Identity Theft

SIM swapping attacks allow attackers to reassign phone numbers to phone hardware they control. (Image courtesy of iFixit.)

Spotlight Podcast: Flashpoint’s Allison Nixon on SIM Swapping and the Looming Online Identity Crisis

Podcast: Play in new window | Download (Duration: 19:08 — 21.9MB)Subscribe: Android | Email | Google Podcasts | RSSYour smart phone does double and triple duty: letting you do banking, buy a cup of coffee, board a plane or access a sensitive online account. But that doesn’t mean that your phone number is equally as trustworthy. In this Spotlight Podcast, we speak with Flashpoint* head of research Allison Nixon about how a recent rash of SIM swapping attacks highlights a looming crisis in online identity. 

Data stolen in a breach can surface months or years after the victimized firm has returned to "business as usual," warns Thomas Hofmann of the firm Flashpoint.

Taking the Long View of Breach Fallout

In this industry perspective, Thomas Hofmann, the Vice President of Intelligence at the firm Flashpoint* warns that the effects of data breaches can often be felt months or years after the actual incident, as stolen data bubbles up in underground marketplaces. He has three pieces of advice for companies that want to develop an incident response plan that mitigates the damage of breaches in the short term and over the long term.