If you like this presentation – show it...
Inside phone fraud The Home Depot Breach
How the home depot breach led to phone fraud
(In 5 Easy Steps)
Buy stolen data 1
CARD DATA FROM HOME DEPOT CUSTOMERS IS NOW FOR SALE ONLINE
SHOPPING LIST: ? CARD NUMBER ? FULL NAME ? STORE ADDRESS
USE THAT INFO TO FIND: ? LAST 4 DIGITS OF SS# ? DATE OF BIRTH ? CARD EXPIRATION DATE
Call the bank 2
(EXTRA CREDIT) SPOOF THE CUSTOMER’S PHONE NUMBER
Answer 3 out of 5 questions 3
MOST US BANKS LET CUSTOMERS MAKE ACCOUNT CHANGES IF THEY PASS 3 OF 5 SECURITY CHECKS
(TIME TO PULL OUT THAT DATA YOU BOUGHT)
Change the PIN Number 4
Go shopping 5
Learn MORE READ MORE ON THE PINDROP SECURITY BLOG DOWNLOAD THE STATE OF PHONE FRAUD REPORT BEST PRACTICES FOR HOW TO PREVENT PHONE FRAUD Incidents like the Home Depot breach demonstrate how intertwined phone and online fraud are for enterprises. Click here. Pindrop security reviewed phone fraud activity during the first six months of 2013 to understand the frequency of attacks and the methods and motives of fraudsters. Click here. This whitepaper explains the risks in phone call fraud and caller ID spoofing. It discusses the technologies available for Caller ID verification and device authentication. Click here.