WikiLeaks Wakes Up Fraud Innovation

Adams, John
February 2011
Bank Technology News;Feb2011, Vol. 24 Issue 2, p26
Trade Publication
The article focuses on the solutions for bank industry in addressing WikiLeaks. It says that various security options including fingerprint smartphones, USB ports, and social network analysis can help banks detect suspicious transactions. It states that social networking analysis examines wire transfers' records which create a network of the financial activity of users. Moreover, fingerprinting technology analyses the use and access of devices to bank's network in preventing leaks of documents.


Related Articles

  • La era de las filtraciones. Roura, VĂ­ctor // Revista Mexicana de Comunicacion;oct-dic2012, Vol. 24 Issue 132, p23 

    No abstract available.

  • Teure Lecks.  // Die Bank;mar2012, Issue 3, p64 

    The article discusses the various costs to businesses of data leaks and efforts to prevent them in Europe and the United States.

  • TERRORIZING WIKILEAKS: WHY THE EMBARGO AGAINST WIKILEAKS WILL FAIL. CANNON, SAMUEL C. // Journal on Telecommunications & High Technology Law;Spring2013, Vol. 11 Issue 1, p305 

    The article offers information on U.S. efforts to shut down the whistle-blowing website WikiLeaks. Topics discussed include the removal of terrorist websites run by the organizations such as Palestinian Islamic Jihad (PIJ) and Al Qaeda by the combined efforts of the U.S. government and the...

  • Crafting an Effective Data Security Policy. Kroll, Karen // Compliance Week;Mar2013, Vol. 10 Issue 110, p52 

    The article offers information on creating company's effective data security policy. It mentions the result of recent survey which shows that executives are worried more on customer or employee data leaks than Securities and Exchange Commission's investigations. It also suggests to avoid...

  • A look at the leaked messages from Grow's Facebook account. Posten, Audrey; Parnon, John // UWM Post (Milwaukee, WI);4/9/2012, Vol. 56 Issue 25, p1 

    The article focuses on the leaked messages from the Facebook account of Eric Grow, vice presidential candidate of the University of Wisconsin (UW)-Milwaukee Student Association that highlight sexist and racist remarks on other members of the association and a plot to rig the presidential election.

  • Hidden messages. Pearson, Andrew // Utility Week;10/6/2006, Vol. 26 Issue 4, p24 

    This article deals with the issue of insider leakage of sensitive information, whether inadvertent or malicious, facing utilities in 2006. With increased legislation and high penalties for non-compliance, let alone potentially huge damage to reputation and credibility, utilities must recognise...

  • Security/Ideas.  // Wired;Sep2015, Vol. 23 Issue 9, p90 

    The article presents security-related ideas. Topics covered include the hosting by news outlets of dark web drop sites for anonymously leaked tips and documents, the conduct of studies which showed that most visitors to sites are spending their bitcoins on drugs and the purpose of the...

  • Using Online Social Networks In Counterterrorism And Law Enforcement. Gewirtz, David // Journal of Counterterrorism & Homeland Security International;Fall2009, Vol. 15 Issue 3, p8 

    The article discusses the application and significance of online social networks in counterterrorism and law enforcement. It notes that this real-time search approach to law enforcement and counterterrorism resulted in several arrests. However, it points out that scanning Twitter feeds is not...

  • Job board purely links in to banking.  // Recruiter;5/4/2011, p8 

    The article focuses on the job board, PurelyBanking, for banking and finance sector which allows candidate to create searchable profile via LinkedIn.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics