June 2007
Worldwide Videotex Update;Jun2007, Vol. 26 Issue 6, p3
Trade Publication
The article reports on the decision of Lee H. Teo, director of Friends Asia Pte. Ltd., to offer free membership on their Asian Dating Site FriendsAsia.com and its sister site FriendsAsia.com.cn. FriendsAsia.com does not require credit cards to make full access of the site. One of the reasons behind the decision is the concern of the members on credit card security breaches and computer hackers.


Related Articles

  • NO CREDIT CARDS OR DUBIOUS CHARGES AT FREE ASIAN DATING SITE.  // Online Product News;Jun2007, Vol. 26 Issue 6, p3 

    The article reports that Asian dating web site FriendsAsia.com and its sister site FriendsAsia.com.cn are now completely free. According to Friends Asia Pte. Ltd. director Lee H. Teo, making FriendsAsia.com a 100 percent free Asian dating site was the best way they could think of to thank the...

  • Protect Guests from Hackers. Stoessel, Eric // Restaurant Hospitality;Jun2013, Vol. 97 Issue 6, p23 

    The article focuses on how restaurant operators can protect their customers from hackers and security breaches. According to Verizon, hackers make restaurants their prime targets, and nine percent of the 621 confirmed data breaches and 47,000 reported security incidents were in the food service...

  • Defenders On The Data Battleground. PETE BARLAS // Investors Business Daily;2/ 3/2014, pA17 

    The spiraling growth of the Internet has helped companies strengthen their relations with customers and vendors. It has also provided a haven for criminal hackers seeking new ways to steal customer credit card numbers, bank account numbers and other sensitive data.

  • IDENTITY THEFT: WHAT YOU CAN DO TO PROTECT YOUR CLIENTS. Oehlers, Peter F. // Journal of Financial Service Professionals;Jan2004, Vol. 58 Issue 1, p20 

    The article provides information on the actions that should be taken by advice planners to avoid trouble emanating from identity theft. Because more information is available on the Internet and through electronic measures, identity theft is one of the fastest growing crimes. Clients need to...

  • No-Swipe Credit Cards May Be Vulnerable To Hackers, Fraud. Burger, Carol Anne // Credit Union Journal;11/13/2006, Vol. 10 Issue 45, p20 

    The article reports on the vulnerability of no-swipe credit cards to hackers and fraud, according to research from the University of Massachusetts. Research Tom Heydt-Benjamin and computer science professor Kevin E. Fu were able to display cardholder name and other data using a device that they...

  • The FYI From BAI.  // Credit Union Journal;11/28/2005, Vol. 9 Issue 47, p16 

    The article features some of the observations and points related to online security breaches during BAI's Retail Delivery Show in the U.S. PassMark Security chairman Bill Harris noted the necessity to create a web site for popular affinity that requires a visit on all free cat-related content...

  • Consumer apathy to blame for 'TK Maxx-style hacking'. Hummerston, Gemma // Precision Marketing;4/20/2007, Vol. 19 Issue 8, p2 

    The article focuses on the risk of TK Maxx-style hacking disaster among the brand owners in Great Britain. Research shows that consumers are glad in putting their financial information at risk if it saves time online. The company admitted that hackers had stolen the information from more than 45...

  • Hackers Test Card Security.  // CU360;5/18/2009, Vol. 35 Issue 9, p6 

    The article discusses issues related to the effectiveness of the credit card industry's security standards for protecting customer data. It is said that despite merchants that handle credit and debit card data meeting the payment card industry's data security standards, hackers targeted...

  • CARDSYSTEMS PLEDGES TO UPGRADE SECURITY.  // CardLine;2006, Vol. 6 Issue 9, p1 

    The article reports on the settlement of government claims regarding the failure of CardSystems Solutions to provide security for some credit and debit card accounts in the U.S. The settlement requires the company to establish a comprehensive security program and obtain a third-party audit. A...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics