Base Technologies 5By Baselinemag | Posted 2005-03-07 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
Online crime doesn't take many tools.
It doesn't take much to get an organized cybercrime ring going. Below is a list of technologies that the U.S. Secret Service and security experts say have been used by the Shadowcrew and similar organizations to buy and sell stolen credit, debit and identification cards.
Source: Criminal complaint against Shadowcrew members filed in U.S. District Court in Newark, N.J.; Watchfire.