Onward Technologies Blog

Hack of Capital One Exposes Information on 100,000 Customers

Hack of Capital One Exposes Information on 100,000 Customers

Capital One is one of the largest credit card issuers in the world. On July 29th 2019, Capital One made an announcement, confirming it is the victim of one of the largest data breaches in financial sector history, as a former software engineer for Amazon has been indicted on charges related to the hacking.

Here’s what we know:

Capital One has admitted that the personally identifiable information (PII) of over 100 million American and Canadian credit applicants’ information has been exposed. The company did admit that no credit card account numbers or authentication credentials were compromised in the hack. They also go on to mention that in 99 percent of the files, social security numbers were not compromised. The largest category of information that was accessed were individual and small business credit applications that span from 2005 to 2019.

The perpetrator, Paige Thompson of Seattle, Washington, was a former software developer for Amazon Web Services (AWS), which took advantage of a firewall misconfiguration to gain access to the information, AWS confirmed Monday. The flaw came as a result of a setup error and not a flaw within the massively popular AWS.

The breach happened on March 22 to 23, 2019. Thompson was apprehended as a result of being reported to Capital One for storing incriminating evidence on her Github and Slack accounts. Capital One contacted the FBI on July 19, 2019 and after a short investigation, Thompson was arrested and indicted by the Western District of Washington.

The CEO of Capital One, Richard Fairbank released the following statement:

“While I am grateful that the perpetrator has been caught, I am deeply sorry for what has happened. I sincerely apologize for the understandable worry this incident must be causing those affected and I am committed to making it right.”

For a full report of the event, visit: https://www.capitalone.com/facts2019/

Capital One has said that it will inform you if you have been a victim of this massive attack, but if like many of us, too much is at stake to wait for the company to reach out to you, you can take some immediate steps to safeguard your personal information.

  • Check your accounts - Account monitoring and fraud detection should be a major part of any action you take to secure personal information.
  • Change passwords - One great way to at least feel more secure after a major hack like this is to immediately change your passwords.
  • Freeze your credit report - One option you can take to protect yourself is to freeze your credit report, this won’t let any credit reporting services check your credit, meaning if someone were to try to take money out in your name that the banks wouldn’t be able to authorize credit.
  • Avoid scams - A big part of keeping any data secure is to not give unauthorized parties access to it. That means avoiding phishing attacks and other scams.
  • Continued vigilance - Vigilance over your account information, your personally identifiable information, and your overall financial health is more important than ever. As mentioned above, credit monitoring and fraud detection services give users tools to combat unauthorized access.

Keeping yourself and your business secure online is more difficult than ever. To learn more about data security, subscribe to our blog.

Tip of the Week: Simple Windows 10 Tips
Windows 7 and Windows Server 2008 R2 is Finally Lo...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 18, 2019

Captcha Image

Tag Cloud

Best Practices Security Technology Tip of the Week Microsoft Privacy Cloud Small Business Workplace Tips Server Hackers Internet Miscellaneous Productivity Network Innovation Network Security communications Saving Money Microsoft Office Hardware Software Computer Email Windows IT Support Hosted Solutions Passwords Wearable Technology Google VoIP Wireless Backup Collaboration IT Infrastructure Remote Monitoring eWaste Recovery Smartphones Gadgets SharePoint Productivity Telephone Systems Personal Information Running Cable Database Password Business Continuity Environment DDoS Financial History Staff Network Congestion User Error Business Computing Cabling Business Efficiency Distributed Denial of Service Mobile Device Chrome Data Windows Server 2008 R2 Education Cables Malware Virtualization Office Encryption App WiFi Windows 10 Telephone System Upgrade Mouse Apple Office 365 Holiday Managed IT Services Remote Computing 5G Help Desk Phishing Windows 7 Solid State Drive Bring Your Own Device Artificial Intelligence HIPAA NIST Scam Cybersecurity Digital Signage Outlook Remote Work Humor Wi-Fi Thought Leadership E-Commerce Social Media Vendor Management Skype Google Apps Private Cloud Content Recycling Managing Stress Disaster Recovery Troubleshooting Data Breach Social Engineering Security Cameras Procurement Unsupported Software Business Intelligence Customers Instant Messaging Authentication Augmented Reality Computer Accessories How To YouTube OLED Smart Office Save Money Administrator SaaS CrashOverride Operating System Automation Software as a Service Screen Mirroring Two-factor Authentication Downtime Mobility Tech Term Maintenance Regulation Gmail webinar Internet Exlporer Flash Online Shopping Files Users Charger Audit Streaming Media Mobile Device Management Investment Avoiding Downtime Human Resources Cryptocurrency Transportation Knowledge Google Search Frequently Asked Questions Identity Theft Government Apps Twitter Mobile Computing Fax Server Manufacturing Start Menu Workers PDF Audiobook Criminal Servers Browser Big Data IBM Hacker Software Tips Data recovery Hacking Outsourced IT Nanotechnology Retail Remote Worker Meetings Bluetooth Spam Blocking The Internet of Things Virtual Reality Document Management Budget Cloud Computing Lithium-ion battery Shortcuts Cast Multi-Factor Security Robot Legal Practices IT Services Information Settings Electronic Medical Records Conferencing Android Business Technology Redundancy Evernote Camera Risk Management Computer Care Computer Fan Entertainment Business Management Microchip ROI Root Cause Analysis Update Safety Techology Safe Mode Office Tips Benefits Uninterrupted Power Supply Proactive IT Excel Credit Cards Law Enforcement Battery Addiction Tools Infrastructure Information Technology Politics CES HVAC Mobile Devices Books Supercomputer Best Practice Botnet BYOD Millennials Physical Security Managed IT Services Smart Tech Wiring Worker Windows 10s NarrowBand Money Worker Commute Paperless Office Assessment Smartphone Social Virtual Machine Data Storage Trending Data storage Hosted Computing Quick Tips Managed Service Marketing Save Time Netflix Sports Analytics Sync Keyboard Cache IT solutions Printers Employer-Employee Relationship Samsung FENG Going Green Search Engine Spam Google Docs Cybercrime HaaS Data Protection Virtual Assistant Firewall IT Consultant Cleaning Net Neutrality Tip of the week Fraud iPhone Wireless Technology Word Password Manager Router Music Content Management Enterprise Content Management Emergency BDR Smartwatch Data Security Workforce Google Drive Search Connectivity Unified Threat Management Rootkit Public Cloud Wireless Charging End of Support Automobile Thank You Machine Learning User Tips Television Vendor Hypervisor IT Management Comparison Monitor Video Games Inventory Windows 10 MSP People Hiring/Firing VPN Biometric Security Communication Wireless Internet Warranty Value Laptop Bing Processor Data Backup Website Black Market IT Support Digital Signature Smart Technology Leadership Tech Support ISP Windows Server 2008 Amazon Computers Computing Infrastructure Chromecast Default App Managed IT Alert Blockchain Password Management Ransomware Patch Management Current Events Data Management Employee HBO Telecommuting Relocation How to Devices Networking GDPR Training Vulnerability Telephony Cortana Advertising Work/Life Balance Business Mangement Congratulations Company Culture USB Public Computer Notifications Display Saving Time IT Plan Specifications Reputation Scalability Access Control Shortcut File Sharing Mobile Office Employer Employee Relationship Wire Managed Service Provider Printer Loyalty OneNote Bandwidth Touchpad Hard Drive Data loss Voice over Internet Protocol Internet of Things Flexibility Accountants Compliance Facebook Two Factor Authentication Shadow IT Cryptomining Amazon Web Services Health Applications

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Super User What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date
16 September 2017
According to my view point for this content has been written very informative plus one more thing wh...

Blog Archive

January
February
April
June
August
September
October
November
December
January
February
March
June
July
September
October
November
December
February
March
April
May
June
August
September
December
January
February
March
April
May
June
July
September