ALL >> Computers >> View Article
Hacker Indicted For Stealing Funds. Ethical Hackers May Detect Flaws And Improve Security

Off late, cybercrime has become a recurring occurrence. Hackers identify the security lapses in computer usage, software upgrades and network infrastructure to gain unauthorized access, steal confidential information and installing malicious malware. The sensitive information may include user name and passwords, credit card numbers, social security numbers and contact details and privileged company information among many others. Cybercriminals use the information obtained for their own benefit or sell them to underground peers or third parties. Recently, a federal court indicted a person on charges of unauthorized access and wire fraud. Lack of is one of the common factors responsible for negligent attitude towards security among employees.
The offence was reportedly committed by a person named Jeremey Parker by hacking the computer network of SWReg., Inc, a subsidiary of Digital River, Inc. maintains the royalty payments due to software developers on behalf of payments due to the parent company. Software developers have the facility to log in and check their royalty balances, request check payments and payment transfers ...
... to their bank or paypal accounts. Parker reportedly gained unauthorized access to one of the systems of SWReg. and transferred around $2,74,000 to his account. Usually, organizations recruit ethical hackers to identify and mitigate vulnerabilities and security gaps in the IT security apparatus. In this case, the offender now faces a maximum prison term of 20 years for unauthorized access and 10 year for hacking.
Rising threat profile in the cyberspace makes it inevitable for organizations to increase their IT security budget. However, many small and medium sized organizations find it difficult to upgrade their IT security infrastructure in tune with the changes in the threat scenario. Such organizations can devise an IT policy, which facilitates compliance of regulatory requirements and then allows self paced upgrade to the meet the challenges of Internet-crime.
Add Comment
Computers Articles
1. Scraping Dan Murphys Liquor Products Details DataAuthor: FoodDataScrape
2. Blue Wizard Liquid Drops 30 Ml 2 Bottles Price In Lahore
Author: bluewizard.pk
3. How Does Blockchain Resolve Data Privacy And Security Issues For Businesses?
Author: Severus Snape
4. Scrape Quick-commerce Data From Deliveroo Hop Uae
Author: FoodDataScrape
5. Web Scraping Quick-commerce Data From Noon Minutes Uae
Author: FoodDataScrape
6. Helical Insight: Best Open Source Data Visualization Tool In 2025
Author: Vhelical
7. Scrape Top Selling Grocery Product Data From Walmart Usa
Author: FoodDataScrape
8. Extract Quick Commerce Data From Flipkart Minutes
Author: FoodDataScrape
9. Refurbished Laptop Scams And How To Safely Buy A Trusted Device
Author: Sujtha
10. Web Scraping Freshco Supermarket Product Data In Canada
Author: FoodDataScrape
11. How To Compare Two Lists In Excel​: A Definitive Guide For Data Professionals
Author: blackjack
12. Monthly Updated Uber Eats Menu Dataset For 500k+ Restaurants
Author: FoodDataScrape
13. Extract Mcdonalds Store Locations Data In Usa For Competitiveness
Author: FoodDataScrape
14. Scrape Spicy Food Trend Data In Usa 2025 For Competitive Advantage
Author: FoodDataScrape
15. Why Startups Should Invest In Custom Software Development Service
Author: Albert