New Year, New Hacks?

Sausner, Rebecca
December 2010
Bank Technology News;Dec2010, Vol. 23 Issue 12, p9
Trade Publication
The article focuses on new variants of criminal enterprise in the online banking industry which are expected to increase in 2011. Don Jackson of SecureWorks says that while security sophistication is advancing, there has been nothing revolutionary. A survey by PhoneFactor reveals that Zeus-style malware that results in man-in-the-middle attacks are viewed as the greatest threat to online banking nowadays. Some of the security hacks discussed include operation payback and mobile intercepts.


Related Articles

  • UNDER ATTACK. SAVAGE, MARCIA // Information Security;May2010, Vol. 12 Issue 4, p26 

    The article discusses about cyberattacks caused by hackers to sabotage online business banking accounts. One case refers to a small North Carolina office investigated by SecureWorks threat intelligence director Don Jackson, where the computer of the bookkeeper is infected by a Zeus Trojan. Zeus...

  • Threat Stats.  // SC Magazine: For IT Security Professionals (15476693);Nov2011, Vol. 22 Issue 11, p10 

    Several statistics are presented depicting the cybercriminal activities and data security-related incidents worldwide including spams, malwares and computer attacks used by foreign hackers.

  • THE YEAR OF LIVING DANGEROUSLY ONLINE.  // Investigate;Apr/May2012, Vol. 10 Issue 131, Special section p42 

    The article discusses the issue concerning the various crimes committed online. It mentions that some computers were damaged due to viruses and malware and some data and social media accounts were hacked or even hijacked. Fake links to stories or videos have also emerged which may lead to...

  • Hybrid SSL/keylogger Malware Surfaces.  // Database & Network Journal;Jun2007, Vol. 37 Issue 3, p24 

    The article reports that Tier-3 has revealed the presence a highly dangerous hybridized version of the Russian Gozi virus that not only has an integrally-coded keylogger, but has the ability to get data from an SSL stream. The keylogger capability is triggered only when an infected personal...

  • Hackers plant malware on company sites to steal data and infect visitors. Grant, Ian // Computer Weekly;1/15/2008, p8 

    The article informs that the Sans Institute of the U.S. will warn about hackers who are using corporate websites to distribute malware and steal company information. The U.S. educational body's list of the 10 most dangerous cyber threats reveals growing technical expertise and professionalism...

  • THE digital UNDERGROUND. CHICKOWSKI, ERICKA // Entrepreneur;Aug2011, Vol. 39 Issue 8, p52 

    The article focuses on cybercrimes and the money made from online criminal enterprises, known as the cybercrime economy. Hacking methods are detailed including malware kits, botnet attacks, and identity theft. Ways of avoiding attacks are noted including checking the security of web hosts,...

  • Fraud Trends. Wolfe, Daniel // American Banker;11/14/2007, Vol. 172 Issue 220, p6 

    The article discusses trends in fraud, including phishing, cell phone hacking, electronic identity theft, and theft by falsifying signatures on debit transactions. The article suggests that banks foster the fraud when they encourage customers to use signatures rather than Personal...

  • Burning Question: Why Can't We Stop The Botnets? SINGEL, RYAN // Wired;Feb2011, Vol. 19 Issue 2, p55 

    The article examines why botnets continue to persist to deliver stolen information to servers around the world in 2011. Trend Micro senior threat analyst Paul Ferguson explains that criminals can access all public information by clicking on a bit.ly link. The author states the inability of...

  • Why Does A Remote Town In Romania Have So Many Cybercriminals? Bhattacharjee, Yudhijit // Wired;Feb2011, Vol. 19 Issue 2, p82 

    The article focuses on the cybercrime occurred in the town of Râmnicu Vâlcea which is also known as Hackerville in Romania. It was noted that most cybercriminals are engaged in electronic commerce scams and malware attacks on businesses. It explains the fake escrow services provided by...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics