RV_ Posted May 19, 2016 Report Share Posted May 19, 2016 This is a good down to earth article that brings up some good info on the why and the who of the cyber criminals. The article is also great info for home users. Excerpt: "On Tuesday, Hewlett Packard Enterprise (HPE) released a new report titled "The Business of Hacking," which examined the underground economy surrounding cybercrime and criminal hackers, and explained how businesses can protect themselves. Chandra Rangan, vice president of global marketing for HPE security products, said that many of the conversations they have with security professionals in IT organizations can quickly become very technical. As such, some business leaders often relegate security as something to be spoken to exclusively by security professionals. But, by explaining how the cybercrime underworld economy works, Rangan hopes it will help business leaders "understand that criminal hacking is a business, and it operates like a business. By doing that, it gives business leaders a much better appreciation of what's a happening." According to the report, cybercrime can take many forms. Criminals can be acting in the interest of organized crime, corporate espionage, hacktivism, cyber warfare or terrorism, or just people who want to make some money. The report itself focused on the criminal exploits that could be monetized. In terms of the way criminals make money through cybercrime, the report identified 10 ways criminals use hacking for financial gain. 1.Ad fraud2.Credit card fraud3.Payment system fraud/Bitcoin mining4.Bank fraud5.Medical records fraud6.Identity theft7.Credential harvesting8.Bug bounty9.Extortion10.IP theft Ad fraud, or setting up adds to bolster fake website traffic, are one of the easiest forms of cybercrime and have the highest payout potential. Extortion and IP theft, while almost as profitable, are far more difficult to pull off." There is a lot more in the article here: http://www.techrepublic.com/article/report-the-economy-of-criminal-hackers-and-how-businesses-can-protect-themselves/?ftag=TRE684d531&bhid=19724681974700635514865380622813 RV/Derekhttp://www.rvroadie.com Email on the bottom of my website page.Retired AF 1971-1998 When you see a worthy man, endeavor to emulate him. When you see an unworthy man, look inside yourself. - Confucius “Those who can make you believe absurdities, can make you commit atrocities.” ... Voltaire Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.