Identity Crisis

Goins, Liesa
November 2004
Men's Health;Nov2004, Vol. 19 Issue 9, p82
Presents advice on protection from several types of computer crimes. Way of preventing automated teller machine skimming; Technique in addressing spam phishing; Tips for protecting social security numbers, passwords and account numbers.


Related Articles

  • In Plain Sight. Quittner, Jeremy // American Banker;2/2/2011, Vol. 176 Issue 18, p5 

    Brief information is given about fraud concerning automated-teller machine (ATM) foyers where criminals or skimmers are setting up their card readers and cameras, according to a blog on the Krebs on Security website.

  • No Letup in ATM Skimming in Europe. Hernandez, Will // American Banker;7/27/2010, Vol. 175 Issue 114, p6 

    The article examines a report from a European banking security organization finding that so-called card skimming attacks on automated tellers (ATM) remain prevalent in most European countries.

  • Hi-Tech Hijinks. Wolfe, Daniel // American Banker;6/23/2010, Vol. 175 Issue 96, p5 

    The article examines electronic devices used by credit card identity thieves which can steal information from the cards from automated tellers (ATM), then transmit the data to the criminals through wireless communication systems.

  • Modern Frauds. Wolfe, Daniel // American Banker;8/4/2010, Vol. 175 Issue 119, p5 

    The article examines computer crimes including check forgery through hacking into an online data base of check images and hacking of automated tellers (ATM).

  • Data Breaches Back in Spotlight After $45M ATM Heist. Crosman, Penny // American Banker;5/14/2013, Vol. 178 Issue 74, p9 

    The article refers to an international theft perpetrated against Rakbank and the Bank of Muscat and mentions Verizon telecommunication firm's Data Breach Investigations Report which found 40 percent of network intrusions incorporate malware and 76 percent exploit stolen credentials. Security...

  • Warezov Botnet Raises Its Head Again.  // Bank Security Report;Nov2010, Vol. 39 Issue 11, p6 

    The article reports on the return of Warezov botnet on its spamming activities starting on October 7, 2011 by using compromised Hotmail accounts to send out massive quantities of spam using the web-based email service.

  • Why does your e-mail address get spam?  // Network World;3/24/2003, Vol. 20 Issue 12, p6 

    Discusses the results of the experiment from the Center for Democracy and Technology, about unsolicited electronic mail messages. Sources of spam.

  • Web-Wired ATMs May Take Off. Gosnell, David // Bank Technology News;Dec2000, Vol. 13 Issue 12, p61 

    Highlights a survey conducted by Dove Consulting Inc. which shows consumer support for automated teller machines (ATM) that double as Internet access stations. Percentage of respondents who would use a kiosk if it was available to them; Impact of transaction costs on prospective use of such...

  • Don't Cut Corners on Training.  // Credit Union Magazine;Jan2016, Vol. 82 Issue 1, p46 

    The article previews several courses offered by the Credit Union National Association (CUNA) Professional Development Online including Automated Teller Machine (ATM) Security, Cyber Fraud, and Understanding Internet Financial Services.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics