TITLE

A Card SuperSwiper

AUTHOR(S)
Sisk, Michael
PUB. DATE
March 2011
SOURCE
Bank Technology News;Mar2011, Vol. 24 Issue 3, p20
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the personal computer security initiative at Kirkpatrick Bank by offering the card reader called NetSecure Technologies' Smart Swipe to its customers. It says that 80% fraud losses were attributed to the use of online debit cards by their bank customers. It mentions that the card reader is plugged into home computers and offers protection of sensitive financial and personal information from endpoint threats. Issues on customers' willingness to pay is also discussed.
ACCESSION #
59436133

 

Related Articles

  • Prioritizing Internet Security. Demers, Marie Eve // Electronic News;01/22/2001, Vol. 47 Issue 4, p46 

    Calls for Internet-based companies to increase investments that prioritize computer and data security. Estimated corporate loss from external hacking and internal piracy; Percentage of information technology budget spent on data security; Advice on the selection of a security company;...

  • FIDNet Alive And Searching For Dollars. Brown, Doug // Inter@ctive Week;04/03/2000, Vol. 7 Issue 13, p108 

    Focuses on the Federal Intrusion Detection Network (FIDNet) in the United States. Comments from Jim Dempsey of the Center for Democracy and Technology about the system; One of the problems of FIDNet; Proposed spending on the program in 2001; Criticism of the program in 1999.

  • A FORMAL CLASSIFICATION OF INTERNET BANKING ATTACKS AND VULNERABILITIES. Peotta, Laerte; Holtz, Marcelo D.; David, Bernardo M.; Deus, Flavio G.; de Sousa Jr., Rafael Timóteo // International Journal of Computer Science & Information Technolo;Feb2011, Vol. 3 Issue 1, p186 

    A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thorough analysis of current security models, we propose a guidelines for designing secure internet...

  • The Shaky State of Security. Roberts, Paul F. // InfoWorld;7/26/2004, Vol. 26 Issue 30, p32 

    This article reveals the results of an online survey on computer security systems of business enterprises in the U.S. in June 2004. The picture that emerged from a poll of more than 600 information technology professionals in the survey was one of wariness in the face of a wide range of threats,...

  • The Underutilised Security Bulwark: Database Logs. Chuvakin, Anton // Database & Network Journal;Jun2007, Vol. 37 Issue 3, p3 

    The article urges computer security personnel to use database logs which are essential for accurate and effective monitoring of user activities and/or preventing insider attacks. Aside from the security requirements, database logging and log analysis have to be performed for IT auditors to allow...

  • Rage Against The Machine. Hogan, Mike // Entrepreneur;Jan2001, Vol. 29 Issue 1, p52 

    Focuses on the danger in doing business via the Internet. Experience of Michael Roman, owner of Inhouse Appraisal Corp. in Toronto, Canada; Clarification about hacking; Worth of the damage caused by the LoveBug virus; Information on Uber hackers; Suggestions for protecting computer systems from...

  • YOU CAN DROWN IN TOO MUCH SECURITY. BAUGHMAN, KEVIN // Behavioral Healthcare;Aug2008, Vol. 28 Issue 8, p31 

    The article discusses the issue about security policy implementation for behavioral healthcare providers in the U.S. Several issues arise for compliance of the security policies set by agencies as it prevents employees from working efficiently due to the number of times logging on and off the...

  • Protect Your Privacy Online. Maranjian, Selena // NEA Today;Nov2005, Vol. 24 Issue 3, p48 

    This article provides online privacy-related tips geared for educators. Set Web browser to let you know when various parties want to put cookies, files that can be read by an outside Web server, on your computer and then accept or deny them. If you use your main email address in public online...

  • THE WEAKEST Link. Cobb, Michael // Information Security;Dec2005, Vol. 8 Issue 12, p40 

    The article presents information on how computer criminals launch application-layer attack and how to use application layer firewalls to prevent such attack. According to market research firm Gartner, 75% of computer criminals attack the application vulnerabilities and cause irreparable damage....

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics