TITLE

Hackers Steal 1 Million Card Numbers

AUTHOR(S)
Bruno, Maria
PUB. DATE
April 2001
SOURCE
Bank Technology News;Apr2001, Vol. 14 Issue 4, p6
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the theft of more than one million credit card numbers from United States electronic businesses by Ukrainian and Russian hackers. Investigations by the Federal Bureau of Investigation on the theft; Description of hackers' operations; Graph on the impact of technology investments on Internet payment fraud prevention. INSET: Take Note.
ACCESSION #
4332972

 

Related Articles

  • Most phishing attacks do not look 'fishy'. Smith, Mariah // Delta Farm Press Exclusive Insight;1/25/2012, p5 

    The article discusses the effects of e-mail phishing, a term combining the words "fishing" and "phreaks," an early computer term for hackers. Phishers create e-mails that mimic those from well-known companies like a bank or credit card company thereby, capturing the account usernames and...

  • Banks Would Not Have Seen Fraud. Goodwin, Bill // Computer Weekly;12/5/2002, p4 

    Reports on the views of the security experts on the effectiveness of security systems used by banks to detect fraudulent credit card transactions of computer hackers in Great Britain. Problems regarding the security systems; Details on the credit card acquisition systems used in the country.

  • Hacker Pleads Guilty In TJX Breach.  // ISO & Agent Weekly;9/17/2009, Vol. 5 Issue 33, p2 

    The article discusses a court case wherein Albert Gonzales, a 28-year-old hacker, pleads guilty toseveral of the biggest online credit card thefts. Gonzales faces up to 25 years in Massachusetts prison and 20 years in New York with a penalty of over 2.8 million dollars as part of a U.S. federal...

  • The Internet Grows More Dangerous.  // Trends Magazine;Aug2011, Issue 100, p24 

    The article presents the anticipated ramifications of the emergence of cybercrime. It mentions cybercrime schemes which are claimed by the Internet Crime Complaint Center in the U.S. as the most successful in 2010, including auction frauds, credit card fraud, and identity theft. It expects cloud...

  • TOP 10 Ways to Improve Your Computing Experience. Huber, Joe // Library Media Connection;Aug2003, Vol. 22 Issue 1, p60 

    Despite advances in computer security in 2002, hackers and identity thieves continues to be a major headache. If you use your credit card online regularly, identifying problems should be high on your list. Consider visiting an anti-fraud web site. These consumer-oriented sites allows an...

  • Criminal Minds: Thinking Like a Hacker Makes Good Data Governance Sense. Green, Andy // Database & Network Journal;Aug2013, Vol. 43 Issue 4, p18 

    The article reports on the indictment of a gang of cyber-criminals who allegedly snatched more than 160 million credit card numbers that resulted to over $300 million in losses over seven years by the U.S. Attorney's Office in New Jersey. According to the government investigation, the gang has...

  • Hacker Catches Out Unwary Travel Firms. Goodwin, Bill // Computer Weekly;12/5/2002, p1 

    Reports on an investigation on a computer hacking incident in travel firms, conducted by NatWest in Great Britain. Amount of fraudulent credit card refunds taken by the computer hacker; Views of investigators on how the computer hacker gained access to the Unix servers of the travel firms;...

  • How e-thieves hack in. Pieterse, Johan // Finance Week;02/11/2000, p30 

    Cites incidents and three main fears about credit card fraud on the Internet. Success of a computer hacker in stealing details of credit card holders from an online music store; Undetected cases of electronic intrusion. INSET: The main problems..

  • Stolen Credit Card Card Information Most Worry Americans.  // Pratt's Letter;11/10/2014, p2 

    The article reports on the poll conducted by consulting firm Gallup regarding the worry of Americans on the hacking of credit cards by the computer hackers.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics