Puneet Varma (Editor)

Privacy piracy

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit

Privacy Piracy is a term used in relation to identity theft and/or protection of personal information. Identity theft can be done on a large scale by hacking a corporation to obtain customer credit card numbers and associated personal information. On a smaller scale, attackers would target individuals. Both of these approaches utilizes techniques such as malware or phishing.

Contents

Large Scale Data Breaches

In a larger data breach the data of millions of consumers can be stolen. In the recent Home Depot security breach 56 million payment cards and 53 million email addresses were stolen. There have been many cases like this. Some targets have been corporations, while others have been Governmental departments on a global scale. Banking institutions have also been affected. Frequently hackers target either debit or credit card information. Recently hackers have also been focusing on records that include personal information, especially records that contain Social Insurance Numbers, names, addresses and birth date, such as medical records. With this type of information it is very easy to steal an identity. Hackers who specialize in identity theft target large storehouses of personal data. After harvesting this information, they may sell it to others to turn a quick profit.

Malware

Malware, or malicious software, can be used to gain access to a computer or network and gain access to personal information needed for identity theft. Malware can also be used as a method to gain control of a computer, allowing a hacker access to the processing power of a larger network. On a larger network it also grants the ability to run an SQL injection on the databases within the network. An SQL injection is a series of commands that forces a database to surrender the data it contains. A malware attack was responsible for the Target data breach over the 2013 Thanksgiving weekend that resulted in 70 million customers information being stolen.

Phishing

This method of attack relies on falsified trusted websites or email that appears originate from a trusted source.These attacks are used to collect either login or account information. A traditional phishing attack is sent out to a wide range of recipients, as not all users will be caught in the net. Spear phishing is the name for a very sophisticated deception directed at users of closed networks. This type of complex phishing may provide access to the databases of large corporations, or Governmental Departments.

Other Applications

The phrase has also been used in several different ways and contexts, including:

  • A description of what corporations can legally do with your personal data while keeping within their privacy policies.
  • The name of a weekly show by Mari Frank on the Irvine, California college radio station KUCI.
  • The title of a booklet on identity theft by Mari Frank and Beth Givens.
  • A term used by advertising company Phorm to refer to pro-privacy campaigners.
  • References

    Privacy piracy Wikipedia