ALL >> Computers >> View Article
Investigators Make $1 Million Cyber-fraud Case Against Offenders
Investigators in a U.S have issued $1 million cyber-fraud case on 26 defendants. The defendants are accused of using stolen financial information such as credit card details to purchase merchandise from Apple stores. The charges were placed by district attorney in Manhattan. The accused allegedly purchased credit card information extracted from websites based in other countries by their peers in the crime world.
Cybercriminals generally create fake credit cards. The stolen credit card information is placed on the magnetic strips. The accused than recruited fake shoppers for using the fake credit cards at Apple stores based in New York, Oregon and Florida among others. The hired shoppers purchased iPad, iPod and other Apple products by using the fake credit card. Credit card fraud and identity theft are some of the major crimes committed by stealing sensitive personal information. Criminals place the actual name of the fake shoppers on the front of the fake card to avoid detection. Payment authorizations generally tally the details on the magnetic strip and do not match the name embossed on the credit card. The number ...
... of people affected by identity theft cases runs in several millions across the world. The growing number of cybercrime instances poses threat to information security of online shoppers.
Victims of credit card fraud and identity theft place several repercussions such as loss of money, opening of fake credit accounts on their name, loan default letters from financial institutions for credit taken by offenders, denial of credit, low credit scores, negative credit report and legal hurdles. Victims also suffer intangible losses such as emotional trauma and adverse reputation. Investigators have identified two cybercrime rings operated by Shaheed Bilal and Anthony Harper both aged 28 and based at Brooklyn.
User negligence, security flaws and programming errors results in breach of sensitive personal information from websites. Information security professionals must regularly scan the websites for flaws and threat vectors. Proactive security measures would ensure that vulnerabilities are mitigated prior to their exploitation by cybercriminals.
Organizations generally use ethical hacking to conduct in-depth security evaluation. In this case, the investigators found a cache of tools used for developing duplicate credit cards, cash worth $3,00,000 and even firearms and ammunitions from the raided houses. Cyber educated counter crime professionals, updated cybercrime laws and international cooperation is crucial to bring justice to offenders and control the growing menace of cybercrime
Add Comment
Computers Articles
1. Exploring How Ai In The Cloud Can Transform Your BusinessAuthor: TechDogs
2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs
3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot
4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi
5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown
6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller
7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute
8. Top 7 Advantages Of React Js
Author: Bella Stone
9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone
10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD
11. Top 10 Healthcare Technology Trends
Author: goodcoders
12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith
13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press
14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.
15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA