SlideShare una empresa de Scribd logo
1 de 9
How You’re
 LinkedIn to
Identity Theft
The Risk
Users of social networking sites likely have heard about
the risks of oversharing personal information, particularly
on Facebook.
But according to a new report, LinkedIn users are the
most vulnerable.
The 2012 Identity Fraud Report from Javelin Strategy &
Research found that LinkedIn users are more likely to be
targeted for identity theft than people who use:




                    © 2003-2011 Identity Theft 911, LLC. All Rights
March 16, 2012                Reserved - Confidential
                                                                      2
LinkedIn vs. Facebook
Users of the
professional
networking site
experienced a 10
percent incidence                                                       LinkedIn and
                                                                        Google+ Users
rate of fraud,                                                          Have a Higher
                                                                        Incidence of
compared with 7                                                         Fraud

percent for Google+
users and 5.7
percent for
Facebook users,
according to the
Javelin report.
                      © 2003-2011 Identity Theft 911, LLC. All Rights
March 16, 2012                  Reserved - Confidential
                                                                                        3
3 Reasons Why
Users of LinkedIn are more at risk because:
• LinkedIn is a professional networking site,
  not a social networking site, that attracts
  users with higher incomes.
      – Many LinkedIn users have a household
        income above $100,000.
• Profiles are meant to be viewed by people
  the users don’t know.
      – Profiles feature résumés loaded personal
        information.
            • Fraudsters can leverage this data to create
              convincing emails that get users to divulge bank
              or credit account numbers and other personal
              information.
• Users may be more lax with their privacy
  settings.

                              © 2003-2011 Identity Theft 911, LLC. All Rights
March 16, 2012                          Reserved - Confidential
                                                                                4
What to Look For
Signs you’ve been targeted for fraud:
• Invitations to connect that appear
  legitimate
• Fraudulent email notifications that you
  have “messages” in your LinkedIn Inbox
• Fraudulent email notifications that your
  account has been closed
• Inbox messages that appear legitimate
            - Many of the above alerts contain links to
              suspicious domains. They’re intended to gather
              more information from users in order to steal
              their identities.



                            © 2003-2011 Identity Theft 911, LLC. All Rights
March 16, 2012                        Reserved - Confidential
                                                                              5
Example 1
Here’s what a
fake invitation
to connect
looks like:




                  © 2003-2011 Identity Theft 911, LLC. All Rights
March 16, 2012              Reserved - Confidential
                                                                    6
Example 2
Here’s what a
phishing message
looks like:




                 © 2003-2011 Identity Theft 911, LLC. All Rights
March 16, 2012             Reserved - Confidential
                                                                   7
5 Tips to Protect Yourself
• Delete suspicious emails
• Don’t click on links or download
  attachments in suspicious emails
• Go directly to your LinkedIn account for
  invitations and messages
• Protect your computer with up-to-date
  antivirus software
• Monitor your account’s privacy settings
                 © 2003-2011 Identity Theft 911, LLC. All Rights
March 16, 2012             Reserved - Confidential
                                                                   8
Protect Yourself
If you suspect your identity has
been stolen…
      – Call your insurer or bank, which
        might provide LifeStages™ Identity
        Management Services from Identity
        Theft 911.
      – Or contact us directly. One of our
        fraud specialists will guide you and
        provide practical support until your
        good name and credit are restored.

                     © 2003-2011 Identity Theft 911, LLC. All Rights
March 16, 2012                 Reserved - Confidential
                                                                       9

Más contenido relacionado

Destacado

розробка уроку фізики (формування ключових компетентностей учнів шляхом викор...
розробка уроку фізики (формування ключових компетентностей учнів шляхом викор...розробка уроку фізики (формування ключових компетентностей учнів шляхом викор...
розробка уроку фізики (формування ключових компетентностей учнів шляхом викор...sveta7940
 
Konservierung von Lebensmitteln
Konservierung von LebensmittelnKonservierung von Lebensmitteln
Konservierung von Lebensmittelnneuwerk
 
Acc 290 genius perfect education acc290genius.com
Acc 290 genius perfect education acc290genius.comAcc 290 genius perfect education acc290genius.com
Acc 290 genius perfect education acc290genius.comstudent333345
 
Letter to Senator Gardner Regarding Joint Resolution 34 - 20170330
Letter to Senator Gardner Regarding Joint Resolution 34 - 20170330Letter to Senator Gardner Regarding Joint Resolution 34 - 20170330
Letter to Senator Gardner Regarding Joint Resolution 34 - 20170330Sean Maday
 
Catalytic leadership - TriAgile - final
Catalytic leadership  - TriAgile - finalCatalytic leadership  - TriAgile - final
Catalytic leadership - TriAgile - finalPaul Boos
 
ちらし オストメイトなびサポーター
ちらし オストメイトなびサポーターちらし オストメイトなびサポーター
ちらし オストメイトなびサポーターTsubasa Kambe
 
Successful Small Business Energy Efficiency Program Practices
Successful Small Business Energy Efficiency Program PracticesSuccessful Small Business Energy Efficiency Program Practices
Successful Small Business Energy Efficiency Program PracticesSeth William Nowak
 

Destacado (12)

michael
michaelmichael
michael
 
Como pueden los que no podían
Como pueden los que no podíanComo pueden los que no podían
Como pueden los que no podían
 
Practica 2 metodos numericos unidad 2
Practica 2 metodos numericos unidad 2Practica 2 metodos numericos unidad 2
Practica 2 metodos numericos unidad 2
 
розробка уроку фізики (формування ключових компетентностей учнів шляхом викор...
розробка уроку фізики (формування ключових компетентностей учнів шляхом викор...розробка уроку фізики (формування ключових компетентностей учнів шляхом викор...
розробка уроку фізики (формування ключових компетентностей учнів шляхом викор...
 
Konservierung von Lebensmitteln
Konservierung von LebensmittelnKonservierung von Lebensmitteln
Konservierung von Lebensmitteln
 
Acc 290 genius perfect education acc290genius.com
Acc 290 genius perfect education acc290genius.comAcc 290 genius perfect education acc290genius.com
Acc 290 genius perfect education acc290genius.com
 
Narkomanija
Narkomanija Narkomanija
Narkomanija
 
ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
 
Letter to Senator Gardner Regarding Joint Resolution 34 - 20170330
Letter to Senator Gardner Regarding Joint Resolution 34 - 20170330Letter to Senator Gardner Regarding Joint Resolution 34 - 20170330
Letter to Senator Gardner Regarding Joint Resolution 34 - 20170330
 
Catalytic leadership - TriAgile - final
Catalytic leadership  - TriAgile - finalCatalytic leadership  - TriAgile - final
Catalytic leadership - TriAgile - final
 
ちらし オストメイトなびサポーター
ちらし オストメイトなびサポーターちらし オストメイトなびサポーター
ちらし オストメイトなびサポーター
 
Successful Small Business Energy Efficiency Program Practices
Successful Small Business Energy Efficiency Program PracticesSuccessful Small Business Energy Efficiency Program Practices
Successful Small Business Energy Efficiency Program Practices
 

Más de IDT911

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012IDT911
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing EmailIDT911
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneIDT911
 
Anatomy of a Craigslist Scam
Anatomy of a Craigslist ScamAnatomy of a Craigslist Scam
Anatomy of a Craigslist ScamIDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksIDT911
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside JobIDT911
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012IDT911
 

Más de IDT911 (11)

5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
 
Anatomy of a Phishing Email
Anatomy of a Phishing EmailAnatomy of a Phishing Email
Anatomy of a Phishing Email
 
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn OneTurn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
 
Anatomy of a Craigslist Scam
Anatomy of a Craigslist ScamAnatomy of a Craigslist Scam
Anatomy of a Craigslist Scam
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
How to Fight Shoddy Background Checks
How to Fight Shoddy Background ChecksHow to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
 
When Data Loss Is An Inside Job
When Data Loss Is An Inside JobWhen Data Loss Is An Inside Job
When Data Loss Is An Inside Job
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
 

Último

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

How You're LinkedIn to Identity Theft

  • 1. How You’re LinkedIn to Identity Theft
  • 2. The Risk Users of social networking sites likely have heard about the risks of oversharing personal information, particularly on Facebook. But according to a new report, LinkedIn users are the most vulnerable. The 2012 Identity Fraud Report from Javelin Strategy & Research found that LinkedIn users are more likely to be targeted for identity theft than people who use: © 2003-2011 Identity Theft 911, LLC. All Rights March 16, 2012 Reserved - Confidential 2
  • 3. LinkedIn vs. Facebook Users of the professional networking site experienced a 10 percent incidence LinkedIn and Google+ Users rate of fraud, Have a Higher Incidence of compared with 7 Fraud percent for Google+ users and 5.7 percent for Facebook users, according to the Javelin report. © 2003-2011 Identity Theft 911, LLC. All Rights March 16, 2012 Reserved - Confidential 3
  • 4. 3 Reasons Why Users of LinkedIn are more at risk because: • LinkedIn is a professional networking site, not a social networking site, that attracts users with higher incomes. – Many LinkedIn users have a household income above $100,000. • Profiles are meant to be viewed by people the users don’t know. – Profiles feature résumés loaded personal information. • Fraudsters can leverage this data to create convincing emails that get users to divulge bank or credit account numbers and other personal information. • Users may be more lax with their privacy settings. © 2003-2011 Identity Theft 911, LLC. All Rights March 16, 2012 Reserved - Confidential 4
  • 5. What to Look For Signs you’ve been targeted for fraud: • Invitations to connect that appear legitimate • Fraudulent email notifications that you have “messages” in your LinkedIn Inbox • Fraudulent email notifications that your account has been closed • Inbox messages that appear legitimate - Many of the above alerts contain links to suspicious domains. They’re intended to gather more information from users in order to steal their identities. © 2003-2011 Identity Theft 911, LLC. All Rights March 16, 2012 Reserved - Confidential 5
  • 6. Example 1 Here’s what a fake invitation to connect looks like: © 2003-2011 Identity Theft 911, LLC. All Rights March 16, 2012 Reserved - Confidential 6
  • 7. Example 2 Here’s what a phishing message looks like: © 2003-2011 Identity Theft 911, LLC. All Rights March 16, 2012 Reserved - Confidential 7
  • 8. 5 Tips to Protect Yourself • Delete suspicious emails • Don’t click on links or download attachments in suspicious emails • Go directly to your LinkedIn account for invitations and messages • Protect your computer with up-to-date antivirus software • Monitor your account’s privacy settings © 2003-2011 Identity Theft 911, LLC. All Rights March 16, 2012 Reserved - Confidential 8
  • 9. Protect Yourself If you suspect your identity has been stolen… – Call your insurer or bank, which might provide LifeStages™ Identity Management Services from Identity Theft 911. – Or contact us directly. One of our fraud specialists will guide you and provide practical support until your good name and credit are restored. © 2003-2011 Identity Theft 911, LLC. All Rights March 16, 2012 Reserved - Confidential 9