Computing Reviews

Hack for hire
Mirian A. Communications of the ACM62(12):32-37,2019.Type:Article
Date Reviewed: 02/27/20

Attackers continue to seek account numbers and password information in order to compromise the bank and credit card accounts of customers. Understanding how hackers obtain user information can help enterprises install adequate security measures and save millions of dollars. But how should organizations identify black markets to minimize financial damage control?

In an effort to recommend effective security measures for today’s interconnected worldwide online transaction industries, this insightful paper outlines the characteristics for identifying hired hackers in online business transactions.

Mirian presents compelling online fraud data to chronicle how hijackers (1) use complex phishing attacks against enterprises lacking a universal 2nd factor (U2F) mechanism, and (2) search through internationally marketed media to identify victims.

The author discusses the executed fraud investigations of numerous email account services, specifically Google accounts, to gain insights into the characteristics of hijacking attackers. Can keywords in different languages be used for hacking services? How do hackers strategically use false positive user identities to select and buy merchandise? How do hackers lure victims into phishing and dubious online activities?

Consequently, Mirian convincingly presents some strategies for identifying attacker behaviors and educating online shoppers. “It takes a thief to catch a thief” is an excellent caption for this great practice paper.

Reviewer:  Amos Olagunju Review #: CR146909 (2008-0204)

Reproduction in whole or in part without permission is prohibited.   Copyright 2024 ComputingReviews.com™
Terms of Use
| Privacy Policy