{"id":4659,"date":"2012-12-19T15:57:00","date_gmt":"2012-12-19T15:57:00","guid":{"rendered":"https:\/\/leap.staging.ribbitt.com\/evs\/authentication-would-have-reduced-loss-of-facebook-scheme\/"},"modified":"2012-12-19T15:57:00","modified_gmt":"2012-12-19T15:57:00","slug":"authentication-would-have-reduced-loss-of-facebook-scheme","status":"publish","type":"post","link":"https:\/\/leap.staging.ribbitt.com\/evs\/insights\/authentication-would-have-reduced-loss-of-facebook-scheme\/","title":{"rendered":"Authentication Would Have Reduced Loss of Facebook Scheme"},"content":{"rendered":"<p><!--StartFragment--><\/p>\n<p>While 10 individuals have been placed behind bars for the&#13;<br \/>\nrecent <a href=\"http:\/\/www.bankinfosecurity.com\/850-million-scheme-exploited-facebook-a-5360\/p-1\">Facebook&#13;<br \/>\nphishing scheme<\/a>, more than 11 million computers have been left compromised&#13;<br \/>\nand over $850 million has been stolen.<span><\/span>The arrests certainly bring partial justice to this major cyber crime,&#13;<br \/>\nbut more than handcuffs are needed to help combat attacks of this nature.&#13;<br \/>\nExperts in both the security and banking industries agree that stronger&#13;<br \/>\nauthentication is needed to help prevent these types of crime.<\/p>\n<p>The scam all started in the place where people share the&#13;<br \/>\nmost about themselves, Facebook. The fraudsters accessed information by sending&#13;<br \/>\nout fraudulent friend requests and then sent phishing emails to the accepting&#13;<br \/>\nusers Facebook friends. The scam resulted in a loss of over $850 million&#13;<br \/>\nbefore the individuals were arrested. As online security expert, Neil&#13;<br \/>\nSchwartzman, suggests, banking institutions needs to focus on stronger&#13;<br \/>\nauthentication measures to prevent cybercrime. Both Schwartzman and Jevans&#13;<br \/>\nstate that stronger authentication would have prevented some of the losses of&#13;<br \/>\nthis attack. While other experts go on to recommend two-factor authentication,&#13;<br \/>\na recent breach has proved that cyber thieves have found ways around <a href=\"https:\/\/www.electronicverificationsystems.com\/Resources\/Blog\/New-Trojan-Trumps-Two-Factor-Authentication.aspx\">two-factor&#13;<br \/>\nauthentication<\/a> as well. This is not to say that this method is not&#13;<br \/>\neffective, but companies should know there are other options as well.<\/p>\n<p><a href=\"https:\/\/www.electronicverificationsystems.com\/products\/knowledge-based-authentication.aspx\">Knowledge-based&#13;<br \/>\nauthentication<\/a> offers a layer of authentication that standard measures do&#13;<br \/>\nnot. By developing answers to security questions that look and feel like the&#13;<br \/>\ncorrect answer, these options will throw off any identity thief regardless of&#13;<br \/>\nhow much personal information they have. These questions are created in a way&#13;<br \/>\nthat only the true identity holder can answer them. Businesses need to be well&#13;<br \/>\neducated on their <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/\">online security&#13;<br \/>\noptions<\/a> before investing in one. As the world continues to moves online,&#13;<br \/>\nbusiness must devote time and money into protecting their business and end&#13;<br \/>\nusers. Identity authentication will no longer be an option soon, but a&#13;<br \/>\nnecessity and companies will need to choose the option that is best for their&#13;<br \/>\nname and consumers.<\/p>\n<\/p>\n<p>[Contributed by EVS Marketing]<\/p>\n<p><!--EndFragment--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While 10 individuals have been placed behind bars for the recent Facebook phishing scheme, more than 11 millions computers have been left compromised and over $850 million has been stolen.The arrests certainly bring partial justice to this major cyber crime,<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[38],"tags":[],"class_list":["post-4659","post","type-post","status-publish","format-standard","hentry","category-internet-fraud"],"acf":[],"_links":{"self":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/comments?post=4659"}],"version-history":[{"count":0,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4659\/revisions"}],"wp:attachment":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media?parent=4659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/categories?post=4659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/tags?post=4659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}