ALL >> Computers >> View Article
Investigators Make $1 Million Cyber-fraud Case Against Offenders
Investigators in a U.S have issued $1 million cyber-fraud case on 26 defendants. The defendants are accused of using stolen financial information such as credit card details to purchase merchandise from Apple stores. The charges were placed by district attorney in Manhattan. The accused allegedly purchased credit card information extracted from websites based in other countries by their peers in the crime world.
Cybercriminals generally create fake credit cards. The stolen credit card information is placed on the magnetic strips. The accused than recruited fake shoppers for using the fake credit cards at Apple stores based in New York, Oregon and Florida among others. The hired shoppers purchased iPad, iPod and other Apple products by using the fake credit card. Credit card fraud and identity theft are some of the major crimes committed by stealing sensitive personal information. Criminals place the actual name of the fake shoppers on the front of the fake card to avoid detection. Payment authorizations generally tally the details on the magnetic strip and do not match the name embossed on the credit card. The number ...
... of people affected by identity theft cases runs in several millions across the world. The growing number of cybercrime instances poses threat to information security of online shoppers.
Victims of credit card fraud and identity theft place several repercussions such as loss of money, opening of fake credit accounts on their name, loan default letters from financial institutions for credit taken by offenders, denial of credit, low credit scores, negative credit report and legal hurdles. Victims also suffer intangible losses such as emotional trauma and adverse reputation. Investigators have identified two cybercrime rings operated by Shaheed Bilal and Anthony Harper both aged 28 and based at Brooklyn.
User negligence, security flaws and programming errors results in breach of sensitive personal information from websites. Information security professionals must regularly scan the websites for flaws and threat vectors. Proactive security measures would ensure that vulnerabilities are mitigated prior to their exploitation by cybercriminals.
Organizations generally use ethical hacking to conduct in-depth security evaluation. In this case, the investigators found a cache of tools used for developing duplicate credit cards, cash worth $3,00,000 and even firearms and ammunitions from the raided houses. Cyber educated counter crime professionals, updated cybercrime laws and international cooperation is crucial to bring justice to offenders and control the growing menace of cybercrime
Add Comment
Computers Articles
1. How Telecom Custom Order Management Software Is Transforming Customer Experience In The Digital EraAuthor: Kevin
2. How To Launch A Successful Food Delivery App In Usa
Author: swizajoy
3. Flexible & Affordable Desktop Rental Solutions For Businesses | Renton Technologies
Author: Renton Technologies
4. Importance Of Good Identity And Access Management System In 2026
Author: adlerconway
5. What Is Vapt? Guide To The Introductory Vulnerability Assessment And Penetration Testing
Author: Lorcam Securities
6. Multi-path Cellular Aggregation In India: The Future Of Reliable Connectivity With Cellular Sd-wan
Author: SMOD
7. The Importance Of Pos And Billing Software For Modern Businesses
Author: Epos Direct India
8. Spark Matrix™: Yard Management System
Author: Umangp
9. Microsoft Teams Telephony Provider India | Voice Ai For Customer Experience | Viva
Author: Viva
10. Python Development & Software Engineering Services
Author: brainbell
11. Rugtek Pos Machine Troubleshooting Guide: Common Issues & Fixes
Author: prime pos
12. Wordpress Development Services For Scalable Websites 2026
Author: Web Panel Solutions
13. Need To Save Emails As Pdf? Try This Eml To Pdf Converter
Author: vSoftware
14. Remote Connectivity | Business Broadband Without Fibre India | Viva Digitally
Author: Viva
15. Spark Matrix™: Speech Analytics
Author: Umangp






