Preview

Equifax's Search For Potential Identity Thieveses

Good Essays
Open Document
Open Document
537 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Equifax's Search For Potential Identity Thieveses
The Equifax hack was a hack that occurred in mid-May to July and affects 143 million Americans (and an undisclosed amount of British and Canadian citizens). The hack was a result of an exploit of a security vulnerability in a US website application (some individuals accused Equifax of sacrificing security for additional profit). From there the hackers, who have not yet been identified/named, were able to access customer files. These files included names, social security numbers, birth dates, and addresses. Additionally, some individuals’ driver’s license numbers, credit card numbers, dispute documents, and other documents were accessed. What makes this hack so notable are the amount of individuals affected by the hack, the information made available by the hack, and how Equifax handled the incident. As stated before, 143 million people were affected by this hack. With the US population sitting at 323.1 million, this hack affects over 44% of the population. Also, since this information is reported to companies like Equifax without the individual taking action themselves or even being informed of the information disclosure, many people may not even be aware that they were an Equifax customer nor what information they held. The information exposed in this hack is a treasure trove for potential identity thieves. It would …show more content…
Additionally, Equifax is subject to multiple lawsuits, investigations, and hearings and there has even been a chatbot released that allows for people to file a civil suit against Equifax without the need to pay for an attorney. Finally, Equifax suffered a massive drop in stock value From Sept. 7, 4:00 pm to Sept. 8, 9:30 am, their stock dropped from 142.720 to 117.825 (or a about 17.4% drop). Since then, it has fluctuated but overall has only decreased slightly from its value on Sept 8, 9:30

You May Also Find These Documents Helpful

  • Good Essays

    Without certain acts being put into place someone could easily take the information from one person and pretend to be them in a different place, either on the internet or within the work place. Repercussions could mean the user loses their job or money because it would look like they would be doing things they shouldn’t be.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Countrywide Financial

    • 3004 Words
    • 13 Pages

    Countrywide Financial was a mortgage-banking firm. They had one of the largest market shares in the early 2000s, when the mortgage market was booming. “No company pursued growth in home loans more aggressively than Countrywide” (NY Times 12/10). They were the leader of their industry, with 500 billion in home loans, 62,000 employees, 900 offices, and $200 billion in assets. Everything had been going well for the company and its employees, until the mortgage crisis began to unfold at the end of 2006. In June 2009, the SEC filed a civil suit against the founder of the business and some of his top management for fraud and insider trading. This came at the height of the mortgage crisis in the US. The founder of Countrywide, Angelo Mozilo, finally agreed to pay $45million in profits and $22.5 million in civil penalties, in which he still admits no wrongdoing.…

    • 3004 Words
    • 13 Pages
    Best Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Facts: Ms. Deters, the plaintiff, sued Equifax, the defendant, in the United States District Court for the district of Kansas after being sexually harassed on several different occasions by three different co-workers and also the original male supervisor. Violating Title VII, prohibiting discrimination of employees based on race, color, religion, sex and national origin. Ms. Deters filed multiple complaints on the daily sexual harassment that had taken place at the office. Mr. Taylor indicated he would handle the sexual harassment, him being the highest managerial position in the office. Mr. Taylor was also designated by Equifax to enact its human resource policies. The courts entry of judgment in the favor of the employee denied the defendants motion on the issue of punitive damages. However, Equifax did not agree with the decision of the court and wanted a judgment as a mater of law de novo. Equifax litigates that the evidence was not in support of the punitive damages.…

    • 487 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Passwords and personal account data obtain by illegal parties could be used for malicious purposes…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    In 2016 one of the biggest financial scandals occurred with one of the major banks in the United States of America. Wells Fargo employees engaged in serious unethical behavior throughout the year of 2016. An uncountable amount of Wells Fargo employees created over two million fraudulent accounts for customers who had no idea. The customers did not know accounts were being opened nor authorized the openings of these accounts. Employees at the Community banking level of Wells Fargo felt pressured into adding more accounts for already existing members. The pressure for added accounts came from higher…

    • 97 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    According to SC Magazine “Researchers with SpiderLabs, the advanced security team with information security company Trustwave, discovered a treasure trove of nearly two million pilfered credentials from a variety of companies, including Facebook, Google, Yahoo, Twitter, LinkedIn and payroll service provider ADP.” I was able to verify this portion of the article when the information was provided from a known credible news source (CNN). The security breach made national news and was also provided on our local News4 as well.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach led to over 145,000 records of personal information being stolen (Polstra, 2005). This was not by any type of hack into ChoicePoint’s systems but by an individual or a group of people who used previously stolen information to create fake businesses that would have a need to preform background checks on people. They used the fake businesses to apply for accounts with ChoicePoint. When ChoicePoint reviewed the application for membership they ran a check on the businesses and did not find any criminal activity on the owners of these fake companies since they were from stolen information and not the criminals themselves. Since no…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Provide answers to three of the following questions based on your readings and your personal experiences. Answers should be 100-to 150-words each.…

    • 497 Words
    • 2 Pages
    Good Essays
  • Good Essays

    2. There are many organizations that claim they will repair your credit for a fee. From your readings, should someone use a credit repair service? Why or why not? What are some actions these organizations can take that should be a red flag?…

    • 630 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    1. If you find errors on your credit report, what steps would you take to correct them?…

    • 584 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Data Breach Research Paper

    • 4412 Words
    • 18 Pages

    Romanosky, S., Telang, R., & Acquisti, A. (2010) “Do Data Breach Disclosure Laws Reduce Identity Theft?” The Heinz College: Carnegie Mellon University…

    • 4412 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The data breach resulted from Target’s failure to segregate systems handling payment card data from the rest of its network (Bertrand, 2014). The attackers gained access to the company’s network with a username and password stolen from Fazio Mechanical Services who provided refrigeration and HVAC systems for them. With just that information alone, the attackers were able to upload malware programs on Target’s Point of Sale (POS) systems.…

    • 256 Words
    • 1 Page
    Satisfactory Essays