Fraudsters Find a Chink In Elite Authentication

Sausner, Rebecca
November 2009
American Banker;11/30/2009, Vol. 174 Issue 213, p9
Trade Publication
The article reports on an increase in Great Britain which is being seen in the number of banks that are becoming victims of criminals who use a technique called phone-jacking to bypass a security system from Authentify Inc. called authentication technology. By bypassing the technology the criminals gain access to customers' financial records and bank accounts. Methods that the banks are using to reduce the incidences of phone-jacking are discussed.


Related Articles

  • Banks Awakening To Dangers Of E-Mail After Epsilon Breach. Quittner, Jeremy // CardLine;4/22/2011, Vol. 11 Issue 16, p29 

    The article offers information on the need for protecting customers' banking information from computer hackers in the U.S. It mentions the need for proactive governance and a risk-and-compliance model to guard customers' personal information. The impact of breach at Epsilon Inc., the email...

  • NEWS MAKERS.  // Bank Technology News;Aug2006, Vol. 19 Issue 8, p8 

    The article reports on developments relevant to bank security systems in the U.S. in 2006. Key issues discussed include the contactless PayPass feature of MasterCard credit and debit cards, the slight increase in bank fraud incidents and the limits of Citibank's multi-factor security system...

  • Blocking hacker attacks. Bradford, Michael // Business Insurance;2/19/2001, Vol. 35 Issue 8, p2 

    Reports that an Internet security expert has claimed that businesses in the United States can easily reduce the chances of having their computer systems attacked by hackers. Companies' common perception of hackers; Amount reserved by the government for fighting computer crimes; Factors that...

  • Internet innocence lost. Davis, Stephania H. // Telephony;03/30/98, Vol. 234 Issue 13, p5 

    Opinion. Focuses on the case of a Massachusetts teenager for violating Federal computer crime laws. Hacking into a Bell Atlantic/Nynex digital loop carrier system and disrupting phone service in Rutland; Cutting off of phone service to an airport tower in Worcester; Access into pharmacy...

  • Fear of a black hat. Bischoff, Glenn // Telephony;9/3/2001, Vol. 241 Issue 10, p24 

    Presents precautionary measures concerning computer hackers. Description of white hat hackers; Reasons behind computer hacking; How hackers attack computer systems.

  • Hack attack.  // Junior Scholastic;03/20/2000, Vol. 102 Issue 15, p5 

    Focuses on the February 7, 2000 hacker attacks on large Web sites such as Amazon.com and Yahoo.

  • Hackers, terrorists, and spies. Radcliff, Deborah // Software Magazine;Oct97, Vol. 17 Issue 11, p36 

    Focuses on the computer hackers who gain unauthorized access to a computer network. Two types of computer hackers; Ultimate goals of computer hackers; Methods used by hackers to gain access to other people's information. INSETS: Plug the leaks, by Michael Guidry.;Smile, I've got your...

  • The Hacking of an Anti-Hacker Plan. Munro, Neil // National Journal;8/14/99, Vol. 31 Issue 33, p2372 

    Reports on the move of civil libertarian hackers in Washington D.C. in giving `The Times' a draft of a White House plan to create a Federal Intrusion Detection Network (Fidnet). Goals of this network to boost the antihacker defenses of the nation's computers; Impact to the nation when these...

  • Hacked! Are your company files safe? Rothfeder, Jeffrey // PCWorld;Nov1996, Vol. 14 Issue 11, p170 

    Looks at theft and destruction of company computer files and how to prevent it. The increase in the number of electronic crimes; Companies that have been victimized; Attempts to access the Pentagon's files; Capabilities of firewalls; Encryption; Inside jobs; Emergency response teams; Comments...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics