TITLE

Security Threats and Opportunities

PUB. DATE
May 2010
SOURCE
Bank Technology News;May2010, Vol. 23 Issue 5, p29
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the potential increase of security threats in the mobile banking industry as it became more transactional and adopted by several consumers in the U.S. According to Jacob Jegher, senior analyst at Celent LLC, cybercriminals did not pay much attention in the industry because it is simply too small for them to exert their efforts. However, he warns that as the consumers choose to adopt the technology, the chances of information fraud will proliferate as well.
ACCESSION #
50740661

 

Related Articles

  • Bluetooth headsets vulnerable to hackers. Graham-Rowe, Duncan // New Scientist;4/24/2004, Vol. 182 Issue 2444, p11 

    A security flaw could allow hackers to eavesdrop on cellphone conversations made on Bluetooth based wireless headsets, it was revealed this week. All that is needed to exploit the flaw is a piece of equipment called a "bluetooth sniffer," according to Stake, the London based company that...

  • CELL PHONE SECURITY NOT AS TANGLED AS THE WEB.  // USA Today Magazine;Jan2003, Vol. 131 Issue 2692, p8 

    Discusses the protection of cellular telephone systems from hackers. View of Dennis Silage, professor of electrical engineering at Temple University in Philadelphia, Pennsylvania, on cell phone networks; Encryption of radio transmissions on the cell phone network.

  • NEWS: LOCAL.  // Finweek;7/13/2006, p9 

    The article reports on developments relevant to finance and the financial services industry of South Africa as of July 13, 2006. House prices have increased by 13.6% in June 2006. The online banking accounts of major banks Absa, Standard and First National, on the other hand, were hacked by...

  • iCloud Hack Underscores Risk to Banks When Employees Use Cloud. Crosman, Penny // American Banker;9/3/2014, Vol. 179 Issue 136, p8 

    The article discusses the security threat to banks illustrated by a computer-hacking attack on the iCloud cloud-based storage service of smartphone maker Apple Inc. Jacob Jegher of advisory firm Celent notes that the use of cloud services by bank employees creates a potential risk. Al Pascual of...

  • TAKE THE SHACKLES OFF YOUR CELLPHONE. Haney, Mike // Popular Science;Jun2004, Vol. 264 Issue 6, p106 

    Provides information on unlocking the cellular phones that were locked by cell providers. Reason of network carriers for locking cellular phones; Ways to unlock phones; Importance of SIM cards when unlocking phones; Web sites that provide details on hacking cellular phones.

  • FENDING OFF FRAUD. SILVA, JERRY // Information Security;Apr2010, Vol. 12 Issue 3, p28 

    The article offers information on anti-fraud technology for online banking security. It discusses several security systems with a watch capability which include the eFraudNetwork from RSA security division of EMC and FraudNet from Fiserv. It explains the authentication system process and...

  • Intuit Builds a New Control Panel. Quittner, Jeremy // Bank Technology News;Apr2011, Vol. 24 Issue 4, p13 

    The article discusses the modernization of the FinanceWorks platform, which was launched way back in 2008 by Intuit Inc. Celent senior analyst Jacob Jegher states that such move is geared towards online banking with a dashboard-like experience that goes beyond the static display of information....

  • Mobile Consumers Seek Best Deals.  // WWD: Women's Wear Daily;8/17/2011, Vol. 202 Issue 35, p11 

    The article offers information on the survey conducted by consulting firm L.E.K. Consulting Group LLC on how mobile technology is changing the decision-making and purchasing behavior of consumers in the U.S. as of May 2011. The survey discovered that mobile consumers prefer to use their phones...

  • IT to battle security problems. Nelson, Matthew // InfoWorld;11/01/99, Vol. 21 Issue 44, p32 

    Discusses security measures against possible intrusion of computer hackers. Modus operandi of computer hackers; Government policy on computer hackers in the United States.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics