TITLE

Using Security to Create Insecurity

AUTHOR(S)
Sausner, Rebecca
PUB. DATE
July 2006
SOURCE
Bank Technology News;Jul2006, Vol. 19 Issue 7, p29
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the latest means being employed by phishers to obtain data from unsuspecting consumers. Phishers trick consumers into supplying personal data in the guise of making security checks. Other fraudulent methods used are scam call centers that mimic the target bank, e-mail delivery systems, and smart redirection attacks.
ACCESSION #
21699336

 

Related Articles

  • Go Phish: How To Prevent Identity Fraud. Pandit, Milind // Bank Technology News;Jul2006, Vol. 19 Issue 7, p33 

    The article discusses new technology to prevent phishing. They are search engine Web crawl, domain name management, multi-layer authentication, and Web traffic analysis. Web crawl works by searching the Web for sites which mimic the legitimate one and shutting down the fraudulent site for...

  • Phishing In Troubled Waters.  // Business Communications Review;Jan2007, Vol. 37 Issue 1, p6 

    The article discusses a survey by Gartner, Inc. which reveals that the average loss per individual that has been scammed by "phishing" increased from $257 in 2004 to $1,244 in 2006. Financial losses from the scams are estimated to be almost $3 billion, with the number of adults who claim they've...

  • Brand Spoofing.  // Network Dictionary;2007, p74 

    An encyclopedia entry for Brand Spoofing is presented. It is also called phishing or carding. It refers to a scam where the perpetrator send out legitimate-looking electronic mails appearing to come from sites such as eBay/PayPal, MSN and Yahoo to gather personal and financial information from...

  • If It Sounds Too Good...  // PN;Jun2010, Vol. 64 Issue 6, p75 

    The article focuses on the rise and consequences of mortgage-modification and rescue scams which take place through e-mails and phone calls. As stated, in these scams people are asked to give personal and tax information which helps scammers in committing identity theft.The clients are misguided...

  • Phishing gets between a rock and an easy place.  // MarketWatch: Financial Services;Sep2007, Vol. 6 Issue 9, p10 

    The article reports that a group known as the Rock Phish has introduced the most successful phishing attacks in Great Britain. MarkMonitor, a company that has developed its own anti-phishing strategy to deal with Rock Phish attacks, asserts that Rock Phishers have employed an anti-phishing...

  • Phishing Away Your Identity. Coldsborough, Reid // Business Journal (Central New York);10/5/2007, Vol. 21 Issue 40, p1B 

    The article focuses on phishing attacks in the U.S. in 2007. It is reported that the latest attacks are e-mails that appear to come from form the Internal Revenue Service trying to trick someone into revealing where his bank is and then the criminals send an email that appears to come from the...

  • WILLIAM PELGRIN. Mimoso, Michael S. // Information Security;Mar2006, Vol. 9 Issue 3, p72 

    Interviews William Pelgrin, director of New York's Office of Cyber Security and Critical Infrastructure Coordination (CSCIC) phishing scams. Reason for conducting the mock phishing exercises; Views on the impact of the phishing exercises on the state employees' trust in legitimate e-mails...

  • E-Mail Mishap. Wolfe, Daniel; Bills, Steve // American Banker;10/7/2009, Vol. 174 Issue 185, p5 

    The article discusses a phishing attack on the technology web site site Neowin.net. Nearly 10,000 Hotmail usernames and passwords were posted online and it may be only a small part of a larger breach. Additional lists showed up containing e-mail account details for Gmail, Yahoo, Comcast,...

  • Hyperlink Spoofing.  // Network Dictionary;2007, p234 

    A definition of the term "hyperlink spoofing" is presented. Also known as web spoofing, hyperlink spoofing is a process by which an attacker is able to view and make changes to web pages that are transmitted to or from another computer. Hyperlink spoofing can be used in data phishing.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics