TITLE

Threat Report

PUB. DATE
January 2006
SOURCE
SC Magazine: For IT Security Professionals (UK Edition);Jan2006, p10
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article offers news briefs on hacker activity and security across the globe as of January 2006. Phishing attacks against smaller banks was launched by cybercriminals in the U.S. The Information Security Breach and Notification Act of New York went into effect in December 2005. As part of Operation Pronto Com in Brazil, police officers have been organized to combat cybercrimes.
ACCESSION #
19549654

 

Related Articles

  • The Newest Internet Scams. Bauknight, Trevor Zion // Business & Economic Review;Oct-Dec2005, Vol. 52 Issue 1, p19 

    Explains that "spear-phishing electronic mail" is an Internet scam that involves the use of social engineering to convince Internet users to surrender their personal information such as passwords. Targeting of a small, clearly defined group of potential victims; Implications for enterprise...

  • Technology rings up vulnerabilities. Casale, Jeff // Business Insurance;3/15/2010, Vol. 44 Issue 11, p4 

    The article focuses on the vulnerabilities and risks posed by Voice Over Internet Protocol (VoIP) technology. It mentions that VoIP technology stands as a cost-effective and flexible method for businesses in the management and simplification of communication networks. It notes that McAfee Labs...

  • Who's Got My Keys? Sparks, John // Newsweek;12/19/2005, Vol. 146 Issue 25, pE2 

    The article focuses on identity-stealing software programs known as keyloggers, which are easy to make from online kits. Keyloggers install themselves onto computers without users' knowledge, recording keystrokes as the user types in passwords, account numbers and personal data. Identity theft...

  • Who's Got My Keys? Sparks, John // Newsweek (Pacific Edition);11/28/2005 (Pacific Edition), Vol. 146 Issue 22, p6 

    The article focuses on identity-stealing software programs known as keyloggers, which are easy to make from online kits. Keyloggers install themselves onto computers without users' knowledge, recording keystrokes as the user types in passwords, account numbers and personal data. Identity theft...

  • WHO CAN YOU TRUST? Shenk, Maury // Computer Weekly;4/24/2007, p28 

    The article presents the author's comments on various issues related to phishing, computer security, and fraudulent Internet authentication. There is no single answer to Internet authentication, and businesses must employ different internal systems to meet requirements. There is increasing...

  • The face behind the crime. Gibson, Ed // SC Magazine: For IT Security Professionals (UK Edition);Jun2007, p74 

    The author comments on cyber crime in Ukraine. The author explains the work of a computer hacker. He also notes that some financial institutions employ specialist trained fraud investigators who have as their focus the investigation of fraud committed against customers. He suggests to update...

  • BUGGING BROADBAND. Arthur, Charles // New Statesman;8/29/2005, Vol. 134 Issue 4755, p24 

    Offers a discussion about computer security and the popularity of broadband in Great Britain. Report that Great Britain has a problem with computer viruses; Statement that computer viruses can make a computer unendingly produce unsolicited electronic mail messages; Meeting at the Cabinet Office...

  • Phishing for the good guys. Brodkin, Jon // Network World;8/13/2007, Vol. 24 Issue 31, p26 

    The article reports on the research conducted by Markus Jakobsson in the U.S. concerning online attacks and aims to improve computer security. Jakobsson, a cybersecurity researcher and professor at Indiana University in Bloomington, spent much of his time to predict possible new techniques...

  • Defending against cyber raiders. Greer, Joseph // Futures: News, Analysis & Strategies for Futures, Options & Deri;Aug2005, Vol. 34 Issue 10, p63 

    Identifies strategies used by computer hackers to access online futures trading accounts and offers measures to avoid them. Phishing; Pharming; Social engineering; Hacking; Trojan horses.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics