Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
privacy_risk_mitigation [2016/05/26 11:28]
wikiadmin [Fraud]
privacy_risk_mitigation [2016/05/29 00:20]
wikiadmin [Fraud]
Line 3: Line 3:
  
 In light of [[http://​www.rappler.com/​nation/​politics/​elections/​2016/​128716-comelec-data-leak-filipino-voters-risk-trend-micro|the recent breach at COMELEC involving personal information of 55-million Filipino voters]], we're compiling certain measures below that may help mitigate some privacy risks entailed by the incident. Since Filipino voters are generally young, it can take decades before much of the personal information from the breach becomes obsolete and useless to those who may commit fraud using the COMELEC data. Such data include (at least) fullnames, birthdates, birthplaces,​ addresses, voters'​ ID numbers, fingerprint hashes as well as (in some cases) passport numbers, tax identification numbers, fullnames of parents, email addresses, physical stats (height, weight). It appears to be, by far, the biggest online privacy breach in world history. In light of [[http://​www.rappler.com/​nation/​politics/​elections/​2016/​128716-comelec-data-leak-filipino-voters-risk-trend-micro|the recent breach at COMELEC involving personal information of 55-million Filipino voters]], we're compiling certain measures below that may help mitigate some privacy risks entailed by the incident. Since Filipino voters are generally young, it can take decades before much of the personal information from the breach becomes obsolete and useless to those who may commit fraud using the COMELEC data. Such data include (at least) fullnames, birthdates, birthplaces,​ addresses, voters'​ ID numbers, fingerprint hashes as well as (in some cases) passport numbers, tax identification numbers, fullnames of parents, email addresses, physical stats (height, weight). It appears to be, by far, the biggest online privacy breach in world history.
 +
 +----
  
 #Identity Theft #Identity Theft
Line 23: Line 25:
  
 #Fraud #Fraud
-  * Eyes on the card. When paying with the use of credit card, don't let it out of your sight where someone could copy (or take a picture of your credit card) details like expiry, CVV, and credit card number. ​  +  * //Eyes on the card.// When paying with the use of credit card, don't let it out of your sight where someone could copy (or take a picture of your credit card) details like expiry, CVV, and credit card number. ​  
-  * Challenge questions. In online banking, change your "​challenge questions"​ to items not involving information about your parents, birthplace, birthdate. +  * //Challenge questions.// In online banking ​and other financial services, change your "​challenge questions"​ to items not involving information about your parents, birthplace, birthdate. 
-  * Renew docs. Renew government-issued IDs, passports, licenses to help check possible compromised identity. +  * //Renew docs.// Renew government-issued IDs, passports, licenses to help check possible compromised identity. 
-  * Request history. If it happens you request for certain official documents like birth certificates,​ marriage certificate,​ try to inquire also about the history of such requests for your documents from concerned government agencies. See if previous requests were really made by you. +  * //Request history.// If it happens you request for certain official documents like birth certificates,​ marriage certificate,​ try to inquire also about the history of such requests for your documents from concerned government agencies. See if previous requests were really made by you. 
-  * Unexpected calls or visits. Be concerned about unexpected calls or visits from those posing as bank agents, insurance reps "​verifying"​ your personal details.  +  * //Unexpected calls or visits.// Be concerned about unexpected calls or visits from those posing as bank agents, insurance reps "​verifying"​ your personal details.  
-  * Passwords. Passwords that match or resemble data available on the stolen COMELEC database (birth date, names in the family, birthplace, and the like) must be changed. Enable [[https://​en.wikipedia.org/​wiki/​Two-factor_authentication|two-factor authentication]] (if available) for your online accounts.+  * //Passwords.// Passwords that match or resemble data available on the stolen COMELEC database (birth date, names in the family, birthplace, and the like) must be changed. Enable [[https://​en.wikipedia.org/​wiki/​Two-factor_authentication|two-factor authentication]] (if available) for your online accounts
 +  * //​Financials.//​ Using the information from the COMELEC hack, your accounts with financial services (insurance, brokerage, ​ funds, banks) could be vulnerable to [[|"​social engineering"​]] aiding financial fraud.