TITLE

New Year, New Hacks?

AUTHOR(S)
Sausner, Rebecca
PUB. DATE
December 2010
SOURCE
Bank Technology News;Dec2010, Vol. 23 Issue 12, p9
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on new variants of criminal enterprise in the online banking industry which are expected to increase in 2011. Don Jackson of SecureWorks says that while security sophistication is advancing, there has been nothing revolutionary. A survey by PhoneFactor reveals that Zeus-style malware that results in man-in-the-middle attacks are viewed as the greatest threat to online banking nowadays. Some of the security hacks discussed include operation payback and mobile intercepts.
ACCESSION #
57490379

 

Related Articles

  • UNDER ATTACK. SAVAGE, MARCIA // Information Security;May2010, Vol. 12 Issue 4, p26 

    The article discusses about cyberattacks caused by hackers to sabotage online business banking accounts. One case refers to a small North Carolina office investigated by SecureWorks threat intelligence director Don Jackson, where the computer of the bookkeeper is infected by a Zeus Trojan. Zeus...

  • The rise of 'badvertising'. Vaas, Lisa // eWeek;11/26/2007, Vol. 24 Issue 36, p18 

    The article discusses the penetration of malwares in legitimate advertising web sites in the U.S. According to the author, users were able to access and download viruses and other malicious files without realizing the real content and damages brought by bad advertising wherein it reached 1,000%...

  • Botnet Bust-Up. Wolfe, Daniel; Quittner, Jeremy // American Banker;4/20/2011, Vol. 176 Issue 61, p5 

    Brief information is given about why the U.S. Justice Department issued a temporary restraining order to shut down the Coreflood malware botnet that steals computer data.

  • Help Unwanted. Quittner, Jeremy // American Banker;2/2/2011, Vol. 176 Issue 18, p5 

    Brief information is given about the discovery of Zeus Trojan malware in e-mails responding to job listings which could steal banking passwords and log-in information, according to the Internet Crime Complaint Center.

  • Self-Serve Malware. Wolfe, Daniel // American Banker;8/3/2011, Vol. 176 Issue 119, p7 

    The article presents brief information about malware identified by German police that affects computers with Windows operating systems and manipulates users into initiating online transfers of money from their bank accounts.

  • Hybrid SSL/keylogger Malware Surfaces.  // Database & Network Journal;Jun2007, Vol. 37 Issue 3, p24 

    The article reports that Tier-3 has revealed the presence a highly dangerous hybridized version of the Russian Gozi virus that not only has an integrally-coded keylogger, but has the ability to get data from an SSL stream. The keylogger capability is triggered only when an infected personal...

  • Creeping threat of stealth. Bradbury, Danny // Computer Weekly;11/25/2008, p22 

    The article focuses on the concept of stealth technology. It is reported that with modern malware trying to hide itself and generate profit for its writers, stealth technology is the rule rather than exception. The most effective form of stealth attack is rootkit which conceals its presence by...

  • Debate.  // SC Magazine: For IT Security Professionals (15476693);Dec2011, Vol. 22 Issue 12, p13 

    The article presents the insights of professionals Liam Ó Murchu and Don Jackson on whether the Duqu trojan malware is a treat or advantage to the computer industry.

  • Cloud computing creates crime "superhighway".  // American Agent & Broker;Feb2011, Vol. 83 Issue 2, p10 

    The article discusses the top ten cyber threat trends for 2011 due to cloud computing, which includes increased attacks of malware and viruses through universal serial bus (USB) drives, cyber crime through social network sites such as Facebook, and online fraud and money mules.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics