To Catch Phish, Banks Need Better Bait

Urban, Mike
November 2005
Bank Technology News;Nov2005, Vol. 18 Issue 11, p57
Trade Publication
Reports on the ways applied by financial institutions to avoid phishing in the U.S. Use of technical solutions like card-based personal identification number offsets; Validation of card verification codes for PIN-based transactions on signature debit card portfolios; Deletion of online banking login numbers and passwords.


Related Articles

  • Phisher.  // Network Dictionary;2007, p374 

    A definition of the term "phisher," which refers to a person who uses any number of different social engineering and e-mail spoofing ploys to trick victims, is presented.

  • Learning to Live With the Reality Of Breach Risk. Behrman, Dennis // Bank Technology News;Nov2005, Vol. 18 Issue 11, p62 

    Reports on the growth of security breach or theft of consumer identity data in the U.S. Use of fraudsters with Social Security numbers, first and last names, dates of birth, account numbers and other personal information to access financial accounts; Indication on the need for financial...

  • COMPLIANCE WITH THE NEW IDENTITY THEFT PREVENTION REGULATIONS. Mohr, Timothy L.; Fatigate, Ralph M. // Banking Law Journal;Jun2008, Vol. 125 Issue 6, p518 

    The article discusses the need to effectively implement the new regulations established by the President's Task Force on Identity Theft to prevent the crime in the U.S. The regulation, together with an executive order, was duly constituted on May 10, 2006 which defines identity theft as a fraud...

  • MY, WHAT BIG CYBERCLAWS... Gertler, Eric; Silver, Marc // U.S. News & World Report;12/6/2004, Vol. 137 Issue 20, p86 

    Provides advice for preventing identity theft. Report that fraudulent requests for personal information through online promotions are common; Methods for ensuring that a request for personal information is valid; Common phrases and techniques used in fraudulent emails.

  • Phishing gets between a rock and an easy place.  // MarketWatch: Global Round-up;Sep2007, Vol. 6 Issue 9, p181 

    The article focuses on how phishing has become widespread in the world of technology. The Rock Phish gang has developed an attack methodology that makes its fraudulent-access efforts a lot more difficult to trace and defend against. They do it through effective use of good technology...

  • If It Sounds Too Good...  // PN;Jun2010, Vol. 64 Issue 6, p75 

    The article focuses on the rise and consequences of mortgage-modification and rescue scams which take place through e-mails and phone calls. As stated, in these scams people are asked to give personal and tax information which helps scammers in committing identity theft.The clients are misguided...

  • Phishing gets between a rock and an easy place.  // MarketWatch: Financial Services;Sep2007, Vol. 6 Issue 9, p10 

    The article reports that a group known as the Rock Phish has introduced the most successful phishing attacks in Great Britain. MarkMonitor, a company that has developed its own anti-phishing strategy to deal with Rock Phish attacks, asserts that Rock Phishers have employed an anti-phishing...

  • Phishing Away Your Identity. Coldsborough, Reid // Business Journal (Central New York);10/5/2007, Vol. 21 Issue 40, p1B 

    The article focuses on phishing attacks in the U.S. in 2007. It is reported that the latest attacks are e-mails that appear to come from form the Internal Revenue Service trying to trick someone into revealing where his bank is and then the criminals send an email that appears to come from the...

  • WILLIAM PELGRIN. Mimoso, Michael S. // Information Security;Mar2006, Vol. 9 Issue 3, p72 

    Interviews William Pelgrin, director of New York's Office of Cyber Security and Critical Infrastructure Coordination (CSCIC) phishing scams. Reason for conducting the mock phishing exercises; Views on the impact of the phishing exercises on the state employees' trust in legitimate e-mails...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics