Similar Articles |
|
OCC Bulletin May 15, 2000 |
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... |
OCC Bulletin January 8, 2007 |
Guidance to National Banks Concerning Schemes Involving Fraudulent Cashier's Checks This bulletin discusses factual and legal issues related to fraudulent cashier's checks, including associated risks for depositary banks, and provides recommendations to national banks for managing these risks and protecting their customers. |
OCC Bulletin September 8, 2004 |
FFIEC Customer Brochure To assist depository institutions' efforts in raising customer awareness of identity theft and similar crimes, "Protecting Customers' Personal Financial Information" outlines steps bank customers should take to reduce the risk of identity theft. |
OCC Bulletin December 23, 2005 |
Bank Security Act/Anti-Money Laundering Process for taking administrative enforcement actions against banks based on BSA violations. |
Bank Systems & Technology April 7, 2006 Peggy Bresnick Kendler |
Security Outlook A plethora of high-profile data breaches and concerns about identity theft have put the banking industry on high alert. To secure their information assets, banks must implement a cross-channel, multilayered approach that extends beyond technology. |
Wall Street & Technology July 28, 2004 Jim Middlemiss |
Gone Phishing In the latest identity-theft scam, fraudulent e-mails trick individuals into coughing up passwords to 'secure' financial data. |
Information Today June 2005 Phillip Britt |
No Phishing Allowed Today, the biggest threats for companies and consumers are the new crimes with funny-looking names: phishing, pharming, and spim. |
Bank Systems & Technology June 26, 2006 Deena M. Amato-McCoy |
Closing the Door on Criminals Banks need a consistent approach to fraud assessment and prevention, otherwise they will never truly get ahead of the problem. |
Bank Systems & Technology May 5, 2007 Maria Bruno-Britz |
Fraud Techniques Evolve in Parallel with Bank Products and Defenses As fraudsters' techniques evolve alongside the products and services offered by financial institutions, new steps must be introduced to stop them. |
PC World December 2004 Bob Tedeschi |
Protect Your Identity Phishers and other online thieves are targeting your money and personal data--and they're getting sneakier. Here's how to defend yourself, and how to erase the damage if you get scammed. |
CIO March 15, 2002 Sarah D. Scalet |
How to Plan for the Inevitable Knowing how to respond to a security incident can save companies time, money and even their reputation. Think you can't afford to create an incident response plan? Think again. Here's a budget-conscious guide to getting started... |
Bank Systems & Technology December 1, 2005 Eileen Colkin Cuneo |
Dealing With Data Theft After the Fact When a security breech occurs, a company handling it right can flip the negative into a positive and earn customers' respect and appreciation. If they handle it wrong, and the business will fight the stigma of being an untrustworthy organization indefinitely. |
Popular Mechanics February 2006 Brian Krebs |
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. |
InternetNews March 25, 2005 Susan Kuchinskas |
Phishing Attacks Jump 26% Phishers and pharmers up attacks, perhaps in response to decreased results. |
OCC Bulletin September 19, 2005 |
Hurricane Katrina The Office of the Comptroller of the Currency has issued guidance to assist national banks and their customers affected by Hurricane Katrina. |
Bank Technology News November 2006 Glen Fest |
Phishing: URL Deceit: Who's on The Beat? The 'Citibank.com' domain name is available to anybody who wants it (including phishers). Is a free market in all domain names a common good? |
Searcher October 2007 Paul S. Piper |
Phish Pharming: A Newer, More Profitable Aquaculture Detecting e-mail scams. |
Bank Systems & Technology February 18, 2009 Ashfield & Shroyer |
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. |
OCC Bulletin August 19, 2002 |
Bank Supervision Operations Policies & Procedures Manual (PPM) 5310-3 (REV), dated July 30, 2001, describes the OCC's policy for taking appropriate enforcement action in response to violations of law, rules, regulations, final agency orders and/or unsafe and unsound practices or conditions. |
Bank Systems & Technology February 1, 2007 Jim Eckenrode |
2007 Bank Technology Forecast: Challenges and Opportunities Some of the more critical and far-reaching priorities bank technology and business leaders will need to address in 2007: fraud detection, security, analytics, and SOA technology. |
CIO October 15, 2002 Sarah D. Scalet |
Fear Factor A reality check on CIOs' top five concerns about reporting security incidents. |
InternetNews August 24, 2005 Jim Wagner |
MSN Billing Phisher Arrested The FBI arrests an Iowa man they believe responsible for a number of phishing attacks targeting MSN customers. |
Bank Technology News August 2006 |
Sizing Up Security: Are U.S. Banks Trailing U.K. Banks? If best practices are indeed what the U.S. banking industry seeks with regard to online security, they'll likely find some of the answers across the pond. |
Bank Systems & Technology August 2, 2005 Phil Britt |
Fighting the New Face of Fraud Technology plays a critical role in banking fraud, both in creating new opportunities for fraud and offering new methods to defend against it. Financial services institutions must take a holistic approach to combating fraud. |
Bank Systems & Technology February 29, 2008 Nancy Feig |
Internal Fraud Still a Danger as Banks Adjust Strategy Internal fraud occurs every day at banks across the world. New internal fraud-detection technologies allow banks to identify suspicious employee behavior. |
Bank Technology News September 2006 |
Homeland Insecurity One of the toughest battles for bankers may be in combating online security breaches and sophisticated money laundering schemes. |
Bank Technology News April 2004 Karen Krebsbach |
Goin' Phishing Growing e-mail attacks threaten banks' bottom lines |
InternetNews March 3, 2005 Roy Mark |
New Senate Bill Looks to Hook Phishers The Anti-Phishing Act of 2005 targets both the e-mail bait and the Web site switch by entering two new crimes into the U.S. Code. |
InternetNews December 8, 2004 Susan Kuchinskas |
Phish Fighters Form Alliance Latest digital crime-fighting initiative unites ISPs, software vendors and financial institutions. |
CIO February 15, 2002 Abbie Lundberg |
Response Ability How do you respond to a computer security incident? |
Bank Technology News April 2006 Glen Fest |
Fraud Prevention: Engaging More Than The Enemy Banks could improve anti-fraud measures if they provided tools that draft customers into the battle. But it's not that simple for an industry still rife with soft spots. |
Bank Systems & Technology May 24, 2007 Maria Bruno-Britz |
Banks Using Security to Increase Customer Trust and Their Bottom Lines Banks realize that information security can increase client loyalty and lower costs. |
InternetNews July 21, 2006 Brian Livingston |
Phishing Filter Prevents E-Mail Identity Theft Scientists at Carnegie Mellon University have figured out a way to almost entirely detect and filter out phishing e-mails. |
CIO April 1, 2004 Sarah D. Scalet |
Phishing Pollutes E-Mail Stream It's the latest kind of Internet scam, one that's known as "phishing." Users are directed to a website and asked to enter their passwords. When they enter them the scammers capture the passwords for later use. |
IEEE Spectrum April 2006 Paul McFedries |
Gone Phishin' Microsoft is right to include antiphishing technology in Internet Explorer 7, because clearly we need all the help we can get. |
ONLINE May/Jun 2003 Mark Goldstein |
Who Was, WHOIS, and Who Will Be: Domain Name Ownership Research Tools Reasons for researching domain names range from the simple, to the complex. The range of rationales for doing domain name searches is matched by the range of products. |
OCC Bulletin November 10, 2004 |
Bank Supervision Operations The Enforcement Action Policy describes the OCC's policy for taking appropriate enforcement action in response to violations of laws, rules, regulations, final agency orders and/or unsafe and unsound practices or conditions. |
InternetNews February 25, 2005 Tim Gray |
Mozilla Updates Firefox Firefox 1.0.1 addresses numerous security vulnerabilities and approximately 40 other browser fixes. |
InternetNews November 19, 2004 Chris Nerney |
A Costly Identity Crisis If it seems to you that the phishing/spam problem has gotten worse lately, it (unfortunately) isn't your imagination. |
InternetNews June 8, 2004 Roy Mark |
Spam-Fighting Theories Far From Practice Gartner says filters, sender authentication-reputation initiatives not likely to provide short-term relief. |
OCC Bulletin August 24, 2005 |
Community Reinvestment Act The revisions to the Community Reinvestment Act regulations, effective September 1, 2005, include a new test -- the community development test -- for intermediate small banks. |
U.S. Banker October 2007 Lee Conrad |
Privacy Push: Banks Chafe Against Move To Block Use of SS Numbers Two major federal efforts to curb the widespread use of Social Security numbers are putting banks-the largest private-sector users of those nine sensitive numbers-on defense. |
Bank Technology News January 2006 |
Better Info Security Driven By Regulatory Compliance If information security is to become a strategic priority, then banks can start by reviewing existing practices -- their own and that of those companies with which they do business. |
Bank Technology News September 2006 Glen Fest |
Site Authentication: Making Sites Spoof Proof An interoperability project by the FSTC aims to standardize how banks validate their sites to users. |
InternetNews January 20, 2006 Sean Michael Kerner |
FBI: PC Crime is Common, Costly With computer security issues mounting, the typical response is to just add more security. But does it matter? |
InternetNews November 11, 2004 Sean Michael Kerner |
Is Your Domain Locked Down? ICANN's new domain transfer policy about to take effect has registrars raising questions about whether it will actually settle domain 'slamming' disputes. |
InternetNews June 29, 2004 Susan Kuchinskas |
Gates on Spam Microsoft Chairman Bill Gates offered a "fireside chat" to beleaguered e-mail users Monday, bucking them up and promising them eventual relief. Redmond is on it, okay, guys? |
Bank Systems & Technology July 29, 2008 Ron Shevlin |
Banks Should Empower Recipients in the Fight Against E-Mail Fraud Banks need to implement e-mail authentication protocols to help prevent e-mail fraud. |
InternetNews January 30, 2006 Sean Michael Kerner |
ID Theft And Internet Fraud Declining? New studies indicate that the Internet isn't as dangerous as other places. |
PC Magazine April 20, 2004 Larry J. Seltzer |
The Lookout: Microsoft's Plan On February 24, Microsoft Chairman Bill Gates announced a proposed open standard to deter e-mail spoofing, a scheme deemed "Caller ID for E-Mail." |