Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Concepts for Digital World
Group Power Point
Group Members: Peter(Pyunghwa Park),
Peter Nguyen

  • you all must be careful as this itself is not even legal. however, you have to be extremely careful as most of the hackers are not true hackers or not even as good as they have projected themselves. so far so good i have recommended 5 people to hacktfied and they comfirmed their excellence. visit the website ; or contact them via email.
    Are you sure you want to  Yes  No
    Your message goes here
  • vry gud presentation
    Are you sure you want to  Yes  No
    Your message goes here


  1. 1. Cybercrime: Bank Hacking<br />Presenters: Peter (Pyunghwa) Park & Peter Nguyen<br />
  2. 2. Table of Contents<br />Introduction<br />Famous bank cybercrimes<br />How to hack the bank<br />Prevention methods<br />Summary<br />References<br />(1)<br />
  3. 3. Introduction<br />Cyber crime has been a problem as early as the late 1970's. With the ever-changing technology, cyber crime offenders are keeping up with new ways to attack possible Internet victims. <br />Types of cyber crime include identity theft, credit card fraud, and phishing. Many types of cyber-crimes happen often through everyday emails, or in chat-rooms. Other types of cyber-crimes also involve software pirating, downloading illegal music files, and stealing money from banks by breaking into online websites<br />Throughout history, cybercrimes have changed and evolved to break-through more complex security systems.<br />
  4. 4. One of the First Bank Cybercrime<br />One of the first bank cybercrimes was in 1988.<br />Seven members planned to steal from the First National Bank of Chicago<br />They decided to transfers funds from the Chicago Bank to a bank in New York then to two other banks in Vienna, Italy.<br />Transfers were authorized over the telephone and follow-up calls were made to verify the requests.<br />The total sum of money attempted to be stolen was $70 million<br />The calls were further investigated and rooted back to one of the suspects. The criminals were found out and got caught. <br />
  5. 5. Famous Cybercrime: Nordea<br />Swedish bank Nordea was hit with possibly the biggest internet fraud in history<br />£600 000 (1 million USD) was stolen in three months from 250 customer accounts<br />They obtained the account information through a anti-spam software sent by emails<br />(2)<br />
  6. 6. Selling Personal Information<br />Alberto Gonzalez, 28, from Miami, and two unnamed computer hackers, based near Russia, targeted 7-Eleven and other large corporations by uploading millions of customers' details <br />They breached the firewall of Heartland Payment Systems, a New Jersey-based bank card payment processor, stealing 130 million credit card numbers. They stole 4.2 million card details from Hannaford Brothers. <br />They men started in 2006, scouting potential victims by visiting retail stores to identify payment processing systems and their vulnerabilities<br />
  7. 7. Selling Personal Information<br />They used malicious software known as malware and so-called injection strings to attack the computers and steal data.<br />The suspects planned to sell the data to others who would use it to make purchases. <br />They tried to trade their wares with computers in New Jersey, California, Illinois, Latvia, Ukraine and the Netherlands using "sophisticated hacker techniques to cover their tracks and to avoid detection by anti-virus software used by their victims<br />"The scheme is believed to constitute the largest hacking and identity theft case ever prosecuted by the US Department of Justice," <br />(3)<br />
  8. 8. How to hack the Bank<br />1.E-mail: Most commonly used worldwide to access personal account information. E-mails are sent by the hackers, usually containing a program. <br />(4)<br />
  9. 9. How to hack the Bank<br />2.Virus(Trojan): Through the spam mails or pop-ups from websites. A software, containing a virus installs to your computer. Once the program is activated, it will monitor personal account number and password when users log on to their online banking, enabling hackers to transfer the money from accounts.<br />
  10. 10. How to hack the Bank<br />3.Insider: If there is a insider at the bank, who has access to customer information, hackers can learn how to bypass the bank’s firewall(security system).<br />It is almost impossible to hack the big banks without the insider.<br />(5)<br />
  11. 11. Ways to Protect & Prevent<br />1.Check you bank’s security policies and its policies for covering losses due to fraud.<br />2.Change your passwords often.<br />3.Keep separate accounts for personal and business account.(have different password too)<br />4.Report and complain anything unusual.<br />5.Cover your PIN when using ATM.<br />
  12. 12. References (Pictures)<br />(1)<br />(2)<br />(3)<br />(4)<br />(5)<br />
  13. 13. References<br /><br /><br /><br /><br /><br />