{"id":286,"date":"2005-06-22T16:18:58","date_gmt":"2005-06-22T09:18:58","guid":{"rendered":""},"modified":"2005-06-22T16:18:58","modified_gmt":"2005-06-22T09:18:58","slug":"hackers-score-big-by-thinking-small","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2005\/06\/hackers-score-big-by-thinking-small\/","title":{"rendered":"Hackers Score Big by Thinking Small"},"content":{"rendered":"<p>A recent computer security breach that left 40 million credit cards vulnerable to fraud shows how online criminals are scoring big by thinking small, experts said on Monday. ADVERTISEMENT<\/p>\n<p>Cybercriminals are increasingly crafting more focused attacks with a potential for profit as they target one or two companies at a time, rather than blasting out Internet virus attacks across the globe, according to security experts.<!--more--><\/p>\n<p>The payoffs can be enormous. MasterCard International said on Friday that an outsider gained access to as many as 40 million credit and debit cards from CardSystems Solutions Inc., a payment processor. A MasterCard spokeswoman said on Monday that the attacker had placed a malicious computer script on CardSystems computers.<\/p>\n<p>In Israel, police are investigating a massive case of industrial espionage that used a &#8220;Trojan horse&#8221; computer program to copy confidential information from some of the country&#8217;s top businesses.<\/p>\n<p>Security vendors say such attacks are increasingly common.<\/p>\n<p>&#8220;We have seen several examples of targeted, manually crafted Trojans that people write and implement for a very small number of companies,&#8221; said Aladdin Security Vice President Shimon Gruper.<\/p>\n<p>more from [url=http:\/\/www.eweek.com\/article2\/0,1759,1829860,00.asp?kc=EWRSS03119TX1K0000594]eWeek[\/url]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers Score Big by Thinking Small<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-286","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-4C","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=286"}],"version-history":[{"count":0,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/286\/revisions"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}