TITLE

The rise of cyber-crime families

AUTHOR(S)
Prince, Brian
PUB. DATE
July 2008
SOURCE
eWeek;7/21/2008, Vol. 25 Issue 22, p16
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article offers information on the Cyber-crime organizations in the U.S. These group collaborate around a classic Mafia-style model. Research shows that the organization's computer threats have grown more sophisticated wherein individual hackers are replaced with a well-structured organizations equipped with a boss and an underboss. The CTO Yuval Ben-Itzhak foretold that the group will start to mature and work in high volumes of attacks and stealing voluminous data from victims. It notes that like a Mafia family, the boss of these operation is well insulated and the underboss is the one who manages the operation, providing Trojans for attackers.
ACCESSION #
33986006

 

Related Articles

  • Ponemon Says Breaches Growing Costlier.  // American Banker;2/12/2009, Vol. 174 Issue 29, p16 

    This article presents information from a report about data breaches from Ponemon Institute LLC. The report states that the cost of data breaches has risen by 11 percent since 2006 and the average cost per breach has risen by 40.4 percent. Most of the breaches were caused by the negligence of...

  • Shielding yourself against virtual bullets. Harrison, Stephen // NetworkWorld Asia;Sep/Oct2011, Vol. 8 Issue 3, p40 

    The article offers three tips for companies to prevent computer security breaches. These tips are protecting switches and routers from network flooding, investing in blackholing and sinkholing, and using clean pipe solutions. It notes that implementing security measures is important to combat...

  • Software Patches More Vulnerable to Hackers. Marshall, Jeffrey; Heffes, Ellen M. // Financial Executive;Mar2005, Vol. 21 Issue 2, p10 

    The article presents information about computer security measures. Experts say software patches used to update source code or alter it to subvert hackers are becoming more vulnerable. They estimate that by 2006, 30% of all cyber attacks will target vulnerabilities where a patch has been...

  • Defending Against the Unusual Suspect, the Modern Cyber Criminal. Doherty, Jim // Software World;Mar2008, Vol. 39 Issue 2, p18 

    The article discusses cyber crimes such as hacking, phreaking, viruses, worms, and identity theft. It mentions that hacking was more of a social function than a directed attempt to accomplish a mission objective. Hackers are uniting and forming organized groups, shared tips, tricks and best...

  • These goofs will make your mistakes seem minor. Altom, Tim // Indianapolis Business Journal;12/22/2008, Vol. 29 Issue 43, p24 

    The article focuses on data related to hacking listed by Dataloss DB. It is indicated that 8 million records lost to hackers from Best Western in August 2008, 47 million lost to hackers in January 2007 from TJX Cos. Inc. and 40 million to hackers in 2005. Many more losses were because of...

  • Expand security for IP-based threats. Graydon, Andrew // Communications News;Apr2008, Vol. 45 Issue 4, p36 

    The article outlines the developments made on network security system of companies in the U.S. Due to the emergence of high technology, techniques of hackers and other cyber criminals evolve even faster which goal is to steal private financial information and remain undetected. Aside from such...

  • The Real Cost Of A Security Breach. Hobson, David // Software World;Jul2008, Vol. 39 Issue 4, p16 

    The article discusses the impact of security breach to companies in Great Britain. Due to the prevalence of identity theft, malware and computer crimes, sometimes companies are not sure whether their data are secured from data fraud or breach. Because of its great importance and impact, there...

  • An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65 

    Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics