• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Black Market for ID Theft Has Strong U.S. Ties, Symantec Finds

    March 26, 2007 Alex Woodie

    Curious to know what your personally identifiable information could fetch on the black market? While it may be priceless to you, hackers, cyber criminals, and other ne’er-do-wells of the underground economy charge from $14 to $18 for a deluxe identity theft package that includes a U.S. bank account and credit card numbers, date of birth, and government issued identification number, whereas a valid credit card number could be had for as little as $1, according to Symantec‘s latest Internet Security Threat Report.

    Every six months or so, Symantec issues an Internet Security Threat Report that details the latest trends in online security. According to Volume XI of the series, released on Monday, instances of data theft, data leakage, and the release of malicious code for financial gain are all on the rise, making the Web a more dangerous place than it was six months ago, which should come as no great surprise.

    For the first time, Symantec provided a glimpse into an underground economy where stolen confidential information is sold for profit. The software giant found that, over the last six months of 2006, more than 50 percent of the world’s known “underground economy servers”–where criminals go to sell stolen identities–were located in the United States. The findings could put a damper on the commonly held belief that most identity theft rings are working out of Eastern Europe, Russia, or China. It’s actually right here, in our own backyards.

    Other notable findings include:

    • a 29 percent increase in the number of bot-infected computers around the world, to 6 million.
    • a 25 percent decrease in the number of “command-and-control” servers in charge of the bots, signaling that hackers are benefiting from server consolidation, too.
    • a 23 percent increase in the number of Trojans, which accounted for 45 out of every 50 malicious code samples, indicating a move away from mass-mailing worms toward Trojans.
    • a 12-fold increase in the number of zero-day exploits (there were 12 in the second half of 2006, but there was only one in the first six months).

    Now more than ever, businesses and consumers need to take steps to secure their data and prevent unauthorized access to their computers, says Arthur Wong, senior vice president of security response and managed services for Symantec. “As cyber criminals become increasingly malicious, they continue to evolve their attack methods to become more complex and sophisticated in order to prevent detection,” he says.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 12 -- March 26, 2007

    Sponsored by
    ARCAD Software

    [Live Webinar] Rewrite your Synon in Java? It could be… a mistake!

    Converting from Synon CA 2E to a modern language? There are many good reasons to take this step. Beyond the critical shortage of Synon skills, applications developed in this 4GL environment can no longer take advantage of key technology advances in the IBM i operating system. And though a leader in its day, the Synon CASE tool is incompatible with modern DevOps practices and concurrent development.

    Do you think the best way to move away from Synon CA 2E is by rewriting everything in Java?

    Think again. A full rewrite is risky, expensive, and slow — often leading to years of redevelopment and countless functional regressions.

    Join Philippe Magne, CEO of ARCAD Software and Ray Bernardi, senior solution architect to learn why a conversion to Free Form RPG is a risk-free and high-performance option that leverages the architecture of the original Synon application – retaining all the reliability and security advantages of the host platform.

    In our Webinar, we will share a secure, automated migration path for business applications developed in Synon CA 2E:

    • 100% automated conversion to modern Free Form RPG and DDL (SQL)
    • Guaranteed conversion accuracy with test automation process
    • Possible modernization of the user interface during the project
    • Risk free, fixed price Modernization as a Service (MaaS)
    • Modern full DevOps framework for delivery

    Leverage the competitive advantage within your Synon application.

    Register Today!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Rexair Taps Quadrant to Improve Document Processing IBM and 3Com Unveil New Collaboration Solution for System i

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 12

This Issue Sponsored By

    Table of Contents

    • Financial Services Industry Spent the Most on Servers in 2006, Says Gartner
    • Fortran Creator, John Backus, Dies at 82
    • Magic Software Hires a New Chief Executive
    • Software Powerhouses Agree on SOA Standards Bodies
    • Black Market for ID Theft Has Strong U.S. Ties, Symantec Finds
    • Financial Services Industry Spent the Most on Servers in 2006, Says Gartner
    • As I See It: Workplace Heaven
    • IDC Chops Server Forecasts Thanks to Virtualization, Multicore Chips
    • Oracle Sues SAP Over ‘Corporate Theft on a Grand Scale’
    • IBM to Meet Upset WDSc Shops Half-Way on Features?

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Stacking Up Power10 And Power11 Systems Price/Performance
    • Where Infor Is Headed With Its ERPs For IBM i
    • Rocket Delivers More DevOps Capabilities For IBM i
    • A Few More Power Systems Announcements Before Year End
    • IBM i PTF Guide, Volume 27, Number 46
    • Bang For The Buck On Entry Power10 And Power11 Machines
    • A Hardware Refresh Is The Perfect Time To Re-Evaluate Your HA/DR Strategy
    • Fresche Taps AI For New RPG-To-Java Conversion Tool
    • Gartner Raises 2025 IT Spending Forecast, Puts Out 2026 Prediction
    • IBM i PTF Guide, Volume 27, Number 45

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle