TITLE

Exposures

AUTHOR(S)
Wolfe, Daniel
PUB. DATE
May 2008
SOURCE
American Banker;5/14/2008, Vol. 173 Issue 93, p5
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents news briefs involving the releasing of personal information. A hacker placed the personal information of more than six million residents of Chile on the Internet. Tower Club, a student organization at Princeton University, e-mailed the social security numbers of 103 Princeton alumni to club members.
ACCESSION #
32090145

 

Related Articles

  • Exposures. Wolfe, Daniel // American Banker;6/4/2008, Vol. 173 Issue 107, p5 

    The article lists several high profile stories about Internet security breaches. Computer hackers attacked the Phoenix Mars Lander Web site. Records of about 1000 patients at Walter Reed Army Medical Center were exposed, and financial service company State Street announced that a computer disk...

  • Evolution of a Hacker. Stone, Adam // Information Security;Dec2007/Jan2008, Vol. 10 Issue 11, p22 

    The article traces the evolution of computer crimes. In the early 1990s some students breaking into corporate and government systems only to show that it can be done. By the end of the decade, hackers begin tampering with systems as a means of humiliating corporate security professionals. By...

  • PAYING the price.  // Information Security;Apr2006, Vol. 9 Issue 4, p34 

    Discusses the information security breach that occurred at CardSystems Solutions in May 2005. Extent of the damage caused by computer hackers on the company; Measures implemented by Joe Christensen, vice president of security and compliance at CardSystems, to help the company earn compliance...

  • Limits of token gestures. King, Stuart // Computer Weekly;4/4/2006, p22 

    This article presents views of the author on computer security. Although the author does not advocate providing a blood sample to enable him to log into his bank account from home, he likes the idea of his bank providing him with an extra form factor and using two-factor authentication. No...

  • TAKING A BITE OUT OF IDENTITY THEFT. Lewis, Peter // Fortune;5/2/2005, Vol. 151 Issue 9, p36 

    The article mentions how companies mishandle personal data and recommends using a paper shredder at home. Last year, according to a Better Business Bureau report, more than nine million Americans were victims of identity theft. Security experts say that, contrary to popular belief, the majority...

  • iDENTITY FRAUD.  // Finweek;6/17/2010, Special section p4 

    The article offers information about identity fraud or theft. It indicates that identity fraud is an attempt to get sensitive information including names, passwords and credit card details. According to Jayson O'Reilly, identity thieves and hackers are targeting home computers due to less or...

  • Threats. Lindenmayer, Isabelle // American Banker;12/2/2005, Vol. 170 Issue 230, p5 

    The article reports on various methods of fraud, forgery and identity theft discovered recently. The holiday shopping season has provided new opportunities for criminals. Moreover, because 90% of babies are issued a social security number before they leave the hospital and because they do not...

  • Demasiado relajo ante la seguridad de los ordenadores personales.  // Estrategia Financiera;2010, Vol. 25 Issue 278, p73 

    No abstract available.

  • SEARCHING OUT FRAUDSTERS.  // Travel Weekly (UK);2/13/2009, p5 

    The author reflects on the search for Internet scammers. He notes that discovering a fraudster listed in Internet search results is worse in brand establishment. He points out that fraudsters can bid agaisnt brand terms, populate the page coding of their site with brand terms and mention these...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics