This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.
With increasingly sophisticated attacks and rising internal data theft, database security merits a stronger focus that goes beyond traditional authentication, authorization, and access control. Learn how to secure your database - Read this strategy guide.
With fraud growing in volume and complexity worldwide, Westpac New Zealand sought to become more proactive in identifying risks and protecting its customers. Read this case study to discover how Westpac is able to stay one step ahead of threats and with the intelligence and flexibility it gained with the new fraud solution has dramatically improved the bank’s ability to identify—and ultimately neutralize—new fraud schemes as they emerge.
Copyright 2013 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.