10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7) Click fraud: also called pay-per-click fraud –the practice <strong>of</strong> artificially inflating<br />

traffic statistics to defraud advertisers or websites that provide venues for advertisers.<br />

Click fraud is the subject <strong>of</strong> some controversy and increasing litigation due to the<br />

advertising networks being a key beneficiary <strong>of</strong> the fraud.<br />

8) Crackers: see definition <strong>of</strong> blackhat hackers.<br />

9) CVV2: is a three or four digit value that is uniquely derived for each credit card<br />

and is found at the back <strong>of</strong> the card. It is a new authentication procedure established by<br />

credit card companies to further efforts towards reducing fraud for internet transactions,<br />

since it attempts to verify to the merchant that the cardholder does in fact have the card<br />

in his or her possession.<br />

10) DDoS: abbreviation for Distributed Denial <strong>of</strong> Service. This is an attack in which<br />

thousands <strong>of</strong> separate computers, which are usually part <strong>of</strong> a botnet, bombard a target<br />

with bogus data to knock it <strong>of</strong>f the net. DDoS attacks have been used by extortionists<br />

who threaten to knock a site <strong>of</strong>fline unless a hefty ransom is paid.<br />

11) Drop services: online money laundry service, where someone sets up<br />

anonymous mailboxes and has people send goods purchased with stolen card details for<br />

a certain fee, and then ship it <strong>of</strong>f to the customer.<br />

12) Exploit: a bug or vulnerability in s<strong>of</strong>tware that malicious hackers use to<br />

compromise a computer or network. Exploit code is the snippet <strong>of</strong> programming that<br />

actually does the work <strong>of</strong> penetrating via this loophole.<br />

13) Fast flux: is a technique used by botnets to hide phishing and malware delivery<br />

sites behind an ever-changing network <strong>of</strong> compromised hosts acting as proxies. This<br />

sophisticated technique is used to hide the location <strong>of</strong> criminal servers, complicating the<br />

process <strong>of</strong> tracking them down. The Storm worm is one <strong>of</strong> the recent malware variants<br />

to make use <strong>of</strong> this technique.<br />

Page 93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!