Searching Customers' PCs for Nasty Bugs

Fest, Glen
February 2008
Bank Technology News;Feb2008, Vol. 21 Issue 2, p10
Trade Publication
The article discusses the significance of Panda Security for Internet Transactions, a new anti-service service, to companies in the U.S. It is a new anti-fraud measure launched by European anti-virus giant Panda Security that gives e-trading firms and online payment recipients to reach out and scan end-user client's personal computers for malware, to investigate and unilaterally halt online transactions from an infected customer.


Related Articles

  • Cyber crime still a threat despite some reports of a decline. Liddle, Alan J. // Nation's Restaurant News;8/8/2005, Vol. 39 Issue 32, p38 

    Comments on the impact of computer crimes on business organizations in the U.S. Assertion on the costliness of reinstalling computer software and reconfiguring computer systems; Citation of the most prevalent computer crimes; Affirmation on the need to allocate ample funds for computer security.

  • They've Got Your Number. Cringely, Robert X. // Inc.;Aug2003, Vol. 25 Issue 8, p61 

    Focuses on the problem of identity theft in the U.S. as of August 2003. Ways identity thieves could get personal information to apply for bank accounts and loans; Estimated annual cost to society of identity theft; Approximate number of identity theft victims every year.

  • Flooded by Phishing. Swann, James // Community Banker;Jan2005, Vol. 14 Issue 1, p44 

    Deals with the rise of phishing attacks in the U.S. Increase in the number of fraudulent web sites or phishing sites in the country; Use of phishing sites to lure consumers into providing personal information, such as bank account numbers, which can be used to commit identity theft and other...

  • The Price Is Right. Quittner, Jeremy // American Banker;2/2/2011, Vol. 176 Issue 18, p5 

    Brief information is given about an undercover investigation by Panda Security SL in Spain concerning the market and prices for stolen financial data, money-laundering services, and bank credentials.

  • The joy of theft. Barron, Nick // SC Magazine: For IT Security Professionals (UK Edition);Sep2008, p15 

    The author comments on the process of fixing online fraud. According to the author, who was a victim of fraud when one of his cards was used to purchase shirts, there is a long process of fixing the fraud. The author was given a suggestion to put up a firewall. The author asserted that there is...

  • NetNasties Aussies the target for phishing attacks.  // Australian NetGuide;Aug2009, Issue 135, p19 

    The article presents information related to working of phishing world and measures to protect malware threat. Since many consumers are aware of the risk involved in replying online, cyber criminals use more sophisticated techniques. They provide bogus phone numbers to ring for information or...

  • Scam Artists Keep Pace With Technology. Schoonmaker, Daniel // Grand Rapids Business Journal;5/23/2005, Vol. 23 Issue 21, SPECIAL SECTION pB1 

    Addresses the increasing sophistication of consumer and Internet fraud. Example of a fraudulent act using a teletype service for the deaf; Similarities of the teletype service scam with the Nigerian bank scheme in 2003; Factor that makes education of these scams difficult for consumers...

  • India registers 40 % annual increase in cyber crime cases till June 2014.  // Telecom Tiger;12/29/2014, p1 

    The article reports on the 40% annual increase in cyber crimes in India until June 2014. Topics discussed include the hacking of several Indian web sites, the publishing of obscene and unauthorized contents, and banking and credit card frauds. Also mentioned are the origins of cyber attacks and...

  • Report: Phishers Casting Wider Net.  // American Banker;11/30/2005, Vol. 170 Issue 228, p11 

    The article discusses a report released by the Anti-Phishing Working Group. The report indicates that while the number of phishing attacks has declined, the phishers are going after a wider variety of companies.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics