High-tech criminal gangs with access to sophisticated keylogging viruses pose a growing threat to banks and financial institutions.Recently, England’s High Tech Crime Unit foiled an effort to steal over $100 million from a Japanese bank in London. The gang gained access to Sumitomo Corp.’s computer...
We all know the threats posed by spyware to enterprise networks: user ID and password theft, financial loss, productivity drain, intellectual property theft. Security practitioners have two defenses at their disposal: the human and the technical. While the technology for combating spyware is improving, antivirus...
A. RISK DISCUSSIONIntroductionA significant number of financial institutions1 regulated by the financial institution regulatory agencies (Agencies)2 maintain sites on the World Wide Web. Many of these websites contain weblinks to other sites not under direct control of the financial institution. The use of weblinks...
National Security InstitutePopular E-Greeting Card Carries TrojanAn e-mail message that claims to hold a link to a greeting card is responsible for a recent series of “Trojan horse†cyber-attacks. The e-mail directs recipients to click on a link in order to pick up an e-card from a “secret...
New data shows that on average, businesses are spending an eye-popping amount of money every month in IT resources to fight the spyware plague.FaceTime Communications, an IT security provider, surveyed more than 1,000 IT managers and end users. The key finding: spyware and other unsanctioned downloads are...
Internet-related crime, fraud, and damage is going through the roof. Here we take a look at what Consumer Reports has named the four major online threats you need to defend against.VIRUSES AND WORMSOldies but goodies (baddies?), these have plagued computer users for nearly two decades. They typically infect computers...
TO:  Chief Executive Officers and Chief Information Technology Officers of National Banks, Federal Branches, Service Providers, Department and Division Heads, and Examining PersonnelPURPOSEThis alert is intended to raise awareness of an increasingly common Internet fraud called “phishing†and...
Many attacks in the past decade have focused on vulnerabilities at the network and operating systems level. Nowadays, hackers seem to be more closely focusing on application level attacks. There are several reasons for this.Too many network protocol suits are being used by organizationsOrganizations tend to use too...
Ever inventive, cyber-criminals who specialize in phishing scams are finding new ways to hook you and your personal financial information.The days of amateurish phishing expeditions filled with typos are long gone. It’s our hope that by learning of the latest techniques, you can stay one jump ahead of this...
Most banks are surprisingly vulnerable to identity theft, according to a hired gun who makes his living by penetrating their security systems.With over 100 successful heists to his credit, Jim Stickley is one of the most successful bank robbers of all time. But he’s not after the cash. He’s after...
Bankers Online :Skimming credit and debit card cardholder information has become an easy way for criminals to steal identities, thanks to new technologies being offered via the Internet. A Tunisian national was recently arrested in Pennsylvania after using a hand-held skimming device he purchased over the web to...
What's your estimate of how many of your institution's customers have installed anti-spyware on their computers? If you estimated anything higher than 10-15%, your nickname's probably Pollyanna. In truth, a terrifyingly high percentage of computers are not protected against the spyware threat and as a data cache...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.