Beierly, Ingrid
July 2010
Hospitality Upgrade;Summer2010, p140
Trade Publication
The article discusses the threat of keystroke logging that transmits important payment card information and other confidential data to computer hackers particularly in the hospitality industry in the U.S. It provides mitigation strategies and measures to lessen the risk of exposure to critical processing systems for card data security. It mentions the importance of securing remote access, implementing a secure network configuration, and checking the systems against key logger malware signatures.


Related Articles

  • Backdoor Bedlam. Mimoso, Michael S. // Information Security;May2008, Vol. 11 Issue 4, p8 

    The article discusses backdoors in computer systems which are inserted by developers for support purposes but could present attackers with a cheaper means of malware distribution and system access. Some backdoors contain a hidden functionality or invisible parameters in web applications that are...

  • Keeping hackers out of your IT systems.  // Mortgage Strategy;12/19/2011, p23 

    The article presents information related to cyber terrorism and presents suggestions to avoid it. It is noted that accounts with low protection are generally being targeted by hackers. It is mentioned that it is the equivalent of leaving the front door open for a burglar to walk in if simple...

  • Threat Stats.  // SC Magazine: For IT Security Professionals (15476693);Feb2015, Vol. 26 Issue 2, p10 

    Statistics are presented on cyber threats including the monthly evolution of mobile malware, top breaches resulting to data loss for the month of December 2014, and perceived risk index of cyber security.

  • Mobile Cyber-Attacks to Double By End of 2011.  // Channel Insider;10/6/2011, p1 

    The article focuses on the growth of mobile cyber attacks by the end of 2011. According to the International Business Machine Corp. (IBM) Mid-Year X-Force report, mobile operating system vulnerabilities is expected to double while almost all of the flaws in seen in the first half of 201 involved...

  • THREAT OF THE MONTH. Howard, Fraser // SC Magazine: For IT Security Professionals (UK Edition);Jul2007, p11 

    The article provides information on drive-by downloads, a type of cyber attack that occur when a cyber criminal injects malicious code on to a web site, and then attempts to entice computer users to visit the infected page in an attempt to install malware on their personal computers (PCs). This...

  • If hackers don't exist governments would have to invent them.  // Flare (Pakistan);8/15/2012, p49 

    The article reports on the factors contributing to the occurrence of data breaches, as identified by the Private Rights Clearinghouse. The clearinghouse asserts that data-breach incidents were usually caused by the loss or improper disposal of paper records, portable devices and desktop...

  • OSX.Trojan.PokerStealer Trojan Horse Attempts to Take Control of Macs.  // Software World;Jul2008, Vol. 39 Issue 4, p23 

    The article offers information on the virus found in Macintosh (Mac) Operating System (OS) X in Great Britain. It states that a Trojan horse has been found in PokerGame, a wild masquerading program wherein it is a shell script encapsulated in an application, distributed in a 65 kilobyte (KB) Zip...

  • IBM Report: Stealthy, Targeted Online Attacks Continue To Grow In 2007.  // Software World;Sep2007, Vol. 38 Issue 5, p17 

    The article reports on statistics which explores the growth of malicious software (malware) volume and sophistication in exploit leasing in Great Britain. Based on the 2006 International Business Machines Corp.'s (IBM's) X-Force research and development team, providers managed to purchase...

  • Data Security in the 'Connected' era. Dube, Vijay // Siliconindia;May2012, Vol. 15 Issue 5, p13 

    The article reports that the growth of smart connected devices such as smartphones and tablets also increases the need for data security. The author states that the data stored on smart devices has become more enticing as a target for hackers and malware. He notes that companies should adopt...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics