Preview

Equifax's Search For Potential Identity Thieveses

Good Essays
Open Document
Open Document
537 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Equifax's Search For Potential Identity Thieveses
The Equifax hack was a hack that occurred in mid-May to July and affects 143 million Americans (and an undisclosed amount of British and Canadian citizens). The hack was a result of an exploit of a security vulnerability in a US website application (some individuals accused Equifax of sacrificing security for additional profit). From there the hackers, who have not yet been identified/named, were able to access customer files. These files included names, social security numbers, birth dates, and addresses. Additionally, some individuals’ driver’s license numbers, credit card numbers, dispute documents, and other documents were accessed. What makes this hack so notable are the amount of individuals affected by the hack, the information made available by the hack, and how Equifax handled the incident. As stated before, 143 million people were affected by this hack. With the US population sitting at 323.1 million, this hack affects over 44% of the population. Also, since this information is reported to companies like Equifax without the individual taking action themselves or even being informed of the information disclosure, many people may not even be aware that they were an Equifax customer nor what information they held. The information exposed in this hack is a treasure trove for potential identity thieves. It would …show more content…
Additionally, Equifax is subject to multiple lawsuits, investigations, and hearings and there has even been a chatbot released that allows for people to file a civil suit against Equifax without the need to pay for an attorney. Finally, Equifax suffered a massive drop in stock value From Sept. 7, 4:00 pm to Sept. 8, 9:30 am, their stock dropped from 142.720 to 117.825 (or a about 17.4% drop). Since then, it has fluctuated but overall has only decreased slightly from its value on Sept 8, 9:30

You May Also Find These Documents Helpful

  • Best Essays

    Countrywide Financial

    • 3004 Words
    • 13 Pages

    Countrywide Financial was a mortgage-banking firm. They had one of the largest market shares in the early 2000s, when the mortgage market was booming. “No company pursued growth in home loans more aggressively than Countrywide” (NY Times 12/10). They were the leader of their industry, with 500 billion in home loans, 62,000 employees, 900 offices, and $200 billion in assets. Everything had been going well for the company and its employees, until the mortgage crisis began to unfold at the end of 2006. In June 2009, the SEC filed a civil suit against the founder of the business and some of his top management for fraud and insider trading. This came at the height of the mortgage crisis in the US. The founder of Countrywide, Angelo Mozilo, finally agreed to pay $45million in profits and $22.5 million in civil penalties, in which he still admits no wrongdoing.…

    • 3004 Words
    • 13 Pages
    Best Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Facts: Ms. Deters, the plaintiff, sued Equifax, the defendant, in the United States District Court for the district of Kansas after being sexually harassed on several different occasions by three different co-workers and also the original male supervisor. Violating Title VII, prohibiting discrimination of employees based on race, color, religion, sex and national origin. Ms. Deters filed multiple complaints on the daily sexual harassment that had taken place at the office. Mr. Taylor indicated he would handle the sexual harassment, him being the highest managerial position in the office. Mr. Taylor was also designated by Equifax to enact its human resource policies. The courts entry of judgment in the favor of the employee denied the defendants motion on the issue of punitive damages. However, Equifax did not agree with the decision of the court and wanted a judgment as a mater of law de novo. Equifax litigates that the evidence was not in support of the punitive damages.…

    • 487 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Passwords and personal account data obtain by illegal parties could be used for malicious purposes…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Without certain acts being put into place someone could easily take the information from one person and pretend to be them in a different place, either on the internet or within the work place. Repercussions could mean the user loses their job or money because it would look like they would be doing things they shouldn’t be.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    According to SC Magazine “Researchers with SpiderLabs, the advanced security team with information security company Trustwave, discovered a treasure trove of nearly two million pilfered credentials from a variety of companies, including Facebook, Google, Yahoo, Twitter, LinkedIn and payroll service provider ADP.” I was able to verify this portion of the article when the information was provided from a known credible news source (CNN). The security breach made national news and was also provided on our local News4 as well.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Han and the Romans both had very passive views when it came to technology, both sharing the "good is good enough" mindset. This appears through people of high class wanting higher quality materials and laborers, the Han enjoying a superb invention but not outwardly seeking to improve it, as well as the Romans appreciated fantastic inventions without searching for ways to improve…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach led to over 145,000 records of personal information being stolen (Polstra, 2005). This was not by any type of hack into ChoicePoint’s systems but by an individual or a group of people who used previously stolen information to create fake businesses that would have a need to preform background checks on people. They used the fake businesses to apply for accounts with ChoicePoint. When ChoicePoint reviewed the application for membership they ran a check on the businesses and did not find any criminal activity on the owners of these fake companies since they were from stolen information and not the criminals themselves. Since no…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Provide answers to three of the following questions based on your readings and your personal experiences. Answers should be 100-to 150-words each.…

    • 497 Words
    • 2 Pages
    Good Essays
  • Good Essays

    2. There are many organizations that claim they will repair your credit for a fee. From your readings, should someone use a credit repair service? Why or why not? What are some actions these organizations can take that should be a red flag?…

    • 630 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The data breach resulted from Target’s failure to segregate systems handling payment card data from the rest of its network (Bertrand, 2014). The attackers gained access to the company’s network with a username and password stolen from Fazio Mechanical Services who provided refrigeration and HVAC systems for them. With just that information alone, the attackers were able to upload malware programs on Target’s Point of Sale (POS) systems.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    1. If you find errors on your credit report, what steps would you take to correct them?…

    • 584 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Data Breach Research Paper

    • 4412 Words
    • 18 Pages

    Romanosky, S., Telang, R., & Acquisti, A. (2010) “Do Data Breach Disclosure Laws Reduce Identity Theft?” The Heinz College: Carnegie Mellon University…

    • 4412 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays