Dealing with Account Take Over? Here are my top tips (O’Reilly post)

创业投资 2013-10-30

Online payments and eCommerce have been targets for fraud ever since their inception. The availability of real monetary value coupled with the ability to scale an attack online attracted many users to fraud in order to make a quick buck. At first, fraudsters used stolen credit card details to make purchases online. As services became more widely used, a newer, sometimes easier alternative emerged: account takeover.

Account takeover (ATO) occurs when one user guesses, or has been given, the credentials to another’s value storing account. This can be your online wallet, but also your social networking profile or gaming account. The perpetrator is often someone you don’t know, but it can just as easily be your kid using an account you didn’t log out of. All fall under various flavors of ATO, and are easier than stealing one’s identity; all that’s needed is guessing or phishing a user’s credentials and you’re rewarded with all the value they’ve been able to create through their activity.

Read more on O’Reilly’s programming blog here
.

您可能感兴趣的

Blueprints Make It Easy To Make (Some) Alexa Skill... If you can code, you can create an Alexa skill — the programs that allow an Amazon Echo or similar device interact with you. What if you can’t code o...
Donkey code This is an attempt to write down a very simple example I’ve been using to explain the profound impact the language we use has on thought, discussion a...
A Conceptual Breakdown of PID Controllers Introduction There are many explanations of how a PID works, many of them fantastic. The main issue comes down to how it is expla...
写着玩之内存池 话说最近很长一段时间都是在看别人的代码和改别人的代码比较多,自己从头开始写东西好像已经是很久前才有过的事情了。改 TensorFlow 的过程中也学到不少东西,准备平时想到啥了就随便写着玩。 内存池简单地讲就是我自己首先用 malloc 向系统申请一大块内存,然后接下来再用到内存的时候手...
Your Ultimate Guide to Corporate Jargon In this somewhat satirical bonus Junior Dev Diaries post, I want to cover office/tech/workplace jargon and terms. Most of these were completely ne...