Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Hack for hire
Mirian A. Communications of the ACM62 (12):32-37,2019.Type:Article
Date Reviewed: Feb 27 2020

Attackers continue to seek account numbers and password information in order to compromise the bank and credit card accounts of customers. Understanding how hackers obtain user information can help enterprises install adequate security measures and save millions of dollars. But how should organizations identify black markets to minimize financial damage control?

In an effort to recommend effective security measures for today’s interconnected worldwide online transaction industries, this insightful paper outlines the characteristics for identifying hired hackers in online business transactions.

Mirian presents compelling online fraud data to chronicle how hijackers (1) use complex phishing attacks against enterprises lacking a universal 2nd factor (U2F) mechanism, and (2) search through internationally marketed media to identify victims.

The author discusses the executed fraud investigations of numerous email account services, specifically Google accounts, to gain insights into the characteristics of hijacking attackers. Can keywords in different languages be used for hacking services? How do hackers strategically use false positive user identities to select and buy merchandise? How do hackers lure victims into phishing and dubious online activities?

Consequently, Mirian convincingly presents some strategies for identifying attacker behaviors and educating online shoppers. “It takes a thief to catch a thief” is an excellent caption for this great practice paper.

Reviewer:  Amos Olagunju Review #: CR146909 (2008-0204)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy