{"id":786,"date":"2012-05-25T13:35:19","date_gmt":"2012-05-25T11:35:19","guid":{"rendered":"http:\/\/it-news-blog.com\/?p=786"},"modified":"2019-04-30T17:39:57","modified_gmt":"2019-04-30T15:39:57","slug":"identitatsdiebstahl-und-cyberkriminalitat","status":"publish","type":"post","link":"https:\/\/it-news-blog.com\/?p=786","title":{"rendered":"Identit\u00e4tsdiebstahl und Cyberkriminalit\u00e4t"},"content":{"rendered":"<p>Phishing war gestern &#8211; heute steht immer mehr die komplette Internet-Identit\u00e4t ihrer Opfer auf dem Wunschzettel von Cyberkriminellen. Das ergab eine aktuelle Studie von Bundesinnenministerium (BMI) und Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI).<\/p>\n<p>Bis vor einigen Jahren stand vor allem das Phishing, also das Abfischen von Online-Banking-Zugangsdaten, im Mittelpunkt.<\/p>\n<p>Mittlerweile r\u00fcckt die komplette digitale Identit\u00e4t des Nutzers in den Fokus der Internetkriminellen, also z.B. die bei sozialen Netzwerken, E-Mail-Dienstleistern, Packstationen\u00a0und Handelsplattformen verwendeten Identit\u00e4ten.<\/p>\n<p><strong>Trojaner umgehen viele Abwehrmechanismen<\/strong><\/p>\n<p>Die Datendiebe nutzen vor allem Trojanische Pferde, die in der Lage sind, auch fortgeschrittene aktualisierte technische Abwehrma\u00dfnahmen zu umgehen.<\/p>\n<p><strong>Betriebssysteme und Softwarepakete sind die\u00a0Haupt-Schwachstellen<\/strong><\/p>\n<p>Eine weiteres Ergebnis der Studie: Die Vorgehensweise der T\u00e4ter hat sich in den letzten Jahren ge\u00e4ndert. Die Schadprogramme gelangen heute vorwiegend durch Schwachstellen im Betriebssystem bzw. in Softwarepaketen auf die Nutzer-PCs. 2010 wurden die meisten Systeme durch den blo\u00dfen Besuch von Internetseiten (sog. drive-by-infection) und pr\u00e4parierte PDF-Dokumente angegriffen.<\/p>\n<p><strong>L\u00f6sungsans\u00e4tze?<\/strong><\/p>\n<p>Die Studie f\u00fchrt aus, inwiefern Identit\u00e4tsdiebstahl und Identit\u00e4tsmissbrauch heute die Sicherheit von E-Government und E-Business bedrohen. Sie nimmt dar\u00fcber hinaus eine detaillierte Bewertung des geltenden Rechts in Bezug auf Identit\u00e4tsdiebstahl vor und zeigt sowohl bereits erzielte Erfolge als auch neue L\u00f6sungsans\u00e4tze und offene Fragen im Kampf gegen Diebstahl und Handel von digitalen Identit\u00e4ten auf.<\/p>\n<p><strong>Unberechenbare Entwicklung<\/strong><\/p>\n<p>F\u00fcr die Zukunft\u00a0sagt die Studie vorher, dass Identit\u00e4tsdiebstahl und -missbrauch noch nicht absehbare Formen annehmen werden, da neue Techniken und Plattformen immer neue Angriffsszenarien erm\u00f6glichen.<\/p>\n<p><strong>Matthias A. Walter,<\/strong> <a href=\"http:\/\/www.tec4net.com\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.tec4net.com<\/a><\/p>\n<p>EDV-Sachverst\u00e4ndiger und Datenschutzauditor<\/p>\n<p>\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014\u2014-<\/p>\n<p><strong>Quellen und Links:<\/strong><\/p>\n<p>Webseite des Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)<br \/>\n<a href=\"https:\/\/www.bsi.bund.de\/DE\/Home\/home_node.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.bsi.bund.de\/DE\/Home\/home_node.html<\/a><\/p>\n<p><strong>tec4net Ihr Starker IT-Partner<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div style=\"width: 1px; height: 1px; overflow: hidden;\">vorformulierten Vertrag<strong><a href=\"http:\/\/www.tec4net.com\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-759 alignleft\" src=\"https:\/\/it-news-blog.com\/wp-content\/uploads\/2012\/01\/logo_symantec_336x280_google_c.jpg\" alt=\"\" width=\"336\" height=\"280\" \/><\/a><\/strong><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Phishing war gestern &#8211; heute steht immer mehr die komplette Internet-Identit\u00e4t ihrer Opfer auf dem Wunschzettel von Cyberkriminellen.<\/p>\n","protected":false},"author":2,"featured_media":1701,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Identit\u00e4tsdiebstahl und Cyberkriminalit\u00e4t - IT-NEWS-BLOG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/it-news-blog.com\/?p=786\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identit\u00e4tsdiebstahl und Cyberkriminalit\u00e4t - IT-NEWS-BLOG\" \/>\n<meta property=\"og:description\" content=\"Phishing war gestern - heute steht immer mehr die komplette Internet-Identit\u00e4t ihrer Opfer auf dem Wunschzettel von Cyberkriminellen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/it-news-blog.com\/?p=786\" \/>\n<meta property=\"og:site_name\" content=\"IT-NEWS-BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-25T11:35:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-30T15:39:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/it-news-blog.com\/wp-content\/uploads\/2012\/05\/250512_2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/it-news-blog.com\/?p=786\",\"url\":\"https:\/\/it-news-blog.com\/?p=786\",\"name\":\"Identit\u00e4tsdiebstahl und Cyberkriminalit\u00e4t - IT-NEWS-BLOG\",\"isPartOf\":{\"@id\":\"https:\/\/it-news-blog.com\/#website\"},\"datePublished\":\"2012-05-25T11:35:19+00:00\",\"dateModified\":\"2019-04-30T15:39:57+00:00\",\"author\":{\"@id\":\"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc\"},\"breadcrumb\":{\"@id\":\"https:\/\/it-news-blog.com\/?p=786#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/it-news-blog.com\/?p=786\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/it-news-blog.com\/?p=786#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/it-news-blog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identit\u00e4tsdiebstahl und Cyberkriminalit\u00e4t\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/it-news-blog.com\/#website\",\"url\":\"https:\/\/it-news-blog.com\/\",\"name\":\"IT-NEWS-BLOG\",\"description\":\"Ein Service der tec4net GmbH\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/it-news-blog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc\",\"name\":\"Matthias Walter\",\"sameAs\":[\"https:\/\/tec4net.com\"],\"url\":\"https:\/\/it-news-blog.com\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Identit\u00e4tsdiebstahl und Cyberkriminalit\u00e4t - IT-NEWS-BLOG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/it-news-blog.com\/?p=786","og_locale":"de_DE","og_type":"article","og_title":"Identit\u00e4tsdiebstahl und Cyberkriminalit\u00e4t - IT-NEWS-BLOG","og_description":"Phishing war gestern - heute steht immer mehr die komplette Internet-Identit\u00e4t ihrer Opfer auf dem Wunschzettel von Cyberkriminellen.","og_url":"https:\/\/it-news-blog.com\/?p=786","og_site_name":"IT-NEWS-BLOG","article_published_time":"2012-05-25T11:35:19+00:00","article_modified_time":"2019-04-30T15:39:57+00:00","og_image":[{"width":960,"height":400,"url":"https:\/\/it-news-blog.com\/wp-content\/uploads\/2012\/05\/250512_2.jpg","type":"image\/jpeg"}],"author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/it-news-blog.com\/?p=786","url":"https:\/\/it-news-blog.com\/?p=786","name":"Identit\u00e4tsdiebstahl und Cyberkriminalit\u00e4t - IT-NEWS-BLOG","isPartOf":{"@id":"https:\/\/it-news-blog.com\/#website"},"datePublished":"2012-05-25T11:35:19+00:00","dateModified":"2019-04-30T15:39:57+00:00","author":{"@id":"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc"},"breadcrumb":{"@id":"https:\/\/it-news-blog.com\/?p=786#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/it-news-blog.com\/?p=786"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/it-news-blog.com\/?p=786#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/it-news-blog.com\/"},{"@type":"ListItem","position":2,"name":"Identit\u00e4tsdiebstahl und Cyberkriminalit\u00e4t"}]},{"@type":"WebSite","@id":"https:\/\/it-news-blog.com\/#website","url":"https:\/\/it-news-blog.com\/","name":"IT-NEWS-BLOG","description":"Ein Service der tec4net GmbH","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/it-news-blog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc","name":"Matthias Walter","sameAs":["https:\/\/tec4net.com"],"url":"https:\/\/it-news-blog.com\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/786"}],"collection":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=786"}],"version-history":[{"count":8,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/786\/revisions"}],"predecessor-version":[{"id":2049,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/786\/revisions\/2049"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/media\/1701"}],"wp:attachment":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}