Social Icons

Pages

Featured Posts

Sunday, 18 October 2015

Findings & Conclusion


           As illustrated in previous blog posts, the Ashley Madison data breach has had many consequences, and many victims. The consequences from the stolen data will last for years for many people. It sometimes takes years to clear up the mess that identity theft can have on people. I have been involved in a data breach, and I have had my data stolen during the data theft from the Sony PlayStation Network in 2011. Although my identity has not been used (yet), I had to put a credit freeze on my account for 10 years in case someone tries to use my identity to gain money in my name.

As we come to hear about the increasing number of companies that have had they cyber security breached and data has been stolen and released, we are becoming increasingly desensitized. The data breaches are only getting bigger and bigger, and they are effecting more and more people. The breaches are also effecting people from the many different segments of society; no one is immune. Data protection and the hackers that are trying to obtain the data are playing a cat and mouse game, in which the eventual losers will be us.

            It seems that people don’t care when they are not directly affected by identity theft and data theft. If it doesn’t affect you, why bother caring? Also, what can we do about it? As consumers, the only thing we can do it to use our voice, which is our spending money. If we boycott and refuse to use a company or a web service, that company will eventually listen to our demands and their profits drops. As consumers, we need to demand that more money is to be spend on cyber security, and that more needs to be done to protect our data, which should not be taken for granted.

The human impact


The data breach has many victims directly and indirectly, and the human toll is getting bigger and bigger. Dealing with infidelity is a traumatic experience in a relationship for both partners. But the magnitude of the traumatic experience is greatly intensified when couples are dealing with infidelity in the public.

            After the data leak, there have been many websites created in which you can search people by using their names, addresses, credit cards, and email addresses to gain information of their usage of Ashley Madison and their possible infidelity.

            In Toronto, there have been two possible suicides that have been directly linked to the Ashley Madison hack (2015, Tripwire). There could also be many more other suicides and deaths that have not been reported or directly linked, but that are due to the hack.

            The hack has also revealed famous and “high-profile” users to the public. This includes NFL-Stars, politicians, and TV and movie stars. Some of the people include Ashley Madison founder and CEO Noel Biderman; Dan Loed, a hedge fund founder and prolific donor to conservative causes; Hunter Biden, the younger son of Vice President Joe Biden; Ryan Heck, a Baton Rouge councilman who is running for state representative; Jionni LaValle, a reality star and husband to Jersey Shore’s Nicole “Snooki” Polizzi (2015, Slant News). Lastly, Josh Dugger is the most famous hypocrite to be ousted by the hack. He is the son of the evangelists Jim Bob and Michelle Dugger (19 Kids & Counting show on TLC), and was very outspoken on fidelity and family values.

            It doesn’t matter if you are a famous or “high-profile”, or just the average person down the block, your data should be kept secure. There are many different impacts in our society from shame, suicides, marriage breakdowns, deaths, and monetary loss.   

 

(2015, September 1). The Ashley Madison Hack – A Timeline [News Post]. Retrieved from http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-ashley-madison-hack-a-timeline/

(2015, September 30). 7 high profile people who got exposed by the Ashley Madison hack [News Post]. Retrieved from https://www.slantnews.com/story/2015-08-30-7-high-profile-people-who-got-exposed-by-the-ashley-madison-hack

 

Scammers & Extortionists


After all disasters, whether natural or man-made, there comes a wave of scammers and people that try to rip off the victims. This happens after tsunamis, floods, hurricanes, tornados, and even after data hacks. Scammers and extortionists have begun to target and attack the Ashley Madison users.  

First, scammers have already began to use the names, passwords, address, phone numbers, and credit card information from the users of the site. They have begun stealing and using the identification of the users to make money and purchase merchandise using their information.

Second, the scammers have begun to extort the victims of the data leak. It has been reported that many people have been extorted not to have their information released on the internet (2015, Silicon Angle). The users have been blackmailed for Bitcoins in order to keep their information and possible infidelity a secret (2015, Silicon Angle). Some users have paid the extortion, and other have reported it to their local police forces.

The data from the breach can be used to gather more information, and they can even gain access to their computers (2015, Tripwire). Once in their personal computers, hackers could gain more access to bank accounts and other passwords (2015, Tripwire). They can do a lot of damage to people with just a few pieces of information. Hackers can be very resourceful and they can do a lot of damage to people that thought their data was safe on the servers of companies. This is a false sense of security. Our data is very vulnerable from so many different sources and companies that we may have contact with.

 
(2015, September 6). Ashley Madison blackmail for Bitcoin scam reaping profits for extortionists [News Post]. Retrieved from http://siliconangle.com/blog/2015/09/06/ashley-madison-blackmail-for-bitcoin-scam-reaping-profits-for-extortionists/

(2015, September 1). The Ashley Madison Hack – A Timeline [News Post]. Retrieved from http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-ashley-madison-hack-a-timeline/

How do you really know your data is deleted and safe?


How do you know if your data is safe with the different companies around the world? How can you be certain that your credit card information and order history is safe some online stores such as Amazon and eBay? Would you pay a fee so that your data is deleted from the servers of companies once you log off their website? I would.

Well, this is exactly what many of the users of Ashley Madison did. The site has a feature called “Paid-Delete”. The feature works in that users would have all of their data deleted from the website’s servers for a fee of $19 per month. Ashley Madison claimed that they deleted the following (2015, ArsTechnica):

·       Removal of the profile from the site.
·       Removal of messages sent and received.
·       Removal of messages from recipient's mailboxes including Winks & Gifts.
·       Removal of site usage history and personally identifiable information from the site.
·       Removal of photos.

These users in particular thought that they were safe and guarded against data theft which was far from the truth. All of their data was included with the data leak. I’m not sure if the company lied and did not delete the data, of if the hackers were able to recover the deleted data. Either way, they was definitely not safe.

As a result of the data leak of the “Paid-Delete” customers, they have filed a $578 million class-action lawsuit against Ashley Madison (2015, Tripwire). They paid for a service that was not given to them, and their data was revealed to the world.

  

(2015, July 20). Paying $20 to delete your Ashley Madison profile was probably a bad idea [News Post]. Retrieved from http://arstechnica.com/business/2015/07/cheaters-hook-up-site-ashley-madison-makes-account-deletion-confusing/

(2015, September 1). The Ashley Madison Hack – A Timeline [News Post]. Retrieved from http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-ashley-madison-hack-a-timeline/

What the Ashley Madison Data Leak revealed?


The data that was stolen from Ashley Madison contained a lot of information from the 37 million users of the site, and it revealed a lot of information. The data was very large, 9.7 GB in size, and it contained the all the names, passwords, addresses, phone numbers, and credit card transactions of the site’s users (2015, Wikipedia).  The data was released in three data dumps on the web. The first two data dumps released the personal information of the Ashley Madison users. The third released the personal emails of the Ashley Madison founder and CEO Noel Biderman. Those emails revealed that Noel cheated on his wife and also attempted to hook up with three women on the site. As a result of the data leak and the personal email released, Noel resigned and stepped down as CEO.  

            The data also revealed a lot information besides the names, passwords, addresses, phone numbers, and credit card transactions. 15,000 accounts used the email address that ended in .mil or .gov, which indicates that they are a member of the US military or the US government agency (2015, National Post). About 273,320 email addresses were from .ca what is a Canadian domain, and 163 accounts were from the Canadian military (@forces.gc.ca) (2015, National Post). The data revealed that about 70,000 female account were fake, and they were not real women looking for affairs (2015, Wikipedia).  

As you can see that simple data can reveal a lot a different information about the users of companies. All the billion bites of data that companies around the world gather daily needs to be protected and cyber security needs to be held in high priority.   

 
(2015, August 19). Ashley Madison data leak: Who has been exposed and what are the implications? [News Post]. Retrieved from http://www.nationalpost.com/m/wp/blog.html?b=news.nationalpost.com//news/world/ashley-madison-data-leak-who-has-been-exposed-and-what-are-the-implications
(2015, October 14). Ashley Madison [Wikipedia Post]. Retrieved from https://en.wikipedia.org/wiki/Ashley_Madison

 

Saturday, 17 October 2015

Introduction


On Tuesday, August 16, 2015, the entire world would come to know the team of hackers that call themselves “The Impact Team”. The group of hackers were able to get by the security of the website “Ashly Madison” and stealing and releasing the data from all of their 37 million users. The data, 9.7 GB in size, contains the names, passwords, address, phone numbers, and credit card transactions of the site’s users (2015, Wikipedia).  If getting your personal information released to the pubic via the internet isn’t bad enough, the purpose of the website makes it a lot worse.

Ashley Madison is a Canadian based online dating service and social networking website aimed at people that are married or in a committed relationship that want to hook up in secrecy. The Ashley Madison slogan is “Life is shot. Have an affair.” which makes keeping your data a secrets the utmost importance to the users looking to cheat on their mates in secrecy. This data leak brings a lot of issues to the surface including data safety, anonymity, information technology issues, and social issues. 

The Ashley Madison data leak goes down on the long list of data leaks and cyber security breaches in history. The data leak is far from being the biggest leak. The biggest leak was from the “Massive American Business Hack” that happened in 2012, in which hackers stole over 160 million credit card and debit card numbers from American consumers (2013, NY Daily News). Data protection and hackers have become a cat and mouse game, in which the eventual losers will be us; the public that trust companies to keep our data safe.  

(2015, October 14). Ashley Madison [Wikipedia Post]. Retrieved from https://en.wikipedia.org/wiki/Ashley_Madison

(2013, July 16). Hackers hit companies like Nasdaq, 7-Eleven for $300 million, prosecutors say [News Post]. Retrieved from http://www.nydailynews.com/news/national/russians-ukrainian-charged-largest-hacking-spree-u-s-history-article-1.1408948
 

Translate

Total Pageviews

 
Blogger Templates