TITLE

Data Breaches Back in Spotlight After $45M ATM Heist

AUTHOR(S)
Crosman, Penny
PUB. DATE
May 2013
SOURCE
American Banker;5/14/2013, Vol. 178 Issue 74, p9
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article refers to an international theft perpetrated against Rakbank and the Bank of Muscat and mentions Verizon telecommunication firm's Data Breach Investigations Report which found 40 percent of network intrusions incorporate malware and 76 percent exploit stolen credentials. Security analysts Alphonse Pascual and Rick Holland talk about spear phishing, malware, authentication, and monitoring automated teller machine (ATM) transactions.
ACCESSION #
87603821

 

Related Articles

  • Analysis of a two-factor graphical password scheme. Catuogno, Luigi; Galdi, Clemente // International Journal of Information Security;Oct2014, Vol. 13 Issue 5, p421 

    Graphical passwords are a promising research branch, but implementation of many proposed schemes often requires considerable resources (e.g., data storage, high quality displays) making difficult their usage on small devices, such as old-fashioned ATM terminals. Furthermore, most of the time,...

  • Hackers steal millions in cash from ATMs.  // Flare (Pakistan);Nov2014, p54 

    The article focuses on the use of malware, including Tyupkin, to attack automated teller machines (ATMs) in Asia, Europe and Latin America. Topics discussed include the increase in the incidence of ATM attacks, the prevention of these criminal activities and the case of a Russian man charged...

  • Loose Ends. Wolfe, Daniel // American Banker;7/9/2008, Vol. 173 Issue 131, p5 

    This article reports on a security pin breach for customers of Citigroup Inc. Although Citigroup's customers were affected, the security breach occurred through a third party server at automated teller machines in 7-Eleven stores. According to Wired.com, the third party is either Cardtronics...

  • Behind the $1.6 Million Heist at StubHub: Recycled Passwords. Crosman, Penny // American Banker;7/28/2014, Vol. 179 Issue 115, p13 

    The article discusses an attack by computer hackers against online ticket seller StubHub. Hackers used stolen login credentials to buy 3,500 electronic tickets to entertainment events, which were then resold. Security consultant Robert Siciliano says the hackers probably used malware, phishing...

  • Costly Breaches Cheap to Deploy.  // Credit Union Times;7/15/2015, Vol. 26 Issue 25, p1 

    The article discusses the cheap deployment of costly data breaches, which has increased in 2014 from the previous year, according to an IBM/Ponemon study. Topics discussed include the number of pieces of malware created by cybercriminals in 2014, the monthly service charge for using an...

  • Verizon Reports Rise In Cyber Espionage And Phishing Attacks.  // Defense Daily;5/6/2013, Vol. 258 Issue 27, p3 

    The article presents information on the Data Breach Investigations Report from Verizon Communications Inc., according to which data breaches resulting from phishing attacks have increased four times during 2012. The company says that the increase in phishing activity has been due to rising cases...

  • Security Threats Reach New Levels of Sophistication.  // CRN;11/26/2007, Issue 1254, p11 

    The article reports on the increasing level of tactics by cybercriminals. It is stated that cybercrimes involve the practice of phishing scams, malware and data loss whom many security professionals address as a serious security threat. Currently, such criminals often gain high-stake payoffs...

  • Stay Safe Online.  // Web User;7/16/2014, Issue 349, p12 

    The article presents news about latest online threats and advice from computer security experts. According to anti-phishing Website PhishMe, cybercriminals have used Dropbox links in phishing emails to install malware on the PCs of unexpecting victims. According to Financial Fraud Action UK,...

  • M-Pass: Web Authentication Protocol Resistant to Malware and Phishing. Yadav, Ajinkya S.; Gupta, A. K. // International Journal of Computer Applications;Apr2014, Vol. 92, p1 

    In this digital world all information and data is kept safe by passwords. The simple and convenient format of password is in the form of text. But, text passwords are not always strong enough and under different vulnerabilities they are very easily stolen and changed. When a person creates a...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics