The Cyber War Is Real and We're Losing

Cote, Mike
September 2006
Bank Technology News;Sep2006 Supplement, Vol. 19, p32
Trade Publication
The article focuses on the threats posed by computer crimes on U.S. financial institutions. According to IDC, majority of computers having access to the Internet are infected and are being used by a network of hackers. Despite the implementation of disclosure laws and guidance on authentication, hackers are circumventing them. Moreover, the perpetrators are mostly organized, sophisticated, motivated, and funded.


Related Articles

  • Financial Institutions Receive Most Trojan Attacks.  // Point for Credit Union Research & Advice;7/1/2006, p3 

    The article reports on the Trojan computer attacks on the financial services industry in 2005. Trojan attacks and other targeted probes hit the financial services industry harder than any other industry in 2005, according to a study from Counterpane Internet Security Inc. and MessageLabs. 2005...

  • Threats. Lindenmayer, Isabelle // American Banker;12/2/2005, Vol. 170 Issue 230, p5 

    The article reports on various methods of fraud, forgery and identity theft discovered recently. The holiday shopping season has provided new opportunities for criminals. Moreover, because 90% of babies are issued a social security number before they leave the hospital and because they do not...

  • Financial firms bolster authentication. Messmer, Ellen // Network World;3/7/2005, Vol. 22 Issue 9, p9 

    This article focuses on the move of financial institutions in the U.S. to strengthen their defenses against online fraud by adding security mechanisms that are better suited to prove the identity of customers than are simple, reusable passwords. It is important for the financial services...

  • CYBERCRIME. Griffin, Ronald C. // Journal of International Commercial Law & Technology;Apr2012, Vol. 7 Issue 2, p136 

    This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.

  • Superzapping in Computerland. Golden, Frederic; Faflick, Philip; U.S., other // Time;1/12/1981, Vol. 117 Issue 2, p88 

    The article discusses the increase in computer crimes and the safety measures being taken by computer users. It is stated that several companies reported of their circuits being plagued by electronic interlopers and the police traced a gang of 13-year old children who hacked the systems. As...

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

  • Hacker Taggers: A new type of hackers. Warren, Matthew; Leitch, Shona // Information Systems Frontiers;Sep2010, Vol. 12 Issue 4, p425 

    Organisations often spend large sums of money to ensure that they are protected against the risks associated with online attacks. The perceived threats against organisations are well known and the losses can be easily quantified. This perceived threat is usually portrayed by the media as being...

  • Sentencing policies for hackers too lenient. Goodwin, Bill // Computer Weekly;2/10/2004, p5 

    The head of the National Hi-Tech Crime Unit has called on the government in Great Britain and the courts to reform sentencing policy to reflect the damage caused by hackers breaking into government and private sector computer systems. Although hackers who engage in extortion or fraud are treated...

  • A Latte, a Wi-Fi Link, and a Hacker. Brondt, Andrew // PCWorld;Dec2003, Vol. 21 Issue 12, p61 

    Provides information on the creation of a program called Airsnarf, which makes it easy for a computer hacker to access a user's log-in information for theft purposes. Mechanism of the program; Manner in which hackers steal information; Best defense against such type of computer service theft.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics