Welcome to our fully functional beta site. We welcome all comments
informed!
The Informatica blog - Authored by Claudiu Popa

In the Business of Cyberfraud, it Pays to be Professional

Ever wonder what the use of stealing millions of email addresses is? All those often downplayed, 'low sensitivity' data breaches have massive potential to create enough uncertainty for people to eventually call a 1-800 number, even it it means speaking to a passive-aggressive tech support professional.

Expect scenarios like this to exploit the trust humans have for well known brands around the world. One billion emails are currently available for sale or rent (increasingly probably including yours) in neat, manageable batches. At $400 per instance, that can quickly add up to a tidy profit. One that will pay for hordes of hungry 'tech support professionals', and the streamlined business processes to make it all come together.
 
It is easy to buy into the mentality that someone out there is looking to make a quick buck off unsuspecting seniors; it's harder to resist the media derision and begin to think of organized cybercrime as a massive force. As you watch the above clip, keep in mind that someone has been thinking big and acting on those ambitions. That someone, or group of people:
 
- bought lists containing millions of fresh email addresses
- paid for tens of thousands of hijacked web servers
- cloned the look of thousands of legitimate, branded pages
- staffed call centres with hundreds of trained, multi-lingual operators
- distributed spam operation across dozens of countries
 
These business operations are now funneling every morsel of data collected from each interaction into carefully orchestrated activities that include malware infections, text message scams, extortion, hijacking, mail fraud, etc. The combinatorial growth potential of these threats is practically infinite.
 
So next time you feel the urge to dismiss them as two-bit fraudsters, think instead of savvy investors who are at this very moment turning that opportunity to make a quick buck into a massively scalable, global crime worth trillions.

In the early 1920s, the Enigma machine was a portable encryption machine with rotor scramblers used for encoding and decoding confidential messages....
Bleeding hearts unite, the OpenSSL Heartbleed bug threatens to impact user privacy and business security online. There's a new security vulnerability in town. It's not even that new, we just didn't know about it until now. But it's a whopper and it threatens to i...
Independent risk assessments are the most basic best practice in business.Security is about risk. And risk is about numbers. Given the high probability of suffering data security and privacy breaches, is it any wonder compan...
Netflix just the latest brand used in wave of phone text support fraudEver wonder what the use of stealing millions of email addresses is? All those often downplayed, 'low sensitivity' data breaches have massive potent...
Layered SecurityI'm often surprised at the public's disappointment with the realization that security processes are not directly analogous to the medical notion of im...
Target breach will have serious consequencesThis past Christmas season hasn't been kind to the Target chain of retail stores nor to its brand. A brazen attack took place in December that affecte...

Welcome to Informatica

Be Secure.

Be Trusted.

Follow us on