The Filthy Rich Life Of Wall Street Billionaires by Kris Spencer - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

MONEY

Money makes world go around. We all love it and wanted. But when and how money was made? Would be life better without it? According to Wikipedia:

The use of barter-like methods may date back to at least 100,000 years ago, though there is no evidence of a society or economy that relied primarily on barter. Instead, non-monetary societies operated largely along the principles of gift economics and debt. When barter did in fact occur, it was usually between either complete strangers or potential enemies.

img42.jpg

Many cultures around the world eventually developed the use of commodity money. The shekel was originally a unit of weight, and referred to a specific weight of barley, which was used as currency. The first usage of the term came from Mesopotamia circa 3000 BC. Societies in the Americas, Asia, Africa and Australia used shell money – often, the shells of the cowry (Cypraea moneta L. or C. annulus L.). According to Herodotus, the Lydians were the first people to introduce the use of gold and silver coins. It is thought by modern scholars that these first stamped coins were minted around 650–600 BC.”

Today mones is used for three main reasons:

1. medium of exchange

2. unit for calculating

3. store values

img43.jpg

Medium of exchange is used simply said for buy something. You gave money ant someone gives you some product. Money as a unit of computation reduces the number of required price in the economy, and thus the transaction costs. Money as a repository of values ​​provides an alternative that is better than keeping some goods because they lose value over time (food , etc.), although the money may, in times of inflation, to lose his value.

In ancient times money was maid from gold, silver or bronz. Today it is paper money. Reducing cost of making and transporting money. Future of money is even more modern. Electric ways of paying. They are even more efficiant and cheaper. Today you can recive money from every part of the world in just 30 minutes, using Western union. But it bills 20% of commision. You can even earn money on the internet and transfer it in real world. Ways to do that are:

  • PayPal
  • Skrill
  • Payoneer

And many others. So the way of earnings and payment are growing up as we speak. But there is something more that envolves. It is cyber-criminal. Yes you can transfer money, earn money on the internet and transfer it into your internet account. But are you certain that it will be safe there? Persons who can make your accounts free are usually doing that from their homes. Doesent have to leave house. So what are government doing to solve this ongoing problem? Well many countrys have new police devisions. Specially made to eal with this kind of criminals. How much cyber-criminal is powerful, say fact that they even hack Pentagon. Building with biggest scurity in the world. In Operation High Roller, a cyber attack that targeted both individuals and businesses and likely stole about $78 million across Europe, Latin America and the United States. According to Wikipedia cyber-criminal is:

“Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime is criminal exploitation of the Internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) define Cybercrimes as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)”. Such crimes may threaten a nation’s security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.”

And here it is how it works.

1. Spam: The monetization of malware started primarily with email spam. Peddling pills, fake watches and Russian brides is still a profitable practice for many criminals. Although spam volumes have begun to drop, spammers send billions of messages every day hoping that just a small percentage will make it past spam filters and convince a few folks with their guard down to make a purchase. While malware is still sent attached to some messages, it has largely moved to the web.

2. Phishing: Attackers use email for more than just spam promoting products and services. Email is the preferred method to deliver phishing attacks. These can vary from emails pretending to be from your bank or email service providers in order to steal your account details, to targeted attacks attempting to gain access to your company's internal services.

3. Social media: Many spammers have migrated from email spam to social media spam. Users are more likely to click links in commercially motivated spam if it appears to come from a friend or colleague on services like Facebook and Twitter. Breaking news and popular features on these networks can lead curious victims to click on unsafe links.

4. Blackhat SEO: Scammers continue their cat and mouse game with Google and Bing to manipulate search engine results, which we call Blackhat SEO or SEO poisoning. This leads to “poisoned” search results about many popular topics, including front page results leading to exploits, malware and phishing sites. For more information on SEO poisoning, read our technical paper from SophosLabs.

5. Drive-by downloads: The largest number of victims are delivered into the hands of these thieves simply by visiting websites containing exploits known as drive-by downloads. SophosLabs sees 30,000 new URLs every day that expose innocent surfers to a variety of code attempting to exploit vulnerabilities in their operating systems, browsers, plugins and applications.

6. Malware: Worms, viruses and other malware files still serve their masters well. While they are less common today than they were 10 years ago, opportunistic crooks still exploit malware to infect exposed systems and recruit people's computing devices for their own purposes.