{"id":73846,"date":"2015-02-17T20:44:14","date_gmt":"2015-02-18T01:44:14","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-10-16T15:53:48","modified_gmt":"2022-10-16T19:53:48","slug":"scary-pii-numbers","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/scary-pii-numbers\/","title":{"rendered":"Scary PII Numbers"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20161113045313\/http:\/\/www.electronicproducts.com:80\/Computer_Peripherals\/Communication_Peripherals\/3_simple_ways_to_see_if_someone_is_stealing_your_Wi_Fi.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-106453 size-medium\" title=\"Scary PII Numbers\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-crime-1-e1569705385219-150x100.jpg?resize=150%2C100&#038;ssl=1\" alt=\"Scary PII Numbers\" width=\"150\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-crime-1-e1569705385219.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-crime-1-e1569705385219.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cyber-crime-1-e1569705385219.jpg?w=598&amp;ssl=1 598w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>As you may have heard by now, the second-largest health insurer <strong><a title=\"Insurance giant Anthem hit by massive data breach\" href=\"http:\/\/money.cnn.com\/2015\/02\/04\/technology\/anthem-insurance-hack-data-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Anthem<\/a><\/strong> gave away at least <strong>80 million of their customers&#8217; PII records<\/strong> to hackers. I say at least because these always grow as the experts dig through the wreckage. The <em><a title=\"Wall Street Journal\" href=\"https:\/\/www.wsj.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">WSJ<\/a><\/em> <a title=\"Health Insurer Anthem Didn\u2019t Encrypt Data in Theft\" href=\"https:\/\/web.archive.org\/web\/20221201095741\/https:\/\/www.wsj.com\/articles\/investigators-eye-china-in-anthem-hack-1423167560\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> the <a title=\"Indianapolis\" href=\"http:\/\/maps.google.com\/maps?ll=39.7666666667,-86.15&amp;spn=0.1,0.1&amp;q=39.7666666667,-86.15 (Indianapolis)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">Indianapolis<\/a>-based insured <strong>did not encrypt this data<\/strong> (<em>I covered encryption <a title=\"Spies Say Encryption Best to Protect Data\" href=\"http:\/\/wp.me\/p2wgaW-jrd\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> and <a title=\"A History of Encryption\" href=\"http:\/\/wp.me\/p2wgaW-eRl\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a><\/em>). That means customers&#8217; social <strong>security numbers, phone numbers, and other PII<\/strong> were easy targets for <strong>Chinese hackers<\/strong> <a title=\"Officials see China link in Anthem hack\" href=\"http:\/\/www.cnbc.com\/id\/102402001\" target=\"_blank\" rel=\"noopener noreferrer\">according<\/a> to <em><a title=\"CNBC\" href=\"http:\/\/www.cnbc.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CNBC<\/a><\/em>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20170520231223\/http:\/\/www.spencerfane.com:80\/Data-Security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-106456 size-medium\" title=\"did not encrypt data\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach-lock.jpg?resize=150%2C100&#038;ssl=1\" alt=\"did not encrypt data\" width=\"150\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach-lock.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach-lock.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data-breach-lock.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p>Anthem is just the latest. There are even<strong> larger targets<\/strong> out there. <em><a href=\"http:\/\/www.businessinsider.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Business Insider<\/a><\/em> <a href=\"http:\/\/www.businessinsider.com\/chart-of-the-day-apple-has-nearly-a-billion-payment-cards-on-file-2014-11\" target=\"_blank\" rel=\"noopener noreferrer\">published<\/a> some pretty scary numbers. <em>BI<\/em> reports that somehow the biggest tech companies have done a great job at convincing people that their services for sending\/receiving payments and purchasing goods are trustworthy and worthwhile. The article estimates that <strong>Apple<\/strong> has somewhere around a <strong>billion <a title=\"ITunes\" href=\"http:\/\/www.apple.com\/itunes\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">iTunes<\/a> accounts<\/strong> (with plenty of PII and credit cards) on file.<\/p>\n<p>This chart from <em>BI Intelligence<\/em>,\u00a0<a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a><span class=\"Apple-converted-space\">\u00a0<\/span>(<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) is nearing a billion iTunes accounts on file, and that number is likely to surge immensely. Customers in <a title=\"China\" href=\"http:\/\/maps.google.com\/maps?ll=39.9166666667,116.383333333&amp;spn=10.0,10.0&amp;q=39.9166666667,116.383333333 (China)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">China<\/a> can now<strong> link their <a title=\"China UnionPay\" href=\"http:\/\/en.wikipedia.org\/wiki\/China_UnionPay\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">UnionPay<\/a> payment cards to their Apple IDs:<\/strong> For context, UnionPay is the largest card network in the world with more cards in circulation than <a title=\"Visa Card\" href=\"http:\/\/usa.visa.com\/about-visa\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Visa<\/a> and <a title=\"MasterCard\" href=\"http:\/\/www.mastercard.com\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">MasterCard<\/a> combined.<\/p>\n<p><a title=\"Amazon\" href=\"http:\/\/www.amazon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon<\/a><span class=\"Apple-converted-space\">\u00a0<\/span>(<a title=\"NASDAQ : AMZN\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AMZN\/\" target=\"_blank\" rel=\"noopener noreferrer\">AMZN<\/a>)\u00a0has approx. <strong>300 million payment<\/strong> <strong>cards<\/strong> on file while PayPal has around <strong>200 million payment cards<\/strong> on record.<\/p>\n<p><a href=\"http:\/\/www.businessinsider.com\/chart-of-the-day-apple-has-nearly-a-billion-payment-cards-on-file-2014-11\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-106459 aligncenter\" title=\"Apple, Amazon, PayPal Payment Cards on File - Business Insider\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cards_on_file_global_bi.jpg?resize=400%2C300&#038;ssl=1\" alt=\"Apple, Amazon, PayPal Payment Cards on File - Business Insider\" width=\"400\" height=\"300\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cards_on_file_global_bi.jpg?resize=1024%2C768&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cards_on_file_global_bi.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cards_on_file_global_bi.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cards_on_file_global_bi.jpg?resize=768%2C576&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cards_on_file_global_bi.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cards_on_file_global_bi.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>A second <em>BI<\/em> <a title=\"ber Has More Than 12 Million Payment Cards On File\" href=\"http:\/\/www.businessinsider.com\/chart-of-the-day-uber-has-more-than-12-million-payment-cards-on-file-2014-11\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a> indicates that based on <a title=\"Leaked: Uber&#039;s Internal Revenue and Ride Request Numbers\" href=\"https:\/\/web.archive.org\/web\/20220901033253\/https:\/\/valleywag.gawker.com\/leaked-ubers-internal-revenue-and-ride-request-number-1475924182\" target=\"_blank\" rel=\"noopener noreferrer\">leaked <strong>Uber<\/strong> data<\/a> charted analyzed by <a title=\"BI Intelligence\" href=\"https:\/\/intelligence.businessinsider.com\/there-is-a-huge-opportunity-for-car-hailing-services-to-offer-mobile-wallets-2014-3\" target=\"_blank\" rel=\"noopener noreferrer\">BI Intelligence<\/a>, the ride-sharing firm has well over <strong>12 million payment cards<\/strong> on file. Their closest competitor <a title=\"Hailo\" href=\"https:\/\/web.archive.org\/web\/20131118202522\/https:\/\/www.hailocab.com\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Hailo<\/a> has 4.4 million payment cards on file.<\/p>\n<p><a href=\"http:\/\/www.businessinsider.com\/chart-of-the-day-uber-has-more-than-12-million-payment-cards-on-file-2014-11\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-106462 aligncenter\" title=\"Ride-Sharing Payment Cards on File - Business Insider\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bii-sai-cotd-car-hailing-payments-1.png?resize=400%2C300&#038;ssl=1\" alt=\"Ride-Sharing Payment Cards on File - Business Insider\" width=\"400\" height=\"300\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bii-sai-cotd-car-hailing-payments-1.png?resize=1024%2C768&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bii-sai-cotd-car-hailing-payments-1.png?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bii-sai-cotd-car-hailing-payments-1.png?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bii-sai-cotd-car-hailing-payments-1.png?resize=768%2C576&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bii-sai-cotd-car-hailing-payments-1.png?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bii-sai-cotd-car-hailing-payments-1.png?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>You have been warned. The <strong>next mega data breach<\/strong> could come from a tech firm like <strong>Apple or Amazon.<\/strong><\/em><\/p>\n<p><em><a href=\"https:\/\/web.archive.org\/web\/20130122113712\/http:\/\/www.cxotoday.com\/story\/data-breaches-continue-to-haunt-enterprises\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-106465 alignright\" title=\"Data theft\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach_firewall-1.jpg?resize=122%2C91&#038;ssl=1\" alt=\"Data theft\" width=\"122\" height=\"91\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach_firewall-1.jpg?resize=150%2C112&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach_firewall-1.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/data_breach_firewall-1.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 122px) 100vw, 122px\" \/><\/a>The WSJ article argues that companies can use many techniques to secure their data, but those things slow companies down, sometimes to a degree they find unacceptable. <\/em><\/p>\n<p><em>I think most victims of identity theft or credit fraud find that unacceptable.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.technewsworld.com\/story\/81706.html?rss=1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Why Tim Cook Would Build an Apple Car<\/a> (technewsworld.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The next mega data breach could come from a tech firm like Apple or Amazon. Apple and Amazon have lots of PII on file to attract attackers<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,420,392,1023,2363,101,35,2442,125,1135,304,951,4,2287,2373],"class_list":["post-73846","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-aapl","tag-amazon","tag-amzn","tag-anthem","tag-apple","tag-china","tag-credit-card","tag-data-breach","tag-ios","tag-iphone","tag-pii","tag-security","tag-uber","tag-unionpay"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=73846"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73846\/revisions"}],"predecessor-version":[{"id":129832,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73846\/revisions\/129832"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=73846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=73846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=73846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}