Bank hackers steal 100 billion dollars more ( walker )

Written By POLDA METRO JAYA on Tuesday, February 16, 2010 | 6:27 AM

Neonnews - Owen Thor Walker, a hacker from New Zealand, is now employed as a cyber security consultant by TelstraClear, the second largest telecommunications company in the country. TelstraClear is a subsidiary of Australia's largest telecommunications, Telstra.
"We believe that Walker has the ability to assist senior executives and customers understand the security threats that can attack their networks," said TelstraClear spokesman Chris Mirams to the National Radio in Wellington.
Last year, Walker sued for success through the data on 1.4 million computers worldwide. Hacker with the pseudonym AKILL also proved damaging computer systems and burst into a bank account and steal funds more than $ 137.4 billion. At that time, Walker was only 18 years old.
No wonder, when he became target of internet crimes division officer of the Bureau of Investigation United States (U.S.), the FBI. The reason is disturbing AKILL computer users in the U.S. and Europe.
In front of the magistrate court in the city of Hamilton, New Zealand, he pleaded guilty to six charges of Internet crimes. The judge then sentenced only penalty to convict Walker and prohibits using a computer.
However, a group helping Walker with pay fines and return money they earn, so the demands on young Walker was revoked and released.
Mirams said Walker has held several counseling and providing advice to managers and security staff TelstraClear. Walker also participated in the advertising program TelstraClear.
"Walker told what cyber criminals pursue and how to fortify their networks from threats that," said Mirams.
Some hackers send electronic mail to many computer systems companies or governments that exceed the capacity of incoming mail box and destroy the system.
Another hacker botnet techniques, namely trying to control hundreds of computers and computers combined in a cluster that has a centralized control.
Then the hacker can use a combination of computers to steal credit card information, manipulate stock trading, and destroy computer systems of an industry.

0 comments:

Post a Comment

Popular Posts Today