Equifax will give your salary history to anyone with your SSN and date of birth

Equifax division TALX has a product called The Work Number , where prospective employers can verify job applicants’ work history and previous salaries (it’s also used by mortgage lenders and others): you can create an account on this system in anyone’s name, provided you have their date of birth and Social Security Number. The former is a matter of public record, the latter is often available thanks to the many breaches that have dumped millions of SSNs (the latest being Equifax’s catastrophic breach of 145,000,000 Americans’ data). (more…)

More:
Equifax will give your salary history to anyone with your SSN and date of birth

Equifax waited 5 weeks to admit it had doxed 44% of America, did nothing to help us while its execs sold stock

From mid-May to July 2017, Equifax exposed the financial and personal identifying information of 143 million Americans — 44% of the country — to hackers, who made off with credit-card details, Social Security Numbers, sensitive credit history data, driver’s license numbers, birth dates, addresses, and then, in the five weeks between discovering the breach and disclosing it, the company allowed its top execs to sell millions of dollars’ worth of stock in the company , while preparing a risibly defective and ineffective website that provides no useful information to the people whom Equifax has put in grave financial and personal danger through their recklessness. (more…)

Read More:
Equifax waited 5 weeks to admit it had doxed 44% of America, did nothing to help us while its execs sold stock

Email scheme stole $100 million from two US tech companies

It’s tempting to assume that technology workers are intelligent enough to avoid email fraud , but that’s not always the case. Both the FBI and the state of New York have charged a Lithuanian man, Evaldas Rimasauskas, with perpetrating a phishing campaign that siphoned $100 million away from two US tech companies companies. They’re both choosing to remain unnamed, although one is a “multinational online social media company” — you can probably whip up a short list of candidates based on that description. The scheme wasn’t particularly complicated, either, and mostly relied on less-than-attentive employees. Between 2013 and 2015 (possibly earlier), Rimasauskas allegedly ran a fake company in Latvia that had the same name as an “Asian-based computer hardware manufacturer.” He used this bogus firm to fool victims into responding to phishing emails, getting them to wire millions of dollars to his bank accounts in Latvia and Cyprus. The fraudster quickly spread the money to accounts elsewhere in the world (including Lithuania, Hong Kong, Hungary and Slovakia), and even sent forged documents to the banks to convince them that the large sums of money were legitimate. If the charges (which include wire fraud, identity theft and money laundering) hold up, Rimasaukas faces stiff punishment. He’s looking at a minimum of 2 years in prison if he’s found guilty of identity theft, and each of the remaining charges could get him up to 20 years behind bars. However, it’s also safe to say that his targets are learning a hard lesson, too. Even the most tech-savvy companies can fall prey to online fraud, and they may need to step up their security measures (including staff education) to prevent similar incidents. Source: Department of Justice

Original post:
Email scheme stole $100 million from two US tech companies

How alleged crooks used ATM skimmers to compromise thousands of accounts

Federal authorities have charged two men suspected of running an international operation that used electronic devices planted at automatic teller machine locations to compromise more than 6,000 bank accounts. The operation—which targeted Capital One, J. P. Morgan Chase, and other banks—netted, or attempted to net, about $3 million according to an indictment filed in Manhattan federal court. It allegedly worked by obtaining payment card readers from Hungary and other countries and installing them on top of card readers already located on ATMs and doors to ATM vestibules. The fraudulent readers were equipped with hardware that recorded the information encoded onto a card’s magnetic stripe each time it was inserted. A hidden pinhole camera with a view of the ATM keypad then captured the corresponding personal identification number. Antonio Gabor and Simion Tudor Pintillie allegedly led a gang of at least nine other people who regularly planted the skimming devices in the Manhattan, Chicago, and Milwaukee metropolitan areas, prosecutors said. They would later revisit the ATM to retrieve the information stored on the skimming devices and cameras. Gang members would then encode the stolen data onto blank payment cards and use the corresponding PINs to make fraudulent purchases or withdrawals. Read 3 remaining paragraphs | Comments

Taken from:
How alleged crooks used ATM skimmers to compromise thousands of accounts