Account takeover prevention: techniques and data quality

Prevention techniques

Figure 1: techniques used for account takeover prevention
Figure 2: actionable versus non-actionable data of hashed passwords in data breaches

Data quality

Figure 3: an obviously incorrect result as a result of poor email parsing
Figure 4: at least partly an email breach notification service
Figure 5: at least a credential breach notification service
Figure 6: one source record, seven(!) duplicates from combo list data

Conclusion

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store