Hackers have their own
Hackers have successfully developed their own encrypted instant messaging (IM) software to avoid the eye
Hackers have successfully developed their own encrypted instant messaging (IM) software to avoid the "curious" eyes of legal guardians.
The application called CarderIM is actually a very complicated tool and is often used by hackers to sell information such as a credit card number or a stolen email address. Now this tool has become a part of the underground economy.
It is confirmed by Andrew Moloney - Director of Financial Services Business of RSA - in a speech at the International Crime Conference held in London (UK) yesterday (March 28).
CarderIM is a clear proof for the attempt to cover up the dark behavior of hackers. Hackers have now begun to invest in developing their own tools.
CarderIM's logo is almost identical to the logo of the famous card payment organization MasterCard International. The name CarderIM comes from a hacker money laundering action called "carding". This is the act of turning the credit card information they steal into real money or goods.
There is no clear level of CarderIM's popularity among hackers. However, Mr. Moloney said this application seems to be relatively limited use. Performing a search on Google only detects a few links that are not relevant to the application. It is not easy to find a copy of CarderIM.
In his speech, Moloney also showed a screenshot of CarderIM advertisement. It seems that this application uses a server-wide encryption solution and does not allow any conversations to be recorded.
" Only hackers know what they are saying and hearing ."
Hoang Dung
- The world of thieves
- Warning about new ways of operating hackers
- Hackers spread malicious code to attack Winamp
- Users are the central target of hackers
- About hackers and security hackers point to Vista
- Women watch out for 'sensitive' photo theft from e-mail accounts
- Secrets of Korean hackers
- Hackers can steal user information from ... brain waves
- Hackers can control aircraft from computers
- Hackers take advantage of Wikipedia to spread Blaster
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system