Subscribe to DSC Newsletter

The dark side of Big Data: credit card ID theft, how it has been done...

http://qz.com/107970/scientists-discover-whats-killing-the-bees-and...

Breaking new story. Those bad gurus are behind bars. The process was so simple that becomes genious:

The men used relatively a basic “SQL injection attack” to crack company servers, giving access to internal databases.

Once inside the network, they used malware (malicious code) to create a  “back door” that gave them return access, even after some companies identified breaches and thought they had fixed them. Then they installed “sniffers,” or programs to identify, collect and steal vast amounts of personal financial data, individually known as dumps, that they secreted in a network of computers around the world.“Those dbs (databases) are hell big …”

Question: what are the security of NASDAQ doing? why was it not doing its job when the malware crack open the system?

Views: 416

Comment

You need to be a member of Data Science Central to add comments!

Join Data Science Central

Comment by Chris on March 1, 2014 at 10:40am

Data security led people to bitcoin http://www.brw.com.au/p/tech-gadgets/bitcoin_value_over_us_after_fa...

but then along came the spider...the unstoppable Deep Web!

Comment by Chris on September 13, 2013 at 12:05pm

Toshiba labs has announced a breakthrough quantum cryptography method that may lead to widespread use of unbreakable codes. http://www.engineering.com/3DPrinting/3DPrintingArticles/ArticleID/...

Comment by Chris on September 9, 2013 at 1:14pm
Comment by Chris on September 9, 2013 at 1:08pm
Comment by Chris on August 17, 2013 at 11:39am

The modified Zeus virus is the first piece of malicious software uncovered to date that has been used to post false "likes" on a social network, according to experts who track cyber crime. It glue the "like" strokes to the overcharge products  http://www.reuters.com/article/2013/08/16/us-instagram-cyberfraud-i...

Comment by Chris on August 9, 2013 at 11:33am

http://www.microstrategy.com/about-us/careers/job-search/vienna?job...

take the lead in designing and implementing enhancements to the company’s global compliance program on privacy-related matters, including data protection and data security.

Comment by Chris on August 6, 2013 at 7:36am

FDA implementation guidance on medical devices, I like the part of taking "premarketing" sector into consideration

http://www.ihealthbeat.org/insight/2013/fda-guidance-highlights-med...

Comment by Chris on July 30, 2013 at 9:36am

So what would a data breach cost your company? You can calculate an estimate of it yourself at www.databreachcalculator.com. This free tool from Symantec lets you connect the dots between all of this research by estimating how a data breach could impact your company. Best practices can be found at http://www.theguardian.com/media-network/partner-zone-symantec/mist...

Comment by Chris on July 30, 2013 at 7:57am

the Guardian Media Network  experts have offered their views on the growing sophistication of cyber threats (especially social media and mobile devices) and what organisations need to do

1. create a culture of security in the workforce

2. Mental preparation

 

How are cyber attacks against organisations evolving? • Do organisations fully understand the financial and reputational risks associated with cyber attacks? • What steps do organisations need to take to ensure they are prepared for a cyber attack? • If a company is attacked, what steps do they need to take to manage the fallout?

To actively take part, join the panel at 1pm on Wednesday 31 July @ http://www.theguardian.com/media-network/media-network-blog/2013/ju...

and through Twitter using the hashtag #CyberRiskChat. Right on! Chris Ngo 12:57 July 30, 2013

 

Comment by Chris on July 29, 2013 at 7:50am

The overall view on cybersecurity, disregard the nature of the ads for UMUC, facts on cyber malware...

http://www.umuc.edu/cybersecurity/about/advisory-board.cfm on your right side displays

Feature Story

"Unlocking the Secrets of Cyber Security"  This is a PDF document

Cybersecurity Program Advisory Board members discuss the challenges of hacking, tracking and attacking in the virtual world.

Videos

  • Add Videos
  • View All

© 2019   Data Science Central ®   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service