This topic contains a solution. Click here to go to the answer

Author Question: Explain how hackers use information stolen from data breaches for credit card forgery. What will ... (Read 25 times)

anjilletteb

  • Hero Member
  • *****
  • Posts: 569
Explain how hackers use information stolen from data breaches for credit card forgery.
 
  What will be an ideal response?

Question 2

What are patches and service packs?
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

memslove

  • Sr. Member
  • ****
  • Posts: 321
Answer to Question 1

Over 67 percent of data breaches come from hackers trying to make money. Hackers
are primarily looking for personally identifiable information (PII), or data that can be used to
identify a person. This includes names, addresses, dates of birth, social security numbers, credit
card numbers, health records, bank account numbers, personal identification numbers, and email
addresses. Stolen information is commonly used for credit card fraud. Stolen credit card
information is validated through a process called carding, where a small charge is placed on the
card to ensure it is working. Valid cards are then bundled and sold on the black market. The price
of stolen credit cards can run from 2 to 45 per card, depending on the type of account. Stolen
data is commonly used for identity theft, extortion, and industrial espionage.

Answer to Question 2

Patches are group fixes for high priority failures that can be applied to all copies of a
given product. Software vendors supply patches to fix security and other critical problems. They
usually bundle fixes of low-priority problems into larger groups called service packs. Users
apply service packs in much the same way that they apply patches, except that service packs
typically involve fixes to hundreds or thousands of problems.




anjilletteb

  • Member
  • Posts: 569
Reply 2 on: Jul 7, 2018
Great answer, keep it coming :)


kthug

  • Member
  • Posts: 332
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

In most cases, kidneys can recover from almost complete loss of function, such as in acute kidney (renal) failure.

Did you know?

Cocaine was isolated in 1860 and first used as a local anesthetic in 1884. Its first clinical use was by Sigmund Freud to wean a patient from morphine addiction. The fictional character Sherlock Holmes was supposed to be addicted to cocaine by injection.

Did you know?

The human body's pharmacokinetics are quite varied. Our hair holds onto drugs longer than our urine, blood, or saliva. For example, alcohol can be detected in the hair for up to 90 days after it was consumed. The same is true for marijuana, cocaine, ecstasy, heroin, methamphetamine, and nicotine.

Did you know?

During pregnancy, a woman is more likely to experience bleeding gums and nosebleeds caused by hormonal changes that increase blood flow to the mouth and nose.

Did you know?

According to the National Institute of Environmental Health Sciences, lung disease is the third leading killer in the United States, responsible for one in seven deaths. It is the leading cause of death among infants under the age of one year.

For a complete list of videos, visit our video library