iTnews
  • Home
  • News
  • Technology
  • Security

Revealing your identity...for an Easter egg

By William Eazel on Apr 24, 2006 10:12AM

Research carried out this Easter outside Victoria Station in London has found that 81 percent of people were willing to part with all the personal information needed to steal their identity for the chance to win an Easter egg.

The survey by Infosecurity Europe was carried out to raise awareness of the dangers of giving personal information to strangers who could then commit identity theft. The researchers presented the survey as research into the significance of Easter, telling commuters that if they took part in the survey they would be entered into a drawing for an Easter egg bonanza worth £60 ($110).

To put the public at ease, 300 people were asked questions about their knowledge of Easter and Easter egg consumption. Seemingly innocent questions were inserted into the conversation to find out the details needed to steal their identities, such as date of birth and mother's maiden name.

The first question researchers asked was, "What is your name?" Everyone surveyed gave their names. They were then asked a series of questions about Easter and the tradition of giving Easter eggs. They were also asked if they gave any of their Easter eggs to their pets (89 percent said they had) and when asked what their pets name was 86 percent of respondents then went on to give their pet's name. When asked if there was a tradition of giving Easter eggs in their family, 76 percent said there was and when asked for the names of their mothers and fathers families, 80 percent revealed their mothers maiden name.

All of the commuters gave their address and post code so that the Easter egg feast could be sent to them if they won. Mother's maiden name and first school are key pieces of identity information used by banks and utility companies in their identity-checking procedures.

Finding out respondents' dates of birth was also fairly easy with 82 percent giving this information, as the researchers pointed out it was needed to establish their age group for survey demographics and to prove they had participated in the survey. Some 90 percent gave their home phone number in case there was a problem delivering the chocolate.

"Individuals should never give more information about their biographical or attributed identity than they have to as this information can be extremely damaging if it is misused or falls into the wrong hands, and they should never give the information to someone that they do not know they can trust," said Lord Erroll, who is giving the opening keynote address on identity at Infosecurity Europe.

"If someone calls you to offer you a mobile phone you should not give them your bank details until you have verified who they are by phoning the company's main switchboard and never send cash to salespeople offering you investments that sound too good to be true, even if it is a delicious Easter Egg!"

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
aneastereggidentityforrevealingsecurityyour

Partner Content

Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By William Eazel
Apr 24 2006
10:12AM
0 Comments

Related Articles

  • GitLab races out vulnerability-fix release
  • Hacker claims to have stolen 1 billion records of Chinese citizens
  • Australian businesses lose $227 million to BEC-like scams
  • Poor patching creates easy zero-day vulnerability reuse
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

PayTo rollout kicks off

PayTo rollout kicks off

Australia scraps digital passenger cards for international arrivals

Australia scraps digital passenger cards for international arrivals

Neobank Volt exits the banking industry

Neobank Volt exits the banking industry

Optus brands Telstra-TPG deal 'uniquely one-sided'

Optus brands Telstra-TPG deal 'uniquely one-sided'

Digital Nation

Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: EY invests in AI to improve approach to flexible working
Case Study: EY invests in AI to improve approach to flexible working
Case Study: Good360 deploys NetSuite, Magento and Salesforce
Case Study: Good360 deploys NetSuite, Magento and Salesforce
Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
Case study: AFL kicks goals with its new digital platform
Case study: AFL kicks goals with its new digital platform
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.