• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Black Market for ID Theft Has Strong U.S. Ties, Symantec Finds

    March 26, 2007 Alex Woodie

    Curious to know what your personally identifiable information could fetch on the black market? While it may be priceless to you, hackers, cyber criminals, and other ne’er-do-wells of the underground economy charge from $14 to $18 for a deluxe identity theft package that includes a U.S. bank account and credit card numbers, date of birth, and government issued identification number, whereas a valid credit card number could be had for as little as $1, according to Symantec‘s latest Internet Security Threat Report.

    Every six months or so, Symantec issues an Internet Security Threat Report that details the latest trends in online security. According to Volume XI of the series, released on Monday, instances of data theft, data leakage, and the release of malicious code for financial gain are all on the rise, making the Web a more dangerous place than it was six months ago, which should come as no great surprise.

    For the first time, Symantec provided a glimpse into an underground economy where stolen confidential information is sold for profit. The software giant found that, over the last six months of 2006, more than 50 percent of the world’s known “underground economy servers”–where criminals go to sell stolen identities–were located in the United States. The findings could put a damper on the commonly held belief that most identity theft rings are working out of Eastern Europe, Russia, or China. It’s actually right here, in our own backyards.

    Other notable findings include:

    • a 29 percent increase in the number of bot-infected computers around the world, to 6 million.
    • a 25 percent decrease in the number of “command-and-control” servers in charge of the bots, signaling that hackers are benefiting from server consolidation, too.
    • a 23 percent increase in the number of Trojans, which accounted for 45 out of every 50 malicious code samples, indicating a move away from mass-mailing worms toward Trojans.
    • a 12-fold increase in the number of zero-day exploits (there were 12 in the second half of 2006, but there was only one in the first six months).

    Now more than ever, businesses and consumers need to take steps to secure their data and prevent unauthorized access to their computers, says Arthur Wong, senior vice president of security response and managed services for Symantec. “As cyber criminals become increasingly malicious, they continue to evolve their attack methods to become more complex and sophisticated in order to prevent detection,” he says.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 12 -- March 26, 2007

    Sponsored by
    VISUAL LANSA 16 WEBINAR

    Trying to balance stability and agility in your IBM i environment?

    Join this webinar and explore Visual LANSA 16 – our enhanced professional low-code platform designed to help organizations running on IBM i evolve seamlessly for what’s next.

    🎙️VISUAL LANSA 16 WEBINAR

    Break Monolithic IBM i Applications and Unlock New Value

    Explore modernization without rewriting. Decouple monolithic applications and extend their value through integration with modern services, web frameworks, and cloud technologies.

    🗓️ July 10, 2025

    ⏰ 9 AM – 10 AM CDT (4 PM to 5 PM CEST)

    See the webinar schedule in your time zone

    Register to join the webinar now

    What to Expect

    • Get to know Visual LANSA 16, its core features, latest enhancements, and use cases
    • Understand how you can transition to a MACH-aligned architecture to enable faster innovation
    • Discover native REST APIs, WebView2 support, cloud-ready Azure licensing, and more to help transform and scale your IBM i applications

    Read more about V16 here.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Rexair Taps Quadrant to Improve Document Processing IBM and 3Com Unveil New Collaboration Solution for System i

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 12

This Issue Sponsored By

    Table of Contents

    • Financial Services Industry Spent the Most on Servers in 2006, Says Gartner
    • Fortran Creator, John Backus, Dies at 82
    • Magic Software Hires a New Chief Executive
    • Software Powerhouses Agree on SOA Standards Bodies
    • Black Market for ID Theft Has Strong U.S. Ties, Symantec Finds
    • Financial Services Industry Spent the Most on Servers in 2006, Says Gartner
    • As I See It: Workplace Heaven
    • IDC Chops Server Forecasts Thanks to Virtualization, Multicore Chips
    • Oracle Sues SAP Over ‘Corporate Theft on a Grand Scale’
    • IBM to Meet Upset WDSc Shops Half-Way on Features?

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Liam Allan Shares What’s Coming Next With Code For IBM i
    • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
    • VS Code Will Be The Heart Of The Modern IBM i Platform
    • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
    • IBM i PTF Guide, Volume 27, Number 25
    • Meet The Next Gen Of IBMers Helping To Build IBM i
    • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
    • Will Independent IBM i Clouds Survive PowerVS?
    • Now, IBM Is Jacking Up Hardware Maintenance Prices
    • IBM i PTF Guide, Volume 27, Number 24

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle