monster_logo.jpgThe theft of personal information among Monster.com customers may be a textbook case in the making. This wasn’t a sophisticated database hack but the use (probably) of social engineering to get legitimate passwords and then use duplicitous phishing schemes to trap those users. Most intriguing to me is not necessarily the extent of the problem or the methods involved but the choice of target in the attack.


We would normally consider bank customers, insurance customers or those with information in government databases as the biggest data repositories to worry about. As for job seekers, who cares? But on the other hand, what better way to find all kinds of details that would be used, conceivably, to make your pharming site look like a more trustworthy source? Some of the resumes in Monster’s database probably include not only the user’s personal details, but that of their references. It’s like having someone walk off with an attache case full of your biographical details. Scary.

Maybe it’s time for all of us to do a personal inventory of where we’ve posted our data, and whether that might one day become a target too.

Would you recommend this article?

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication. Click this link to send me a note →

Jim Love, Chief Content Officer, IT World Canada
Previous articleCertified to annoy anyone sick of compliance issues
Next articleiPhone unlocked
Your guide to the ongoing story of how technology is changing the world