This document contains information from Data Security Compliance Advisors on data breaches and identity theft. It provides examples of stolen credentials and how they can be used to build profiles of individuals. It also discusses common causes and vectors of attacks, such as employees and third-party vendors. Case studies on Target and Stratfor data breaches are presented to illustrate how stolen credentials obtained through phishing can lead to large-scale compromises of personal information.
Related topics: