TITLE

WikiLeaks Wakes Up Fraud Innovation

AUTHOR(S)
Adams, John
PUB. DATE
February 2011
SOURCE
Bank Technology News;Feb2011, Vol. 24 Issue 2, p26
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the solutions for bank industry in addressing WikiLeaks. It says that various security options including fingerprint smartphones, USB ports, and social network analysis can help banks detect suspicious transactions. It states that social networking analysis examines wire transfers' records which create a network of the financial activity of users. Moreover, fingerprinting technology analyses the use and access of devices to bank's network in preventing leaks of documents.
ACCESSION #
58688762

 

Related Articles

  • Teure Lecks.  // Die Bank;mar2012, Issue 3, p64 

    The article discusses the various costs to businesses of data leaks and efforts to prevent them in Europe and the United States.

  • Security chip, interface aim to assist electronic commerce. Knowles, Anne // PC Week;1/16/95, Vol. 12 Issue 2, p15 

    Reports on developments concerning the security of on-line transactions as of January 16, 1995. Unveiling of an interface for the security of Internet transactions by MasterCard International Inc. and Netscape Communications; Introduction of AT&T Bell Laboratories's Information Vending...

  • Security Challenges in Using Social Media. Bahadur, Gary // Siliconindia;Jan2011, Vol. 14 Issue 1, p26 

    The article focuses on the security challenges regarding social media usage by employees, which has been incorporated in the business environment. It states that companies should have some form of guidance or governance or corporate standard on social media utilization to prevent employees from...

  • Make your PC hack-proof while banking and shopping.  // Web User;9/19/2013, Issue 327, p58 

    The article offers step-by-step instructions for installing and using the software Safepay for safety while making online payments.

  • ANATOMY OF AN ONLINE BANKING HEIST.  // PC Pro;Nov2012, Issue 217, p020 

    The article discusses how criminals are building a network of infected machines and a database of balances and passwords by planting malware on banking customers' machines. It details the use of malware such as Zeus or SpyEye to steal bank data which are then sold to a second gang that accesses...

  • Analysis of request balancing in non-dedicated web clusters. Sato, Jô; Martini, João Angelo; Lara Gonçalves, Ronaldo Augusto // Acta Scientiarum: Technology;Oct-Dec2011, Vol. 33 Issue 4, p393 

    The amount of services and information available on the Internet, such as banking and business transactions, social networks, blogs and even interactive games, has steadily increased. Web providers must be prepared to support this growing demand for information and communication. In this sense,...

  • Getting Face Time Online Appealing Yet Ignored. Malakian, Anthony // U.S. Banker;Mar2009, Vol. 119 Issue 3, p23 

    The article focuses on the contribution of social networking sites in the success of several communities in the financial industry. It says that social networking sites are used to be ignored by bankers and prefers to converse with customers personally. It notes that social networking had made a...

  • Banks Consider Quora to Get Deeper Ties with Customers. Quittner, Jeremy // American Banker;1/20/2011, Vol. 176 Issue 11, p8 

    The article focuses on the discussion web site Quora, where consumers can ask questions about financial services, and the interest of banks like BankSimple.com and Citigroup Inc. to use Quora to assist consumers.

  • CHARTING a COURSE in SOCIAL BANKING.  // Bank Technology News;Sep2009, Vol. 22 Issue 9, Special section p6 

    The article focuses on the importance of social media network to banks. It is claimed that some banks are preferring for a low-risk, low-cost approach by using the social media networks, Facebook and Twitter. It mentions an effort of Federal Reserve Bank of Chicago in Illinois on creating a blog...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics