So what chance do the rest of us have?<\/p>\n<p>The only assurance is that the companies that hold our personal data spend billions of dollars per year to secure it \u2013 as they should. But the truth is, once your personal information is out there, it becomes vulnerable.<\/p>\n<p>Take the data breach at <strong>Target Corp.<\/strong> (<a href=\"http:\/\/finance.yahoo.com\/q?s=tgt&amp;ql=1\" target=\"_blank\">TGT<\/a>) in late 2014\u2026<\/p>\n<h2>A Sneak Attack Through the Air Conditioning System<\/h2>\n<p>Hackers basically sent an email \u201cphishing\u201d scam to Target\u2019s air conditioning supplier.<\/p>\n<p>Now, corporate firewalls and anti-virus programs block most phishing attacks, while most other attacks are ignored or deleted by recipients. But someone occasionally falls for the spoof. That\u2019s what happened here.<\/p>\n<p>The phishing message was designed to look legitimate, which gave the thieves enough information to log onto that company\u2019s network. As Target\u2019s air conditioning supplier, it had legitimate access to Target\u2019s network, in order to remotely manage the temperature at stores around the country, so the thieves were able to access Target\u2019s network.<\/p>\n<p>By itself, this didn\u2019t give them access to customers\u2019 banking information. They then had to figure out where to look for that data and exploit existing software weaknesses to get it.<br \/>\nSo they created a new user account with administrative privileges. Target had actually done a good job of encrypting customers\u2019 credit card details, but the thieves wrote software that collected it on the stores\u2019 terminals instead.<\/p>\n<p>There\u2019s no doubt that pulling off a heist like this requires intelligence and a lot of work. But it might shock you to learn that all the tools needed to accomplish it are actually freely available on the internet.<\/p>\n<p>It was worth the work, too. While nobody has revealed exactly how much money the hackers made, Target agreed to pay $67 million to <strong>Visa Inc.<\/strong> (<a href=\"http:\/\/finance.yahoo.com\/q?s=V&amp;ql=0\" target=\"_blank\">V<\/a>) and its affiliated banks to cover the damages.<\/p>\n<p>So that\u2019s the bad news. No matter what companies do, how much they spend, and what they promise, no data is 100% safe because so much information whizzes across the internet and so many companies are interconnected.<\/p>\n<p>What\u2019s the good news?<\/p>\n<h2>Assessing the Real Value of Information<\/h2>\n<p>The bottom line is that having your information online depends on what you\u2019re doing and what you get in return.<\/p>\n<p>In short, it\u2019s often worth the risk.<\/p>\n<p>Case in point: Of the 40 million credit cards that hackers stole from Target, no customers actually lost any money. Yes, some were inconvenienced, but Target, the credit card companies, and banks ate the financial losses.<\/p>\n<p>Ultimately, companies have much more to gain from credit cards and online transactions than to allow consumers to become fearful of using them.<\/p>\n<p>In other areas, too, information leaks aren\u2019t terribly damaging.<\/p>\n<p>Take health records, for example. Most people consider this information highly personal, but would it really be monumental if some of it got compromised? It\u2019s not like thieves are broadcasting the information to employers or family members. They\u2019re using it to gain access to drugs and scam insurers.<\/p>\n<p>Although the value of health information to thieves can be even higher than credit card numbers, the risk to consumers is small. And having your health information widely available to doctors and pharmacists can help you get higher-quality healthcare.<\/p>\n<p>If you do have \u00a0something that would be embarrassing if someone found out \u2013 such as having an affair or admitting that you\u2019re a New York Jets fan \u2013 you might want to be careful with what you share online.<\/p>\n<p>And whenever a company asks you for information, always ask what you get in return. If it\u2019s just going to send you an auto-generated birthday email, forget it. But if it\u2019s going to send a coupon or special offer, it might be worth the risk.<\/p>\n<p>Ultimately, just know that once you put information on the internet, or share it with people who\u2019ll store it digitally, it\u2019s vulnerable. It\u2019s surprising how many people forget this.<\/p>\n<p>To living and investing in the future,<\/p>\n<p>Greg Miller<\/p>\n<p>The post <a href=\"http:\/\/www.wallstreetdaily.com\/2015\/10\/15\/online-data-security\/\" rel=\"nofollow\">Can You Really Protect Your Online Data?<\/a> appeared first on <a href=\"http:\/\/www.wallstreetdaily.com\" rel=\"nofollow\">Wall Street Daily<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By WallStreetDaily.com By Greg Miller, Senior Technology Analyst In Tuesday evening\u2019s Democratic Primary Debate, the candidates were asked about the biggest threat facing America\u00a0 today. Naturally, Middle East volatility and the rise of ISIS were cited, in addition to nuclear weapons falling into the wrong hands. But it was somewhat surprising that only one candidate [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-79606","post","type-post","status-publish","format-standard","hentry","no-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/79606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/comments?post=79606"}],"version-history":[{"count":2,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/79606\/revisions"}],"predecessor-version":[{"id":79634,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/posts\/79606\/revisions\/79634"}],"wp:attachment":[{"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/media?parent=79606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/categories?post=79606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.investmacro.com\/forex\/wp-json\/wp\/v2\/tags?post=79606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}