Home » » Hacker perforated Bank 100 Billion Be Over Security Consultants

Hacker perforated Bank 100 Billion Be Over Security Consultants

Written By Unknown on Wednesday, 1 April 2009 | 06:15


Owen Thor Walker, New Zealand hacker origin, be present as a cyber security consultant by TelstraClear, the second-largest telecommunications company in the country. TelstraClear is the son of Australia's largest telecommunications company, Telstra.

"We believe Walker has the ability to assist senior executives and customers understand the security threats that can attack their network," said TelstraClear spokesman Chris Mirams to the National Radio in Wellington, Wednesday 25 March 2009.





Years ago, Walker sued over data success penetrate 1.3 million computers around the world. Hacker by the name of this fictitious AKILL also damage the computer system and go through a number of bank accounts and steal more money from Rp 132.4 billion. At that time, the new Walker aged 18.

Not surprisingly, when he became the target crimes division of the Internet Bureau investigators from the United States (U.S.), FBI. The AKILL is dangerous to the user's computer in the U.S. and Europe.

In front of the judge, the court in the city of Hamilton, New Zealand, he pleaded guilty on six criminal indictment internet. The judge at that time only impose penalties and fines to the Walker prohibit the criminal use a computer.

However, a group helping with the Walker pay fines and return the money so that they can claim on Walker revoked and youth is released.

Mirams said Walker had some counseling and providing advice to managers and security staff TelstraClear. Walker also participated in the program ad TelstraClear.

"Walker tells what are the cyber criminals and how to fortify their networks from threats that," said Mirams.

Some of the many hackers send electronic mail to the company's computer system or the government so that the excess capacity of the mailbox and enter the system.

Hacker techniques use other botnet, which is trying the computer and combine hundreds of computers in a kluster that have centralized control.

Then the hacker can use a combination of the computer to steal credit card information, manipulate stock trading, computer systems and destroy an industry.
Share this article :

0 komentar:

Post a Comment

 
Support : Indonesia Military Blog | World Military Blog |
Copyright © 2014. Indonesia Blogger - All Rights Reserved
Template Created by Mas Template
Proudly powered by Blogger