How to take care of your mental health after the Christchurch attacks

The world was saddened and distressed to learn of the shocking Christchurch mosque attacks on Friday, which claimed the lives of 50 people and injured nearly as many. Since then we’ve heard hear...

Richard Bryant, Professor & Director of Traumatic Stress Clinic, UNSW - avatar Richard Bryant, Professor & Director of Traumatic Stress Clinic, UNSW

Christchurch attacks provide a new ethics lesson for professional media

The difference in the Christchurch attacks is that propaganda supplied by the perpetrator was available to the professional media, even as the story was breaking.Wes Mountain/The Conversation, CC BY-N...

Denis Muller, Senior Research Fellow in the Centre for Advancing Journalism, University of Melbourne - avatar Denis Muller, Senior Research Fellow in the Centre for Advancing Journalism, University of Melbourne

Autonomous transport will shape our cities' future – best get on the right path early

Cities have a choice of autonomous vehicle futures: cars or mass transit vehicles. Which one we adopt is likely to determine how people-friendly our cities are.SueBeDoo888/ShutterstockA unique opport...

Peter Newman, Professor of Sustainability, Curtin University - avatar Peter Newman, Professor of Sustainability, Curtin University

What parents need to know about the signs of child sexual abuse

Significant changes in your child's behaviour could signal they are being sexually abused.from shutterstock.comRecent events, including the conviction and sentencing of George Pell for sexually abusin...

Larissa Christensen, Lecturer in Criminology & Justice  |  Co-leader of the Sexual Violence and Research Prevention Unit (SVRPU), University of the Sunshine Coast - avatar Larissa Christensen, Lecturer in Criminology & Justice | Co-leader of the Sexual Violence and Research Prevention Unit (SVRPU), University of the Sunshine Coast

Curious Kids: what makes an echo?

Do you think you could make an echo at Echo Point in Katoomba?Flickr/Amanda Slater, CC BYCurious Kids is a series for children. If you have a question you’d like an expert to answer, send it to ...

Noel Hanna, Leading Education Professional (Physics), UNSW - avatar Noel Hanna, Leading Education Professional (Physics), UNSW

Super power: why the future of Australian capitalism is now in Greg Combet's hands

Greg Combet wants to use his super power to free business from being hostage to short-term share-price and profit measures.ShutterstockRight now Greg Combet is arguably the most powerful man in Austra...

Danny Davis, Executive Director, Australian Institute of Performance Sciences, and researcher at, La Trobe University - avatar Danny Davis, Executive Director, Australian Institute of Performance Sciences, and researcher at, La Trobe University

Slimmed-down migration program has regional focus

The government has announced a reduced annual cap on migration of 160,000 for each of the next four years, as well as measures to stream a greater proportion of migrants to regional areas and boost th...

Michelle Grattan, Professorial Fellow, University of Canberra - avatar Michelle Grattan, Professorial Fellow, University of Canberra

Anxieties over livestreams can help us design better Facebook and YouTube content moderation

Livestream on Facebook isn't just a tool for sharing violence – it has many popular social and political uses. glen carrie / unsplash, CC BYAs families in Christchurch bury their loved ones foll...

Andrew Quodling, PhD candidate researching governance of social media platforms, Queensland University of Technology - avatar Andrew Quodling, PhD candidate researching governance of social media platforms, Queensland University of Technology

We did a breakthrough 'speed test' in quantum tunnelling, and here's why that's exciting

Future technologies will exploit today's advances in our understanding of the quantum world.Shutterstock/PopTika When you deal with things at the quantum scale, where things are very small, the world ...

U. Satya Sainadh, Postdoctoral researcher, Technion - Israel Institute of Technology - avatar U. Satya Sainadh, Postdoctoral researcher, Technion - Israel Institute of Technology

Politicians suing for defamation is usually a bad idea: here's why

There are better ways for politicians to address defamation concerns than through the courts.AAP/Ellen SmithWhen The Project host Waleed Aly began his editorial in the wake of the Christchurch massacr...

Michael Douglas, Senior Lecturer in Law, University of Western Australia - avatar Michael Douglas, Senior Lecturer in Law, University of Western Australia

Births, deaths and rituals: a revamped Ten Days on the Island explores Tasmania's past and present

Youth dance troupe Stompin performed their thought-provoking work Nowhere as part of this year's Ten Days on the Island.Jacob Collings, Lusy ProductionsThis year marks the tenth biennial Tasmanian Art...

Asher Warren, Lecturer, University of Tasmania - avatar Asher Warren, Lecturer, University of Tasmania

A guide for parents and teachers: what to do if your teenager watches violent footage

The world is reeling in the aftermath of the horrific shootings in Christchurch. The attack has also raised a number of side issues, including the ethics of broadcasting the live stream of the attack...

Rachael Sharman, Senior Lecturer in Psychology, University of the Sunshine Coast - avatar Rachael Sharman, Senior Lecturer in Psychology, University of the Sunshine Coast

As home care packages become big business, older people are not getting the personalised support they need

Many older Australians prefer to stay at home than enter residential aged care – but the process of securing home care is riddled with complexities.From shutterstock.comThe Royal Commission into...

Lyn Phillipson, NHMRC-ARC Dementia Development Fellow, University of Wollongong - avatar Lyn Phillipson, NHMRC-ARC Dementia Development Fellow, University of Wollongong

Two ways to fund NSW election promises as property prices crash

Previous NSW election promises were easily funded. Not so this time.ShutterstockState elections are always about spending promises, but this time not much is being said about how they will be funded.L...

Gareth Bryant, Lecturer in Political Economy, University of Sydney - avatar Gareth Bryant, Lecturer in Political Economy, University of Sydney

‘Rape Day’: A new video game glorifying sexual assault raises questions about regulation

nhungboon/ShutterstockA graphic new video game called Rape Day, set to launch in April, triggered a swift and widespread public outcry.Created by an independent developer, Rape Day is a set in a zombi...

Dr Marika Guggisberg, Research and Teaching Academic in Domestic and Family Violence, CQUniversity Australia - avatar Dr Marika Guggisberg, Research and Teaching Academic in Domestic and Family Violence, CQUniversity Australia

Curious Kids: why do we have two kidneys when we can live with only one?

Right now, your kidneys are getting rid of all things your body does not need. They do this by 'cleaning' your blood. ShutterstockCurious Kids is a series for children. If you have a question you&rsqu...

Brooke Huuskes, Lecturer in Human Anatomy, Physiology Anatomy & Microbiology, La Trobe University - avatar Brooke Huuskes, Lecturer in Human Anatomy, Physiology Anatomy & Microbiology, La Trobe University

Would you like to grow old at home? Why we’re struggling to meet demand for subsidised home care

In December, more than 127,000 Australians were waiting for a home care package.From shutterstock.comThe Royal Commission into Aged Care Quality and Safety is this week turning its focus to aged care ...

Michael Woods, Professor of Health Economics, University of Technology Sydney - avatar Michael Woods, Professor of Health Economics, University of Technology Sydney

We need a legally binding treaty to make plastic pollution history

The world urgently needs to move past plastic. Veronika MedunaA powerful marriage between the fossil fuel and plastic industries threatens to exacerbate the global plastic pollution crisis. The Center...

Trisia Farrelly, Senior Lecturer, Massey University - avatar Trisia Farrelly, Senior Lecturer, Massey University

White nationalism, born in the USA, is now a global terror threat

The recent massacre of 50 Muslim worshippers at two mosques in Christchurch, New Zealand is the latest confirmation that white supremacy is a danger to democratic societies across the globe.Despite Pr...

Art Jipson, Associate Professor of Sociology, University of Dayton - avatar Art Jipson, Associate Professor of Sociology, University of Dayton

Super power: why the future of Australian capitalism is now in Greg Combet's hands

Greg Combet wants to use his super power to free business from being hostage to short-term share-price and profit measures.ShutterstockRight now Greg Combet is arguably the most powerful man in Austra...

The Conversation - avatar The Conversation

Does most of your paycheck go to rent? That may be hurting your health

Families that spend more on housing may have less to spend on their health.Tero Vesalainen/shutterstock.comNew data on health across the U.S. shows that high housing costs are harming Americans’...

Jessica Owens-Young, Assistant Professor of Health Studies, American University - avatar Jessica Owens-Young, Assistant Professor of Health Studies, American University

The politics of fear: How it manipulates us to tribalism

The cruel murder of 50 people in New Zealand was another tragic reminder of how humans are capable of heartlessly killing their own kind just based on what they believe, how they worship, and what rac...

Arash Javanbakht, Assistant Professor of Psychiatry, Wayne State University - avatar Arash Javanbakht, Assistant Professor of Psychiatry, Wayne State University

What is the significance of Friday prayers in Islam?

Muslims praying in a Chicago mosque following the shooting in New Zealand, on Friday, March 15.AP Photo/Noreen NasirFollowing the terror attack on two New Zealand mosques last week, many Muslim commun...

Rose S. Aslan, Assistant Professor of Religion, California Lutheran University - avatar Rose S. Aslan, Assistant Professor of Religion, California Lutheran University

imageIs it a crime scene or just a store checkout? Could be both.Marlith, CC BY-SA

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase” on your online shopping cart, you might be setting yourself up as the victim of a crime.

imageGood luck getting data out of here, hackers! A far cry from today’s internet-connected registers.Kozuch, CC BY-SA

Major data breaches at big retail companies have brought this form of cybercrime to the international stage. Between November 27 and December 15, 2013, hackers accessed Target’s point of sale machines – the cash registers – that housed millions of credit and debit card numbers in addition to the names, addresses, email addresses and phone numbers of shoppers. They stole an estimated 40 million credit and debit card numbers. In 2014, hackers stole approximately 56 million customer credit and debit card numbers from Home Depot.

These numbers are astronomical – where does all that stolen information go? And who is behind it?

Hidden hackers

The individuals or groups of people responsible for these kinds of cybercrimes are varied. There are teenage opportunists operating alone, hackers looking for a challenge and even sophisticated organized criminal syndicates. Some criminals simply want to see if they can break through security systems as practice to hone their hacking skills. Speculation circulates that some hacking is state-sponsored; there’s little published research to back it up, but it appears China, for one, engages in cyber espionage.

Criminals seeking to profit from stolen information may open bank accounts in victims' names or access financial institutions for monetary gain. Of course, no single person is opening 40 million new credit cards. Hackers who steal identities and credit card information in the massive volumes of the Target or Home Depot breaches may break down the millions of credit and debit accounts into bulk batches – groups of 10,000, for instance – and sell them to the highest bidder via online illegal marketplaces, such as those on the Tor Network.

Once personal data is stolen and sold, the possibilities are endless. Criminals use stolen identities to create fake state or country IDs and to purchase things like plane tickets, cars, and weapons. Email addresses become spamming targets. Credit/debit card information is valid as long as the victim remains unaware of the theft. That’s why it’s so important for consumers to vigilantly check their accounts on a regular – even daily – basis.

Some of the biggest headaches come when a criminal steals valid identity details – such as name, date of birth or social security number. It can be extremely challenging for a victim to prove he is the REAL John Doe. Bank accounts can be closed and credit/debit card numbers changed as soon as foul play is detected, but a person’s name and SSN cannot. The greater risk for holiday shoppers is that stolen financial information will be used to make unauthorized purchases, but having someone create a new identity with stolen personal information isn’t outside of the realm of possibility.

imageHackers don’t need the plastic to get full use of your credit card numbers.Cards image via www.shutterstock.com.

(Lack of) legal response

In today’s world, victim and offender no longer need to be in physical proximity. And because of the wide range of cybercrime perpetrators, each with different motives, law enforcement agencies have quite a challenge on their hands. The FBI’s Internet Crimes Complaint Center receives over 250,000 reports each year from victims of cybercrimes, totaling over US$781 million per year in losses. It’s estimated that many times more victimizations are never reported – the so-called “dark figure” of cybercrimes.

Law enforcement agencies struggle to hire and train personnel on detecting and investigating these types of crimes. Currently, if you discover yourself to be the victim of cybercrime, your local police department is probably ill-equipped to handle the case. Instead, your financial institution will most likely work with you to investigate the issue, and you should report the incident to the FBI’s Internet Crimes Complaint Center.

The average financial loss for complaints the FBI received in 2013 (that involved any monetary loss) was $6,245. Each bank has its own policies, but for the most part they eventually remove the fraudulent charges from hacked credit cards – typically after a lot of paperwork on the part of the victimized consumer. Regaining money stolen from a debit card or checking account can be much harder.

Consumers as cybercrime-fighters

While lawmakers consider how to target cybercrime and agencies work out how to equip themselves, it falls to citizens to protect themselves.

  • Request new debit and credit cards from your financial institutions once or twice a year. You’ll receive new numbers and won’t have to pay for the new cards. Change your PIN on a regular basis. Monitor your credit report annually.
  • Don’t over-share on social media. Protect your image and personal info.
  • Never open an email or link from someone you don’t know.
  • Never share passwords or personal info with an untrusted source. When in doubt, call the institution to clarify the situation.
  • Report any suspicious activity or instances of victimization to the FBI’s Internet Crime Complaint Center.
  • Limit the number of online payments you make.
  • Only complete online payments on secured (https) websites from a password-protected computer. Using your smartphone or tablet on a wifi network gives bad guys an easy way to capture your info.
  • Use security software on your devices and perform routine checks to ensure your system is bug-free.
image

Diana S. Dolliver is an assistant professor at the University of Alabama and a member of the Scholars Strategy Network.

Read more http://theconversation.com/after-a-data-breach-its-consumers-left-holding-the-bag-33067