TITLE

Tamper-proof PIN letters under fire

PUB. DATE
June 2005
SOURCE
Credit Control;2005, Vol. 26 Issue 6, p50
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the claim of researchers at Cambridge University in Cambridge, England regarding the potential for mailing systems used to give consumers new details about their bank records to be exposed to someone else. Indication that poor printing can overcome the problem; Potential for personal identification numbers to be read by scanning the letter through a popular computer software; Effectiveness of bright lights and easy-to-use software in defeating tamper-proofing on letters containing personal identification details.
ACCESSION #
18776969

 

Related Articles

  • Why Aadhaar is a big worry.  // Telegraph (Calcutta, India);4/20/2013, p1 

    The article focuses on the Aadhaar project designed to speed up the unique identification number enrolment in Jharkand in southern Bihar, India. It notes the important role of the state's information and technology (IT) department in overseeing the registration process of the project to ensure...

  • Trade in line to trial chip and PIN-plus. Nelson, Paul // Travel Weekly (UK);3/30/2007, p62 

    The article reports the advantages of using a chip and PIN-plus system in the travel industry in Great Britain. The author states that travel trade is among the industry sectors that are front-runners to trial a new chip and PIN-Plus system that aims to help cut rising online and telephone fraud...

  • Australian credit cards: PINs on the way.  // MarketWatch: Financial Services;Feb2007, Vol. 6 Issue 2, p5 

    The article reports on the proposal of an Australian parliamentary committee to implement personal identification number (PIN)-based authorization in the country's credit card industry. The committee also proposed to adopt chip technology to improve processing times and limit fraud. Moreover,...

  • Colorado Colleges Assign Student Security IDs.  // Community College Week;12/8/2003, Vol. 16 Issue 9, p26 

    Reports on the decision of the Colorado Community College System (CCCS) Information Technologies department to assign new identification numbers to students dating back to 1987 in order to prevent identity theft. Legislation passed by the Colorado General Assembly; Statement issued by CCCS...

  • Swivel creates secure system for PIN and password input. Dudley, Dominic // New Media Age;8/1/2002, p10 

    Features the PINsafe system developed by Swivel Technologies. Problems associated with typing in a password or personal identification number; Details of how the system works; Information on other uses for the system.

  • A Study on Operation Scheme of Unmanned Security System using Scientific Equipment. Chi-Won Choi; Tae-Sik Song; Jung-Ho Eom // Journal of Security Engineering;Jun2012, Vol. 9 Issue 3, p209 

    In this paper, we presented advanced operation scheme of unmanned security structure based on the results of an operational test for the construction of scientific security system in military units. We performed an operational test&assessment for the existing scientific security system. We...

  • Security is in the Cards.  // Security: Solutions for Enterprise Security Leaders;Apr2005, Vol. 42 Issue 4, p36 

    Features the identification card printer and badging security systems. Functions of the printer; Industrial applications; Efficiency of the system.

  • A Survey on Iris Recognition. Birgale, Lenina; Kokare, Manesh // IUP Journal of Electrical & Electronics Engineering;Oct2009, Vol. 2 Issue 4, p7 

    As the demand for security systems is increasing exponentially day by day, there has been a rigorous search for different verification and identification techniques. Facial features, voice patterns, hand geometry, retinal patterns, vein patterns, signature dynamics, voice verification, facial...

  • Lone worker security device.  // RoSPA Occupational Safety & Health Journal;Aug2004, Vol. 34 Issue 8, p46 

    Features the Identicom security device from Connexion 2 Ltd. Capabilities; Components.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics