loading

ITA TOUCH is a leading interactive flat panel and smart board manufacturer in China

how cyber crime went professional - where can i buy a document camera

how cyber crime went professional  -  where can i buy a document camera

When Russian and Georgian soldiers threw explosive shells at each other, both sides of the South Ossetia conflict were also using the latest cyberattacks, using techniques honed by professional gangsters specializing in cybercrime.
While these attacks are largely untraceable, both sides are firmly pointing to each other.
Russia reported that Georgian hackers had destroyed the site of the South Ossetia government.
But Georgian institutions, including government departments and the National Bank, have also suffered a series of attacks.
The Georgian Foreign Ministry posted all the news on Poland's presidential website after president Mikhail saakashili's web page was replaced by photos of Adolfo Hitler.
Meanwhile, it is reported that the Russian-Russian news agency website is being locked and crashed.
This tactic is not just a political weapon.
The opening of the Beijing Olympics last week triggered a series of malicious Internet activities.
Some are relatively non-differentiated.
Using malware embedded on innocent websites, which are often news agencies that have an audience due to sports reports that infect visitors computers.
Some are more complicated.
Security company MessageLabs found a false email sent to at least 19 national sports organizations that allegedly had information about the Olympic media program, but actually, it carries a Trojan horse, controls the PC, and scans all files and networks to steal information.
Hacking, once a protected area for technology
Smart teenagers show off and become big business.
According to some estimates, organized crime accounts for the highest proportion of global GDP, and cyber crime is the fastest --
Part of it.
The attack became more precise as the perpetrators became more experienced.
"Targeted attacks against specific high-level groups have increased
Value information, whether it's a director of a company and its individual pension investment, or an attack company network that tries to acquire intellectual property (IP)
"Withdraw from the organization and move it to the developing world," said Chris Porter, partner at PricewaterhouseCoopers, a consulting firm.
The term cyber crime covers many sins.
Spyware can be embedded in the end user's computer using spam campaigns and infected web pages-
Monitor the keystrokes and steal anything from a single credit card detail to a lot of company data.
Alternatively, they can be used to recruit computers into a "botnet", a network of hijacked computers that can be used to launch more spam or to participate in a denial of service attackDoS)
The target is a website, bombing it with traffic until it crashes.
This is the case with the cyberwar in South Ossetia.
Graham Cluley, a senior consultant at security firm Sophos, explained: "The computers in Aunt Ethel's bedroom may now be working in cyber warfare . ".
"We are not sure if Russia attacked Georgia, or vice versa, or if the attacks were approved by the military, but, with governments blaming each other, there is clearly confusion going on.
"As Internet crime becomes specialized, it gives birth to a shadow economy worth as much as $ (£55bn)every year.
"The shadow economy is very similar to the real world economy," says Maksym Schipka, a senior architect at MessageLabs.
"Specialization promotes competition, high
High quality goods, and everything that makes the real world economy work.
"In this new market, different groups offer different services.
One creates malware, one collects and sells a list of target identities, one distributes viruses using a botnet rented from other places, and so on (
See panel, right).
Transactions often occur between criminals thousands of miles apart, in online forums and chat rooms, and it is relatively easy to find using internet search.
Using online payment systems such as eGold for payment is no different from legal transactions.
In some ways, in fact, the cyber-crime economy is closer to Adam Smith's original free-market concept because it is not subject to external price regulation, that is, taxes.
"The shadow economy is much more free than ours, so prices are only regulated by supply and demand," Mr Schipka said . ".
Despite the purity of its capitalism, the intent of most e-crimes is not complicated, and about 95 is designed for financial fraud and theft.
But, about for espionage, whether it's political or industrial, the technology used is
More refined, the pursuit of eternal
More specific goals
Usually senior management.
To a certain extent, this goal is an efficiency-driven result that will not appear in any market.
From the perspective of corporate espionage, the most promising recipient of infected mail may be an executive --
They have access to all systems of the company, and they are usually too busy to consider whether the incoming file is real or false before sending it.
Using complex programs, criminals selling identities can automatically search for "About Us" web pages and combine biographical information with email address formats, make a customized list of contact details for an executive at a certain level in a given geography or industry department.
But the most difficult attack is not economic motivation.
The most common goal is IP-
Rich industries such as financial services, defense and aerospace, can't find problems until competitors launch similar products, or governments in the developing world suddenly have better fighter planes.
"These are the most terrible problems because they are difficult to notice and may be found for many years," Mr Schipka said . ".
This method is very complicated and expensive.
A major aerospace group found that a clearly innocent Microsoft Word document sent to a senior executive contained a malware if the host ran a specific engineering computing program,
Once launched, it steals very specific, very technical information that can be used to design a new rocket, and then sends that information to an anonymous "drop" address.
"It is difficult to tell who paid the price for the attack, but the type of information stolen indicates that it will be worth hundreds of billions of dollars," Mr Schipka said . ".
"No one will be interested in this kind of data because there is nothing they can do about it.
"For law enforcement officers, the question is how to combat various technical crimes carried out by loose affiliates from multiple jurisdictions around the world, sometimes not detectable and often not reported.
The arrest last week of 11 people suspected of involvement in the theft of 100 million credit card details highlighted the difficulties: two Chinese, three Americans, three Ukrainians and one Estonian were charged, A Belarusian and a suspect known only to the online name Del Piero. -
Malware is the software that drives all types of cyber attacks from advanced espionage to basic theft. Off-the-
Shelf malware can be from $50 (£26)
According to the complexity of its goals, what kind of information it can get and what kind of security it can circumvent, $3,500.
You can also buy monitoring counter
The development of the virus and adjust your malware accordingly
$25 to $60 per month
Or quality service, so that it can not be detected. -
The next step is to find goals.
The basic list of unqualified email addresses is about 1/10 of the address;
A full identity, including the UK National Insurance number, may cost you $5 per piece.
Customized solution-
Executives in a certain region or industry-
Custom prices are expected to be paid. -
The next step is to use the "botnet" of thousands of innocent computers hijacked by hackers to send out the program.
The service can be purchased piecemeal, and it takes about $10 per million emails.
Or a botnet can be rented out for spam, hacking, denial of service attacks, or anything else you might think.
A reasonable hour.
The network size of 8,000 to 10,000 computers is about $200. -
The most common purpose is to steal credit card information.
A successful attack could generate 100,000 numbers in a week.
You can then take advantage of them yourself, or sell the list for 2 cents to 5 cents of the remaining balance on the online forum.
If the credit line for a regular credit card on your list is $1,000, the value of each set of details is about $25
Bring $2 m. -
A good way to convert the card number to cash is to buy the item online, usually an electronic product, and arrange delivery to the "delivery" address.
A minor who may or may not commit a crime, he receives the package and takes it elsewhere, usually a locker at the train station.
The last link is the person who collects the goods from all the drops and sells them at 70 per cent of their value --
Usually more than half of the resale value and the rest are returned to you. -
There is also a guarantee service if you are worried about buying your malware or selling your credit card list.
For 2 to 5% of the transaction value, the third party will host the goods and payment before verification.

GET IN TOUCH WITH Us
recommended articles
INFO CENTER FAQ BLOGPOST
Bright Ideas: How Outdoor Digital Signage is Revolutionizing Urban Advertising
In the bustling rhythm of modern cities, grabbing attention isn’t just about being loud—it’s about being smart. Traditional billboards are fading into the background as outdoor digital signage takes center stage, offering dynamic, interactive, and high-impact ways to reach audiences. From transit hubs to shopping streets, these intelligent screens are redefining how brands communicate in public spaces.
Ultimate Guide to Outdoor Waterproof TVs: Enhance Your Outdoor Entertainment
In today’s world, outdoor entertainment is no longer limited to barbecues or garden parties. With the rise of outdoor waterproof TVs, you can enjoy your favorite shows, sports, and movies in your backyard, patio, or poolside without worrying about weather conditions. These specialized displays combine advanced technology, durability, and convenience to bring the ultimate viewing experience outdoors.
How High Brightness IP66 Outdoor Televisions Deliver Reliable Performance for Outdoor Advertising Hospitality Projects and Residential Entertainment Environments
As outdoor living spaces and open-air commercial venues continue to grow in popularity, the demand for reliable and high-performance outdoor televisions is rising rapidly. Unlike standard indoor TVs, outdoor TVs are specifically engineered to withstand harsh environmental conditions while delivering clear, vibrant visuals in bright daylight.
Enhancing Public Spaces with Outdoor Digital Displays
In today’s fast-paced digital world, outdoor digital displays have become an integral part of urban landscapes, transforming how businesses, municipalities, and event organizers communicate with the public. Unlike traditional static billboards or posters, outdoor digital screens offer dynamic, eye-catching content that can be updated in real time, making them a versatile tool for engagement.
The Smart Tool for Modern Offices and Classrooms — Interactive Blackboard
In today’s digital and smart era, traditional blackboards no longer fully meet the demands of modern offices and classrooms. The Interactive Blackboard offers a revolutionary solution for corporate meetings, design discussions, and classroom teaching. It combines traditional writing functions with touch interaction, screen sharing, and multimedia capabilities, making communication more efficient and intuitive.
Revolutionizing Education and Presentations with the Smart Podium
As education and business environments continue to evolve, the demand for smarter, more interactive presentation tools is growing rapidly. Traditional podiums and fixed presentation systems often limit flexibility, collaboration, and audience engagement. The Smart Podium is designed to address these challenges by combining intelligent technology, wireless connectivity, and interactive features into one powerful solution. It provides educators, trainers, and presenters with a modern platform to deliver clear, engaging, and efficient presentations in both educational and professional settings.
Indoor Digital Display: A Smart Solution for Modern Indoor Advertising
In today’s fast-paced digital environment, businesses are constantly seeking more effective ways to communicate with their audiences. Indoor digital displays have become a powerful and flexible solution for advertising, information sharing, and brand communication. Compared with traditional static posters, an indoor digital display offers dynamic content, real-time updates, and centralized control, making it an essential tool for modern indoor spaces.
✨ Portable Smart Touch Screen — Redefining Lifestyle Displays
Technology today is not just about function — it is about attitude, personality, and the comfort of being able to control life the way we want. The portable smart touch screen, offered in 21.5”, 27”, and 32” sizes, has become one of the most exciting modern lifestyle displays. Often called a “personal mood screen” or “girlfriend screen,” it is loved for its elegant design, intuitive touch interface, and ability to transform any corner into a stylish and interactive space.
Smart Podiums Are Redefining Modern Classrooms: The Upgrade Every School Should Make in 2025
In an era where digital learning is evolving faster than ever, schools around the world are searching for tools that can elevate teaching efficiency, support hybrid learning, and create engaging, interactive environments for students. Among the many education technologies emerging today, one solution stands out as both practical and transformational: the Smart Podium.

A smart podium—also known as a digital lectern or intelligent teacher’s desk—combines advanced interactive technology, built-in computing, multi-device connectivity, and centralized classroom control into one sleek, user-friendly workstation. It is fast becoming the new teaching hub in smart classrooms, training centers, government institutions, and universities.
Transform Outdoor Communication with ITATOUCH Outdoor Digital Displays
In a world where attention is the new currency, ITATOUCH Outdoor Digital Displays empower businesses, schools, and organizations to communicate smarter, brighter, and more effectively. Designed to perform flawlessly under any weather condition, our outdoor digital signage solutions bring your message to life — rain or shine.
no data

ITA TOUCH operates a 20,000+ sqm smart manufacturing facility in Shenzhen, equipped with dedicated production lines for interactive displays and digital signage.

We welcome factory visits, online inspections, and OEM audits.

INFORMATION FOR INQUAIRY
Tel: +86 755 28281849
Wechat & whatsapp: +86 13582949978
Address:  #402, Building A54, Xinwei Fourth Industrial Zone, Matian Street.Guangming District, 518106 Shenzhen, China
Copyright © 2022 ITATOUCH| Sitemap
Customer service
detect