TITLE

Surge in Hackings Of Bank Systems

AUTHOR(S)
Wolfe, Daniel
PUB. DATE
August 2007
SOURCE
American Banker;8/6/2007, Vol. 172 Issue 150, p18
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article looks at the rise in hacking attempts against bank systems. According to Allen Wilson, SecureWorks Inc.'s vice president of research, the number of hackers has increased as criminals realize the minimal risk they face in perpetrating the crimes. Wilson also stated that most of the hackers were based in Eastern Europe and Russia.
ACCESSION #
26085606

 

Related Articles

  • FEAR OF A BLACK HAT. Penenberg, Adam L. // Fast Company;Jul/Aug2008, Issue 127, p51 

    The article discusses people who create and sell illegal software that enables access to government, corporate, and individual computers. The illegal code and recipes written by computer hackers which will penetrate the software, then create unknown (zero-hour) software threats, called 0days,...

  • Lawyer warns on reporting e-crime. Goodwin, Bill // Computer Weekly;4/24/2007, p6 

    The article reports that Jonathan Goad, partner at Swan Turton, who advises firms on protecting their reputations, will warn the Infosecurity conference this week that reporting computer crimes to the police could place organisations at risk of reputation-damaging publicity. He will tell...

  • THE new RED menace. Sausner, Rebecca // Bank Technology News;May2007, Vol. 20 Issue 5, p27 

    The article discusses the gravity of issues associated with the emergence of nation-state threat that China's cyber army poses to the U.S. national security. The author analyzes the implications of the China-based cyber threat on the country's financial institutions. Moreover, the article probes...

  • Making Computer Crime Count. Goodman, Marc // FBI Law Enforcement Bulletin;Aug2001, Vol. 70 Issue 8, p10 

    Provides information on computer crimes in the United States. Legislation governing computer crimes in the country; Statistics of computer crimes; Information on computer hacking; Problems posed by unreported computer crimes; Details of computer security and confidentiality.

  • Who's been looking at your data? Butler, Declan // Nature;8/8/2002, Vol. 418 Issue 6898, p580 

    Reports on the breach of academic computer security in the U.S. Web sites that were hit by distributed denial-of-service attacks launched from computers in schools; Threat posed by cyber-terrorists; Security measures used by researchers to protect the people and homes.

  • Paris school offers primer for cyberpirates. van der Laan, Nanette // Christian Science Monitor;12/3/2001, Vol. 94 Issue 7, p1 

    Discusses the Zi Hackademy school in Paris, France, which teaches computer hacking methods. Fear that the teaching of the information will lead to computer crimes; Monitoring of the school by the police; Idea that the information is provided for self defense of Web sites and computers.

  • GLOBAL NOTE.  // Time International (Atlantic Edition);6/4/2007, Vol. 169 Issue 23, p11 

    This article explains that the country of Estonia experienced 100 separate attacks on its computers systems during April, 2007. They have accused Russia of organizing the strikes, because Estonian authorities decided to take down a Soviet war memorial. Russia has denied any involvement in the...

  • Cyberattacks Have Lasting Effects. GERENA, CHARLES // Econ Focus;Second Quarter 2013, Vol. 17 Issue 2, p2 

    The article discusses aspects on the financial losses caused by additional security measures and preventive intervention expenses against cyberattacks.

  • Threat Report.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2006, p10 

    The article offers news briefs on hacker activity and security across the globe as of January 2006. Phishing attacks against smaller banks was launched by cybercriminals in the U.S. The Information Security Breach and Notification Act of New York went into effect in December 2005. As part of...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics