Search GSSD

I’m harvesting credit card numbers and passwords from your site. Here’s how.

Abstract: 
This article takes the form of a confession of a cyber criminal who reveals how the data is stolen from a website. This is an interesting article because it is offered almost hypothetically. The author introduces the bulk of the article by first claiming he doesn't know how true it is. However, given the frequency and potency of recent cybersecurity attacks, the audience would definitely listen and read on. The author shows the ease with which breaching security in the cyber world can be achieved. Keywords: scale, method, page, source
Author: 
David Gilbertson
Year: 
2018
Input By: 
Walaa Alkhanaizi
Affiliation: 
MIT student
Domains-Issue Area: 
Region(s): 
Datatype(s): 
Events
Theory/Definition