Trombly, Maria
November 2008
Bank Technology News;Nov2008, Vol. 21 Issue 11, p19
Trade Publication
The article announces that the increasing mobile-phone malware will threaten mobile banking security in the U.S. According to SMobile System company, spyware is becoming increasingly prevalent on cell phones, and hackers are financially motivated to make the programs silent, stealthy and efficient so users will not even know they are there. Moreover, with multi-factor authentication in place, the losses due to mobile fraud may not be high enough to warrant intrusive security measures.


Related Articles

  • THE NEW ERA OF DEVICE SECURITY. SIMPSON, LUKE // Wireless Week;3/1/2009, Vol. 14 Issue 20, p16 

    The article analyzes the security concerns related to mobile phones. Chief technology officer (CTO) of sMobile Systems, a software security solutions company, Daniel Hoffman, considers, malware, a software that contaminates a computer or mobile device, and lost or stolen phones, as the most...

  • THE SPY IN YOUR HAND. Sutherland, Benjamin // Newsweek (Atlantic Edition);6/15/2009 (Atlantic Edition), Vol. 153 Issue 24, p14 

    The article reports on the popular usage of spyware which allows people to tap into other people's mobile phones. The wide availability of such software is noted, mentioning that over 200 companies offer spy-phone programs and that prices run from 50 dollars to over 300 dollars. The customers...

  • Mobile malware threats on the rise. Senia, Al // Telecom Asia;Dec2006, Vol. 17 Issue 12, p56 

    The article focuses on the increase in the number of computer viruses and malware which affect mobile phones. One example is the spy application available for download from a Thai Web site that could be used to track the movement of individuals and secretly listen to their conversations. Many...

  • Pass the Spam. Quittner, Jeremy // American Banker;1/12/2011, Vol. 176 Issue 7, p5 

    The article reports that the people behind the now-defunct Spamit junk-email producer are reportedly focusing their efforts on creating adware, malware, and spyware.

  • On the Potential of Limitation-oriented Malware Detection and Prevention Techniques on Mobile Phones. Qiang Yan; Deng, Robert H.; Yingjiu Li; Tieyan Li // International Journal of Security & Its Applications;Jan2010, Vol. 4 Issue 1, p21 

    The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Prior research...

  • Be prepared for smartphone attacks. Ashford, Warwick // Computer Weekly;4/17/2012, p5 

    The article discusses the potential threat of mobile malware and hacking attacks on smartphones as a result of increases in mobile financial transactions. Topics include the vulnerability of mobile operating systems iOS and Android and Android's greater amount of malware, the difficulties in...

  • ASK JAMES. Hunt, James // Micro Mart;Jul2013, Issue 1267, p126 

    The article presents questions and answers related to virus, spyware, and malware-related issues including how to deal with an anti-virus warning message that pops up whenever a Blogger page is being opened, how to make missing icons reappear in the Windows 7 desktop, and how to properly...

  • THE TOP SEVEN DANGERS TO YOUR PC AND DATA. TAYLOR, NATHAN // Techlife Australia (Bauer Media Group);May2014, Issue 24, p44 

    The article offers information on the top seven threats to personal computers (PC). The threats include spyware and identity theft, hardware failure, and hacking. Also offered are solutions to the problem which include placing firewall to prevent hacking, having a back up for hardware failure,...

  • Continuous Protection. STREUFERT, JOHN // Information Security;Nov2012, Vol. 14 Issue 9, p35 

    The article discusses the need for continuous cyber diagnosis and mitigation program, and the development of a system to improve federal cybersecurity by the U.S. Department of State. The specifications for the first phase of continuous monitoring and mitigation sensors focusing on the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics