Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Opinion: Tweeted Credit and Debit Cards Spotlight Social Stupidity

There is a saying in the InfoSec world – you can’t patch human stupidity. It isn’t hard to prove that statement depending on the situation, but a new account on Twitter is making the task a simple one. The account, @NeedADebitCard, is re-tweeting people who are openly declaring their intent to share the wealth (what little of it there is) by posting pictures of their debit and credit cards for all to see.

There is a saying in the InfoSec world – you can’t patch human stupidity. It isn’t hard to prove that statement depending on the situation, but a new account on Twitter is making the task a simple one. The account, @NeedADebitCard, is re-tweeting people who are openly declaring their intent to share the wealth (what little of it there is) by posting pictures of their debit and credit cards for all to see.

Complete with names, card numbers, expiration dates, and in some cases CVV code (the security code that appears on a statement or activation letter), the Darwin Award hopefuls seem all to willing to share their respective credit lines.

(Image Blurred by SecurityWeek for Privacy and Security Reasons)

Tweeted Debit Cards

It would be tragic if these images were stolen, or perhaps unknowingly leaked. However, they were intended for the public to see, and perhaps use, because the card owners willingly published the images themselves. Always willing to offer assistance and lulz, some supporters of Anonymous were only too happy to re-tweet some of the more revealing images, as were a few others who are not known for their hospitality.

Most of the images were taken with an awful image service called Instagram, while others were simply uploaded with TwitPic or something similar. Instagram, at the time this rant was written, is at least attempting to help the foolish by deleting the images that contained sensitive information. As for those on other image services, they’re on their own it seems.

There has been talk of legality; questions focused on if the re-tweeting done by NeedADebitCard is in fact a crime. After speaking to those familiar with such issues, it seems that anyone wanting to sue for the re-tweeting has an uphill battle. As they are the reason the card image existed in the first place.

Whoever runs the NeedADebitCard account appears to have done so in order to promote awareness, as the biography section simply states, “Please quit posting pictures of your debit cards, people.”

Most reading this won’t need the advice offered by @NeedADebitCard. In fact, of the images posted and since removed (though they are cached online), most of them were teens.

Advertisement. Scroll to continue reading.

Thus, while most of the techies reading this know better, it might be wise to explain (rehash) the foolishness of such an act to the kids and significant others who stopped thinking for a brief moment during their financial joy.

The L.A. Times had some interesting stats in their coverage of the dunderheads on Twitter, which puts things into perspective.

“According to the U.S. Bureau of Justice, 8.6 million American households experienced identity theft in 2010, with unauthorized credit card use accounting for much of the increase from the 6.4 million households victimized in 2005. Families lost a total of $13.3 billion, with an average of $2,200 lost per household affected. A 2011 report from Javelin Strategy & Research cited by the Wall Street Journal said social media and smartphone use accounted for recent increases in identity theft.”

In closing, there’s nothing to say. All the advice in the world comes down to a harsh reality. No matter how hard security professionals try, no matter how loud they shout, you can’t patch human stupidity.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.