123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Hacker Indicted For Stealing Funds. Ethical Hackers May Detect Flaws And Improve Security

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Off late, cybercrime has become a recurring occurrence. Hackers identify the security lapses in computer usage, software upgrades and network infrastructure to gain unauthorized access, steal confidential information and installing malicious malware. The sensitive information may include user name and passwords, credit card numbers, social security numbers and contact details and privileged company information among many others. Cybercriminals use the information obtained for their own benefit or sell them to underground peers or third parties. Recently, a federal court indicted a person on charges of unauthorized access and wire fraud. Lack of is one of the common factors responsible for negligent attitude towards security among employees.

The offence was reportedly committed by a person named Jeremey Parker by hacking the computer network of SWReg., Inc, a subsidiary of Digital River, Inc. maintains the royalty payments due to software developers on behalf of payments due to the parent company. Software developers have the facility to log in and check their royalty balances, request check payments and payment transfers ...
... to their bank or paypal accounts. Parker reportedly gained unauthorized access to one of the systems of SWReg. and transferred around $2,74,000 to his account. Usually, organizations recruit ethical hackers to identify and mitigate vulnerabilities and security gaps in the IT security apparatus. In this case, the offender now faces a maximum prison term of 20 years for unauthorized access and 10 year for hacking.

Rising threat profile in the cyberspace makes it inevitable for organizations to increase their IT security budget. However, many small and medium sized organizations find it difficult to upgrade their IT security infrastructure in tune with the changes in the threat scenario. Such organizations can devise an IT policy, which facilitates compliance of regulatory requirements and then allows self paced upgrade to the meet the challenges of Internet-crime.

Total Views: 402Word Count: 305See All articles From Author

Add Comment

Computers Articles

1. Copilot For Dynamics 365 Field Service
Author: brainbell10

2. Dynamics 365 Field Service Capabilities
Author: brainbell10

3. Why Access Reviews Don’t Fail During Certification — They Fail After
Author: Soham Biswas

4. Trusted Caluanie Muelear Oxidize Manufacturer For Industrial Needs
Author: Roteschemie

5. Why Businesses Struggle With Fragmented Apps And How Full Stack App Development Fixes It
Author: david

6. Live Betting Data Monitoring From 1xbet
Author: Actowiz Metrics

7. Reliable Wholesale Caluanie Muelear Oxidize Supply With Uctr-gmbh
Author: UCTR-gmbh

8. Custom Crm Development Services For Businesses Struggling With Disconnected Workflows
Author: david

9. The Power Of Gis Mapping And Expert Drafting In Modern Telecom Network Deployment
Author: Itech Lance

10. Dynamics 365 Omnichannel For Customer Service
Author: brainbell10

11. Modernize Your Legacy Systems With Expert Visual Foxpro Migration Services By Tech Gazebos
Author: Tech Gazebos

12. Dynamics 365 Sales Is Important For Sales Teams
Author: brainbell10

13. Spark Matrix™: Workforce Iam
Author: Umangp

14. Mcdonald’s And Netflix Turn K-pop Fandom Into A Flavor-packed Battle Experience
Author: Md. Shakil Hasan

15. Find Epson Printer Dealers In Hyderabad Easily
Author: prime pos

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: