DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Cyber101 CyberStory

Cyber Story: Travelers

Reading Time: 1 min read
in Cyber Citizens, CyberStory, Travelers

Cyber criminals steal frequent flyer miles:

Jill Frankfort, a teacher from Boston, accumulated 152,500 frequent flyer miles over the years. Her goal was to spend them on a special vacation When she tried to redeem them for an international trip, they were no longer in her American Airlines account. Frankfort reached out to the airline, and was told that someone accessed her account. Her 152,500 miles were stolen.

In May 2017, a couple completely unrelated to her had flown from New Delhi, India, to Doha, Qatar, in business class with her miles Assuming that her miles were secure she rarely checked her account. Unbeknownst to her, back in October 2016, someone had changed the email associated with her AAdvantage account At the time, the change triggered a notification from American Airlines.

But the alert landed in her spam mailbox 20 months later, when she contacted American Airlines, it was too late. All her miles were already used. Fortunately, American Airlines agreed to return 25,000 of her miles as a gesture of goodwill.

You can prevent a similar incident from happening to you.

Follow these simple steps:

  • Check your accounts frequently
  • Change your password regularly
  • Don’t use the same email address and password across multiple sites

Visit https://staging.cybermaterial.com/travelers

Tags: Cyber StoryCyber Story TravelersCyberstoryTravelers
ADVERTISEMENT

Related Posts

Cyber security considerations 2023

Cyber security considerations 2023

May 19, 2023
The Weakest Link by Arun Vishwanath

The Weakest Link by Arun Vishwanath

April 26, 2023
The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing

The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing

March 14, 2023
The Weakest Link: How to Diagnose, Detect, and Defend Users from Phishing

The Weakest Link – Books

March 14, 2023

More Articles

Alerts

SharkBot Trojan Spread Via Android File Manager Apps

November 28, 2022
Document

Cybersecurity: Incident Response Short Student Guide

August 11, 2022
Book

Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

March 30, 2022
Definition

Children’s Online Privacy Protection Rule (COPPA)

March 13, 2021
Course

ICS515: ICS Visibility, Detection, and Response

March 17, 2022
Cyber101

Emergency Communications Plan (EC plan)

April 29, 2022
Incidents

Chilean Court System Hit With Ransomware Attack

September 27, 2022
Cyber101

Sodinokibi attack

October 3, 2020
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.