June 2007
Worldwide Videotex Update;Jun2007, Vol. 26 Issue 6, p3
Trade Publication
The article reports on the decision of Lee H. Teo, director of Friends Asia Pte. Ltd., to offer free membership on their Asian Dating Site FriendsAsia.com and its sister site FriendsAsia.com.cn. FriendsAsia.com does not require credit cards to make full access of the site. One of the reasons behind the decision is the concern of the members on credit card security breaches and computer hackers.


Related Articles

  • Even strong defenses sometimes falter; when they do, it's time for incident response. McClure, Stuart; Scambray, Joel // InfoWorld;05/17/99, Vol. 21 Issue 20, p47 

    Discusses the proper formation of response plan for hacked Web site. Hacking of the Web auction site, eBay; Publications for formulating response planning; Characteristics of the solid response plan.

  • Protect Guests from Hackers. Stoessel, Eric // Restaurant Hospitality;Jun2013, Vol. 97 Issue 6, p23 

    The article focuses on how restaurant operators can protect their customers from hackers and security breaches. According to Verizon, hackers make restaurants their prime targets, and nine percent of the 621 confirmed data breaches and 47,000 reported security incidents were in the food service...

  • Defenders On The Data Battleground. PETE BARLAS // Investors Business Daily;2/ 3/2014, pA17 

    The spiraling growth of the Internet has helped companies strengthen their relations with customers and vendors. It has also provided a haven for criminal hackers seeking new ways to steal customer credit card numbers, bank account numbers and other sensitive data.

  • No-Swipe Credit Cards May Be Vulnerable To Hackers, Fraud. Burger, Carol Anne // Credit Union Journal;11/13/2006, Vol. 10 Issue 45, p20 

    The article reports on the vulnerability of no-swipe credit cards to hackers and fraud, according to research from the University of Massachusetts. Research Tom Heydt-Benjamin and computer science professor Kevin E. Fu were able to display cardholder name and other data using a device that they...

  • IDENTITY THEFT: WHAT YOU CAN DO TO PROTECT YOUR CLIENTS. Oehlers, Peter F. // Journal of Financial Service Professionals;Jan2004, Vol. 58 Issue 1, p20 

    The article provides information on the actions that should be taken by advice planners to avoid trouble emanating from identity theft. Because more information is available on the Internet and through electronic measures, identity theft is one of the fastest growing crimes. Clients need to...

  • Multiple "Guards" Foil Hackers.  // USA Today Magazine;Jun2003, Vol. 131 Issue 2697, p7 

    Reports on the development of a web site designed to protect computer software hackers in the U.S. Addition of custom levels of security to software; Traditional software protection measures; Modifications to software security measures.

  • Hackers Test Card Security.  // CU360;5/18/2009, Vol. 35 Issue 9, p6 

    The article discusses issues related to the effectiveness of the credit card industry's security standards for protecting customer data. It is said that despite merchants that handle credit and debit card data meeting the payment card industry's data security standards, hackers targeted...

  • Thwart ID Thieves. McGregor, Paloma Lisa // Working Mother;Oct2006, Vol. 29 Issue 8, p44 

    The article focuses on identity (ID) theft. High-tech weapons include spyware, pharming and phishing. Hackers can monitor computer activity and gather passwords. BlackBerrys and cell phones are not exempt from hacking. Information is collected from debit and credit card swipes to create fake...

  • Hacker plc.  // Management Services;Jun85, Vol. 29 Issue 6, p6 

    This article presents information related to computer piracy, as of June 1985. Earlier in the year the Bank of England (BofE), issued a stern warning to British banks of the tremendous hazards from error and fraud inherent in their computer systems. So great is the BofE's concern that they wrote...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics