Examples of use of stolen information
1. People whose intention was to get work used stolen information, such as Social Security numbers.
2. But they cautioned that law enforcement agencies investigating the incident have not found evidence that the stolen information has been used to commit identity theft.
3. Hackers can exploit weaknesses in this technology to break into computers, and they can use the same technology to transmit stolen information covertly off a victim‘s network.
4. The buyers are less worried about indictments against executives at Bezeq‘s subsidiaries, and more about lawsuits from its competitors, who may have been harmed by allegedly stolen information.
5. Nicholson said that every VA facility across the country will observe a "security awareness" week starting Monday and that the department will hire a company to determine whether the stolen information is being misused.