By Ross Kerber And Daniel Trotta
18 August 2009 @ 06:13 pm ET
Next Tech Article
Consumers and companies are vulnerable to hackers and identity thieves even after U.S. authorities arrested a man they said was a master hacker who stole 170 million credit and debit card numbers.
Albert Gonzalez, 28, of Miami, Florida, seen in an undated U.S. law enforcement handout photo, was indicted by U.S. authorities August 17, 2009 for conspiring to hack into computer networks supporting major retail and financial organizations, and stealing data relating to more than 130 million credit and debit cards. Gonzalez, also known as "segvec," "soupnazi" and "j4guar17," is charged, along with two unnamed co-conspirators with what the U.S. ... (REUTERS / U.S. Law Enforcement via Wired)
1 of 1
Full Size
Estimates on the total financial impact of breaches vary, but a study by Forrester Research put the cost at $90 to $305 per compromised record when considering the cost of upgrades, notifying customers and legal and marketing expenses.
"Under our banking laws, it's the financial institutions that will be stuck paying for fraudulent use of credit cards. We have the consumers responsible for $50 and the rest winds up on the card issuer," said Joel Reidenberg, a professor at Fordham Law School who teaches privacy law. READ MORE
tags
alert
(1)
art
(1)
asteriks
(1)
bof
(1)
browser
(1)
buffer overflow
(1)
computer
(1)
connect
(1)
cookie
(1)
crack
(2)
db_connect
(1)
db_driver
(1)
db_load
(1)
ddos
(1)
debugging
(1)
defaced
(4)
Deprecated plugin
(1)
document
(1)
dos
(1)
errors
(1)
expl
(2)
exploit
(2)
game over
(1)
geek
(1)
geeky
(1)
generd
(1)
gov.my
(1)
GSM
(1)
hack
(2)
hacker
(1)
hacking
(1)
hacks
(2)
hitb
(1)
hobbyist
(1)
ihack
(1)
index
(1)
inject
(1)
injection
(1)
java
(1)
javascript
(1)
lfi
(2)
malaysia
(1)
meta
(1)
metasploit
(1)
microwave
(1)
mysql
(1)
nerd
(1)
nerdy
(1)
netstat
(1)
nmap
(1)
outbout
(1)
owned
(1)
packet
(2)
pass
(1)
password
(1)
pdos
(1)
psexec
(1)
pub
(1)
pwn
(1)
retrive
(1)
reveal
(1)
reverse
(1)
reverse shell
(1)
rfi
(2)
root
(1)
sarawak
(1)
security
(1)
SEH
(2)
session
(1)
shellcode
(1)
sibu
(1)
sniffing
(1)
sql
(1)
sqli
(1)
stack overflow
(1)
turk
(1)
user
(1)
vnc
(1)
web
(1)
which one
(1)
wideband
(1)
you
(1)
5pl017
Inj3ct0r.com
http://sec.jetlib.com/
Defacement-art-Underground-propaganda
Wireless hack,Wifi hack & security
Tuesday, September 22, 2009
Hacking case shows U.S. vulnerability to breaches
Compiled by fiz at 7:43 PM
Subscribe to:
Post Comments (Atom)
1 Comment:
I find it amazing how companies can know they face such huge costs in cases of serious hacking but do not adequately test their defenses. The size of the risk dramatically outweighs the potential costs of security.
Post a Comment