[WEBINAR] Bulletproof: How Today's Business Leaders Stay on Top


Definition - What does iJack mean?

iJack refers to personal electronic information or identity theft. Victims who have been iJacked can experience many devastating effects, but iJacking has become increasingly difficult to prosecute due to lack of electronic trail evidence when pursing cyber criminals.

Techopedia explains iJack

iJacking occurs when a thief steals another person's personal electronic information or confidential business or medical information in order to obtain financial information or money. The most popular type of iJacking is credit card fraud. This is followed by utilities fraud, in which a thief iJacks a person's identity and signs up for utilities or cell phone service in that person's name. The third most common type of iJacking in banking fraud.

In companies, server administrators may notice a decrease of bandwidth, which can tip them off to a possible iJacking situation. Most often, Social Security numbers or credit card numbers are not listed in their entirety, if at all, to prevent this type of illegal activity. In instances of iJacking, administrators are responsible for immediately reporting the potential crime, and companies should have established protocol for notifying their clients. From there, malicious attempts to steal personal identity could still take place, but users will have awareness of the potential for misuse of their personal or financial records. These warnings are often accompanied by messages urging clients to report iJacking to their credit card companies and federal authorities such as the U.S. Federal Trade Commission.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.