A sidebar to the feature, "How to Minimize E-Commerce Risk" Consider the case of Jesus Oquendo, who in 2000 worked as a computer security specialist at now-defunct Collegeboardwalk.com. Oquendo, who shared an office with Manhattan-based Five Partners Asset Management, altered commands on the company network to automatically route the password file from Five Partners’ system to his e-mail account every time the company’s system rebooted. After Collegeboardwalk went belly up, Oquendo continued to access those passwords remotely using a shell account he illegally installed on the victim’s network. He started hacking programs and other information in an electronic directory no longer used by Five Partners. He also installed a sniffer program that intercepted and recorded electronic traffic on Five Partners’ network. Oquendo didn’t stop with Five Partners. Using a sniffer, he obtained the password of a Five Partners employee who had an account belonging to computer wholesaler RCS Computer Experience. Oquendo eventually used his illicit access to delete RCS’s entire database, costing RCS approximately $60,000 to repair. He left the company a glib message: “Hello, I have just hacked into your system. Have a nice day.” Although he denied the charges, Oquendo was convicted in 2001 of computer hacking and electronic eavesdropping. He was sentenced to 27 months in a minimum-security federal jail. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe