Subscribe to DSC Newsletter
.

The dark side of Big Data: credit card ID theft, how it has been done...

http://qz.com/107970/scientists-discover-whats-killing-the-bees-and...

Breaking new story. Those bad gurus are behind bars. The process was so simple that becomes genious:

The men used relatively a basic “SQL injection attack” to crack company servers, giving access to internal databases.

Once inside the network, they used malware (malicious code) to create a  “back door” that gave them return access, even after some companies identified breaches and thought they had fixed them. Then they installed “sniffers,” or programs to identify, collect and steal vast amounts of personal financial data, individually known as dumps, that they secreted in a network of computers around the world.“Those dbs (databases) are hell big …”

Question: what are the security of NASDAQ doing? why was it not doing its job when the malware crack open the system?

Views: 468

Comment

You need to be a member of Data Science Central to add comments!

Join Data Science Central

Comment by Chris on July 27, 2013 at 7:28am

Another form of hacking. Famous hacker "Jackpotting" died before releasing his "arts" of jamming onto the medical device vulnerabilities at the Black Hat security conference in Las Vegas. http://www.bbc.co.uk/news/technology-23467411

 He discovered flaws in widely-used insulin pumps which allowed him to compromise the devices, made it possible to administer a fatal level of insulin.  All the stories about hacking boil down to one point: it is easier to do bad than do good. How vulnerable we are in this transitional period!

Comment by Chris on July 26, 2013 at 8:34am

I just found the answers from Dr. Vincent blog http://www.datasciencecentral.com/profiles/blogs/botnets-on-the-clo...

posted last week!

Comment by Chris on July 26, 2013 at 8:26am

McAfee checked http://www.mcafee.com/us/products-solutions.aspx

The industry does not design a consumer public blog sharing, hence opinions of both sides don't have a "playground" to meet.  Unlike the malware users...

© 2021   TechTarget, Inc.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service