TITLE

BankHookA Targets 50 Big Banks

AUTHOR(S)
Conrad, Lee
PUB. DATE
September 2004
SOURCE
Bank Technology News;Sep2004, Vol. 17 Issue 9, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the impact of cyber attack on banks. Effect on the security of bank's data; Increase in online-fraud; Banks affected.
ACCESSION #
14527672

 

Related Articles

  • The Lesson of Estonia. Denning, Dorothy E. // Information Security;Sep2007, Vol. 10 Issue 8, p12 

    The author reflects on the attacks on Estonia and cyberterrorism. She argues that even though the cyberspace attacks did not injure or kill anyone, online activism should be given utmost attention. An overview of powerful cyber attack tools is offered. The author suggests that information...

  • Russian cyberstrike on Estonia: 'Virtual shot heard round the world'.  // Geo-Strategy Direct;12/22/2010, p1 

    The article offers information on a new report released by the U.S. government that reveals Russian government's cyberwarfare activities against the Baltic state of Estonia in 2007. Released on December 6, 2007 it says that since April 27, Estonia has been the victim of the world's first...

  • Cyberattacks and the enemy within. Kilcarr, Sean // Fleet Owner Exclusive Insight;9/30/2015, p1 

    A blog is presented in which the author discusses findings of 9th Annual Global Advanced Threat Landscape Survey by the security firm CyberArk which include cyberattacks by executives within an organization, false confidence in current cyber-security strategies, and account takeovers.

  • Cyberterrorism: Threat or Hype? Langnau, Leslie // Material Handling Management;May2003, Vol. 58 Issue 5, p18 

    Addresses the threat posed by cyberterrorism to businesses in the U.S. Reason for the focus on possibilities of cyberterrorism; Examples of communication and computer attacks; Statistics on virus attacks; Computer security options.

  • Heavy-tailed distribution of cyber-risks. Maillart, T.; Sornette, D. // European Physical Journal B -- Condensed Matter;Jun2010, Vol. 75 Issue 3, p357 

    With the development of the Internet, new kinds of massive epidemics, distributed attacks, virtual conflicts and criminality have emerged. We present a study of some striking statistical properties of cyber-risks that quantify the distribution and time evolution of information risks on the...

  • STUXNET AND STRATEGY. Milevski, Lukas // JFQ: Joint Force Quarterly;2011 4th Quarter, Issue 63, p64 

    The article focuses on Stuxnet malware attacks on the Iranian nuclear sites. Its physical effect was significant: 1,000 centrifuges were destroyed, out of a total of 9,000 at Natanz, but Iran has been estimated to have only stockpiled the material to build 12,000 to 15,000 centrifuges. Stuxnet...

  • Why Iran Didn't Admit. Brown, Gary D. // JFQ: Joint Force Quarterly;2011 4th Quarter, Issue 63, p70 

    The article examines the possible reasons why Iran has drawn conclusion that it had been the victim of a cyber attack by virus Stuxnet. The Stuxnet code showed up on computer systems around the world, where it parked on hard drives, remaining inert if it did not find what it was seeking. It is...

  • Senior Japan security official warns 'daily' cyber attacks jeopardizing nation's interests.  // East-Asia-Intel Reports;10/26/2011, p3 

    The article reports on Osamu Fujimura, the secretary and chairman of the Information Security Policy Council in Japan, who said that information security threats are becoming daily occurrences and also called on Japan's government and industry to strengthen information security. He called for...

  • HIGH-TECH TERROR. Misra, Sunil // American City & County;Jun2003, Vol. 118 Issue 6, pHS6 

    Focuses on cyber-terrorism. Examples of cyber-terrorism; Percentage of U.S. cities which have developed strategies to address the issue; Importance of having a computer security policy.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics