lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri May 26 17:38:48 2006
From: phishing at securescience.net (Lance James)
Subject: Re: [General-discussion] Graph analysis of
	stolen credit cards

James Eaton-Lee wrote:
> On Fri, 2006-05-26 at 12:49 +0100, James Eaton-Lee wrote:
>   
>> On Fri, 2006-05-26 at 10:22 +0100, Justin Mason wrote:
>>     
>>> (volume of accounts in thousands).   However that's from 7 years
>>> ago :(
>>>
>>> There may be more recent figures but a quick google can't find 'em.  
>>>       
>> Wikipedia has some good ones on the 'Bank' page:
>>     
>
> And the link, since I'm evidently twitchy about hitting 'send' today..
>
> http://en.wikipedia.org/wiki/Bank#Bank_Size_Information
>
> I'm actually interested as to the source of the original data - since
> these are cards stolen "by one carding forum", how representative are
> they of card theft globally..
>
>   
What we're seeing in malware is scary for sure, we've uncovered over 2
million cards with the trojan data we monitor in the last 6 months. I
would say that 21,000 is a conservative and not fully discovered number
by one group, but what it does tell you is the minimum amount a group
may be uncovering.

>  - James.
>
>   


-- 
Best Regards,
Lance James
Secure Science Corporation
www.securescience.net
Author of 'Phishing Exposed'
http://securescience.net/home/news/phishingexposed.html
**********************************************
* New IntelliFound Service 2 weeks free	     *
* Real-Time Identity Surveillance Service    *
* https://slam.securescience.com/signup.cgi  *
**********************************************

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ