SlideShare a Scribd company logo
1 of 1
Download to read offline
APPLICATION
EXPLOITS
AUTHENTICATION
ACCESS/AUTHORIZATION 2%
2%
Nuspire crunched data for retailers
in its customer base over a 6 month
period and found that Tickets generat-
ed from Security Information Event
Management (SIEM) systems have
seen a huge increase in the amount of
maleware alerts over the last two
years.
This shows that hackers are attacking
retailers with different variants of
maleware in hopes that one will stick
and gain access to valuable data.
2014 saw a trend in most retail hacks
being maleware based.
Breach
Hacker steals
Credit Card Data
Gift Cards
Buyer purchases
Retailer Gift Cards
using stolen Credit
Online Auction
Buyer uses Gift Cards to
purchase items then sell
online through eBay or
other sites
Web Buyer
Purchases valid
credit card numbers
using Bit Coins
Deep Web
Distributor sells cards
online through Black
Market on “Deep Web”
Reshipped
Shipper takes original
delivery of item and
re-ships to online
auction buyer
Distributor
Hacker sells cards
in bulk to distributor
101011001010100100100101001010010010101
101010010001101001010010100100101010010
010011101011010011101010101001001000101
101000110101010010101001001010010010101
101011001010100100100101001010010010101
101010010001101001010010100100101010010
010011101011010011101010101001001000101
101000110101010010101001001010010010101
101011001010100100100101001010010010101
101010010001101001010010100100101010010
010011101011010011101010101001001000101
101000110101010010101001001010010010101
101011001010100100100101001010010010101
101010010001101001010010100100101010010
010011101011010011101010101001001000101
101000110101010010101001001010010010101
OF THE
y
e
a
r
2014
RETAIL
DATA BREACH
20 Oct. 2014
Staples
Breach Public
10 Oct. 2014
Kmart
Breach Public
02 Sep. 2014
Home Depot
Breach Public
14 Aug. 2014
Jewel - Osco
Breach Public
14 Aug. 2014
Supervalu
Breach Public
21 Jul. 2014
Goodwill
Breach Public
06 Jun. 2014
P.F. Chang
Breach Public
03 Mar. 2014
Sally Beauty
Breach Public
25 Jan. 2014
Michaels Stores
Breach Public
10 Jan. 2014
Neiman Marcus
Breach Public
05 Dec. 2014
bebe stores
Breach Public
Payment information for
56 million credit cards was
compromised in a security
breach at Home Depot
which took place between
April and September of
2014
Although official numbers
on the Sally Beauty breach
are still being investigated,
on March 2, a fresh batch
of 282,000 stolen credit
and debit cards went on
sale in a popular under-
ground crime store,
On Tuesday, June 10, the
U.S. Secret Service alerted
P.F. Chang's to a possible
security compromise in-
volving credit and debit
card data stolen from cer-
tain P.F. Chang's China
Bistro restaurants. 33
restaurants were involved
bebe says its investigation
suggests the attack was on
data from payment cards
swiped in stores between
Nov. 8 and Nov. 26. The
data may have included
cardholder names, ac-
count numbers, expiration
dates, and verification
1.5%
1.6%
4.7%
9.6%
2014 Percentage of Records Stolen*
Banking/Credit
Financial
Government/Military
Medical/Healthcare
Educational
Incidents of Business/Retail hacking
since 2007 has grown by
AFTER CREDIT DATA IS STOLEN
IT CAN BE LAUNDERED IN MANY
WAYS THROUGH BLACK MARKETS
ON THE
2014 BREACH CATEGORIES
IS YOUR DATA SAFE WHERE YOU SHOP?
DEEP WEB
11.7%
26.1%
13%
7.5%
14.3%
9.3%
Insider
Theft
Hacking
Data on
the Move
Accidental
Exposure
3rd Party
Contractor
Employee
Negligence
IF YOU NEED TO PROTECT GEOGRAPHICALLY
DISPERSED AND DISTRIBUTED NETWORKS
SUCH AS RETAIL, FRANCHISE AND BRANCH OFFICES
FROM TODAY’S THREAT LANDSCAPE, NUSPIRE CAN HELP

More Related Content

What's hot

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 

What's hot (20)

Biggest Data Breaches of 2016
Biggest Data Breaches of 2016Biggest Data Breaches of 2016
Biggest Data Breaches of 2016
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Phishing
PhishingPhishing
Phishing
 
Cybercrime issue
Cybercrime issueCybercrime issue
Cybercrime issue
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Hacking phishing
Hacking phishingHacking phishing
Hacking phishing
 
Internet scams
Internet scamsInternet scams
Internet scams
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
 
Cybersecurity presentation
Cybersecurity presentationCybersecurity presentation
Cybersecurity presentation
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber Criminals
 

Viewers also liked

Dell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting PresentationDell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting Presentation
Erwin Carrow
 

Viewers also liked (8)

Dell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting PresentationDell SecureWorks Sale Meeting Presentation
Dell SecureWorks Sale Meeting Presentation
 
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
Security Technology Vision 2016
Security Technology Vision 2016Security Technology Vision 2016
Security Technology Vision 2016
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 

Similar to Year of the Data Breach 2014

Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
mherr_riskconsult
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 
Interested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxInterested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docx
vrickens
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
Christopher Uriarte
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
Justin Saunders
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 

Similar to Year of the Data Breach 2014 (20)

Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft Presentation
 
Chronology of Data Breaches
Chronology of Data BreachesChronology of Data Breaches
Chronology of Data Breaches
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 
8 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 20158 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 2015
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Interested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docxInterested in learning moreabout cyber security training.docx
Interested in learning moreabout cyber security training.docx
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
 
Id theft-phishing-research
Id theft-phishing-researchId theft-phishing-research
Id theft-phishing-research
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16Identity Theft-How to Reduce Your Risk-03-16
Identity Theft-How to Reduce Your Risk-03-16
 
Senior Audience Presentation
Senior Audience PresentationSenior Audience Presentation
Senior Audience Presentation
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Year of the Data Breach 2014

  • 1. APPLICATION EXPLOITS AUTHENTICATION ACCESS/AUTHORIZATION 2% 2% Nuspire crunched data for retailers in its customer base over a 6 month period and found that Tickets generat- ed from Security Information Event Management (SIEM) systems have seen a huge increase in the amount of maleware alerts over the last two years. This shows that hackers are attacking retailers with different variants of maleware in hopes that one will stick and gain access to valuable data. 2014 saw a trend in most retail hacks being maleware based. Breach Hacker steals Credit Card Data Gift Cards Buyer purchases Retailer Gift Cards using stolen Credit Online Auction Buyer uses Gift Cards to purchase items then sell online through eBay or other sites Web Buyer Purchases valid credit card numbers using Bit Coins Deep Web Distributor sells cards online through Black Market on “Deep Web” Reshipped Shipper takes original delivery of item and re-ships to online auction buyer Distributor Hacker sells cards in bulk to distributor 101011001010100100100101001010010010101 101010010001101001010010100100101010010 010011101011010011101010101001001000101 101000110101010010101001001010010010101 101011001010100100100101001010010010101 101010010001101001010010100100101010010 010011101011010011101010101001001000101 101000110101010010101001001010010010101 101011001010100100100101001010010010101 101010010001101001010010100100101010010 010011101011010011101010101001001000101 101000110101010010101001001010010010101 101011001010100100100101001010010010101 101010010001101001010010100100101010010 010011101011010011101010101001001000101 101000110101010010101001001010010010101 OF THE y e a r 2014 RETAIL DATA BREACH 20 Oct. 2014 Staples Breach Public 10 Oct. 2014 Kmart Breach Public 02 Sep. 2014 Home Depot Breach Public 14 Aug. 2014 Jewel - Osco Breach Public 14 Aug. 2014 Supervalu Breach Public 21 Jul. 2014 Goodwill Breach Public 06 Jun. 2014 P.F. Chang Breach Public 03 Mar. 2014 Sally Beauty Breach Public 25 Jan. 2014 Michaels Stores Breach Public 10 Jan. 2014 Neiman Marcus Breach Public 05 Dec. 2014 bebe stores Breach Public Payment information for 56 million credit cards was compromised in a security breach at Home Depot which took place between April and September of 2014 Although official numbers on the Sally Beauty breach are still being investigated, on March 2, a fresh batch of 282,000 stolen credit and debit cards went on sale in a popular under- ground crime store, On Tuesday, June 10, the U.S. Secret Service alerted P.F. Chang's to a possible security compromise in- volving credit and debit card data stolen from cer- tain P.F. Chang's China Bistro restaurants. 33 restaurants were involved bebe says its investigation suggests the attack was on data from payment cards swiped in stores between Nov. 8 and Nov. 26. The data may have included cardholder names, ac- count numbers, expiration dates, and verification 1.5% 1.6% 4.7% 9.6% 2014 Percentage of Records Stolen* Banking/Credit Financial Government/Military Medical/Healthcare Educational Incidents of Business/Retail hacking since 2007 has grown by AFTER CREDIT DATA IS STOLEN IT CAN BE LAUNDERED IN MANY WAYS THROUGH BLACK MARKETS ON THE 2014 BREACH CATEGORIES IS YOUR DATA SAFE WHERE YOU SHOP? DEEP WEB 11.7% 26.1% 13% 7.5% 14.3% 9.3% Insider Theft Hacking Data on the Move Accidental Exposure 3rd Party Contractor Employee Negligence IF YOU NEED TO PROTECT GEOGRAPHICALLY DISPERSED AND DISTRIBUTED NETWORKS SUCH AS RETAIL, FRANCHISE AND BRANCH OFFICES FROM TODAY’S THREAT LANDSCAPE, NUSPIRE CAN HELP