Skip to main content

Home/ IB ITGS/ Group items tagged bank

Rss Feed Group items tagged

Chalana Perera

Online Bank Account Hackers - 4 views

  •  
    spear phishing, malware, spyware, online banking, transfer hacking, key stroke logger
  •  
    spear phishing
Farah Alam

BBC NEWS | Business | Africa's mobile banking revolution - 0 views

  • Millions of Africans are using mobile phones to pay bills, move cash and buy basic everyday items.
  • Setting up a bank account on your phone is straightforward. All you do is register with an approved agent, provide your phone, along with an ID card, and then deposit some cash onto your account.
anonymous

"Vishing" Is Latest Twist In Identity Theft Scam - 0 views

  •  
    Vishing, similar to phising scams that rely on email to steal costomer identities. Various users would click on links sent to them by fraud looking websites, bank names, etc. The "vishers" would then redirect them to a automated call service very similar to the original thing, and then they would obtain the information given by the consumer.
anonymous

Identity Theft and Fraud - 0 views

  •  
    Description of Identity theft, and that it is indeed a crime. Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. In the US and Canada many poeple have reported that unauthorized persons have taken frauds out of their bank or finacial accounts, or the worst care, taken over their identity all together (another person who is using someone else's name/credit card).
Eunice Vincent

BBC News : Two held in global PC fraud probe - 1 views

  • Two held in global PC fraud probe
  • Two held in global PC fraud probe
  • Two held in global PC fraud probe
    • Eunice Vincent
       
      Eunice Trojan- information theft security business, government
  •  
    Two suspected hackers are arrested in an investigation into software designed to steal banking information.
Shih-Chen Chiu

Wallet of the future? Your mobile phone - CNN.com - 0 views

  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
    • Shih-Chen Chiu
       
      social& ethical issue -people and machines ITsystems in a social context -Applications -Integrated Systems Areas of impact -Business & employment -Scoence & the enviornment
  • ...4 more annotations...
  • And technology that turns phones into credit cards and IDs poses several potential problems.
    • Shih-Chen Chiu
       
      social & ethical issues -security -authenticity -integrity -control
  • In the late 1990s and early 2000s, banks and cell phone makers started conducting trials with U.S. customers. Limited groups of people were given the ability to scan their phones to make payments, enter stadiums and access public transit.
    • Shih-Chen Chiu
       
      areas of impact -business & employment
  • If phones replace wallets, would-be thieves will see every person walking down the street talking on his or her phone as a target for robbery, said Lillie Coney, associate director of the Electronic Privacy Information Center.
    • Shih-Chen Chiu
       
      social & ethical issues -security
  • Eye scans and fingerprints would make phone IDs and payments more secure, Brown said. The ID technology might work like a corporate security badge, which pulls up personal information when scanned.
    • Shih-Chen Chiu
       
      social & ethical issues -reliability -security -integrity -privacy IT systems in a social context hardware integrated systems
anonymous

BBC NEWS | Technology | Web tool oversees Afghan election - 0 views

  • Their reports feature alongside those of full-time Afghan journalists to ensure the election and reporting of it is as "free
  • The Alive in Afghanistan project plots the SMS reports on an online map.
  • The text messages are collected via a free-platform known as FrontlineSMS, developed by UK programmer Ken Banks.
  • ...8 more annotations...
  • Any attempt to rig or interfere with Afghanistan's election could be caught out by a system that allows anyone to record incidents via text message.
  • authenticity.
    • Chalana Perera
       
      stakeholder 2
  • Ushahidi
    • Chalana Perera
       
      stakeholder 1
  • National Security Council
    • anonymous
       
      Stakeholder 3
  • "We hope to enable people to report on what is going on in the country
    • anonymous
       
      Stalkholder 4, the people create the impact, and are going to use the SMS technology.
  • of Afghanistan has asked all domestic and international media agencies to "refrain form broadcasting any incidence of violence during the election process".
    • anonymous
       
      Areas of Impact>Politics and Government
  •  
    Any attempt to rig or interfere with Afghanistan's election could be caught out by a system that allows anyone to record incidents via text message.
anonymous

Gangs are stealing taxpayers' passwords and submitting claims for false tax returns them. - 0 views

  • Gangs are stealing taxpayers' passwords and submitting claims for tax refunds to be paid to them, HM Revenue and Customs has warned.
    • Salman Rushdi
       
      Impact: Politics- Stealing against the law
  • details via the internet.
    • Salman Rushdi
       
      Comm Sys: Via Internet
  • They then used these details to make fraudulent repayment claims, requesting funds be sent to other bank accounts.
    • Salman Rushdi
       
      Security. Authenticity.
  • ...1 more annotation...
  • ugh the self-assessment repayments system has been disc
Chalana Perera

Exploiting Browser Information & Privacy - 0 views

  • easy it was to exploit security loopholes
    • Chalana Perera
       
      Easy exploitation leads to a lot of negative consequences and areas of impact include all sorts of education online, banking and financial reserves, businesses and mainstream market affairs, governmental and nongovernmental work and damage to personal information and biological/health data. This also harms intellectual property and ideas can be stolen online far easier than usual... reliability & security....
  • redirect traffic
    • Chalana Perera
       
      Redirecting internet connection or regular user traffic could lead to a backlog of information on the web and a loss of personal details and this again as huge areas of impact including security, reliability and extended impact on finances and personal details & anonymity....this also affects systems in the social context with networks being hacked and codes and enscriptions being changed..
  • access and steal any information exchanged
    • Chalana Perera
       
      Stealing information can also connect to software and the usage/creation tools of software and other application....communication systems are also greatly affected such as wire tapping systems
Chalana Perera

West Africa looses and regains internet connection - 0 views

  • A cable fault that caused a major blackout
  • causing severe problems for its banking sector, government and mobile phone networks.
  • Services were severely disrupted or knocked out in Togo, Niger and Benin.
  • ...4 more annotations...
  • Countries had to either reroute traffic overland or use expensive satellite links to maintain connectivity.
  • Nigeria was particularly badly hit because around 70% of its bandwidth is routed through neighbouring Benin.
  • SAT-3 cable lands in eight West African countries as it winds its way between Europe and South Africa.
  • by Suburban Telecom, was set up to bypass Nigeria's principal telecoms operator Nitel which runs the SAT-3 branch cable which lands in Nigeria.
Omkar Naik

BBC NEWS | UK | Small town 'online crime hotspot' - 0 views

  • Last year, 24% of all internet purchases there were made using stolen credit card details, according to security company The Third Man.
  • Durham Police say investigations are being hampered because people are told to report fraud to their banks first.
  • Shildon, in the DL area, is a former industrial town with a population of 10,000, and police believe that just one or two people may be responsible for the crime wave.
Eunice Vincent

Warning, Your Cell Phone May Be Hazardous To Your Health: Gear + Gadgets: GQ - 2 views

  • Earlier this winter, I met an investment banker who was diagnosed with a brain tumor five years ago. He's a managing director at a top Wall Street firm, and I was put in touch with him through a colleague who knew I was writing a story about the potential dangers of cell-phone radiation. He agreed to talk with me only if his name wasn't used, so I'll call him Jim. He explained that the tumor was located just behind his right ear and was not immediately fatal—the five-year survival rate is about 70 percent. He was 35 years old at the time of his diagnosis and immediately suspected it was the result of his intense cell-phone usage. "Not for nothing," he said, "but in investment banking we've been using cell phones since 1992, back when they were the Gordon-Gekko-on-the-beach kind of phone." When Jim asked his neurosurgeon, who was on the staff of a major medical center in Manhattan, about the possibility of a cell-phone-induced tumor, the doctor responded that in fact he was seeing more and more of such cases—young, relatively healthy businessmen who had long used their phones obsessively. He said he believed the industry had discredited studies showing there is a risk from cell phones. "I got a sense that he was pissed off," Jim told me. A handful of Jim's colleagues had already died from brain cancer; the more reports he encountered of young finance guys developing tumors, the more certain he felt that it wasn't a coincidence. "I knew four or five people just at my firm who got tumors," Jim says. "Each time, people ask the question. I hear it in the hallways." It's hard to talk about the dangers of cell-phone radiation without sounding like a conspiracy theorist. This is especially true in the United States, where non-industry-funded studies are rare, where legislation protecting the wireless industry from legal challenges has long been in place, and where our lives have been so thoroughly integrated with wireless technology that to suggest it might be a problem—maybe, eventually, a very big public-health problem—is like saying our shoes might be killing us.
    • Eunice Vincent
       
      This is the part of this article i will use as the stimulus
anonymous

Is Spam Here to Stay? - (Information Today, News Bank) - 0 views

  • http://docs.newsbank.com/openurl?ctx_ver=z39.88-2004&rft_id=info:sid/iw.newsbank.com:PPCT&rft_val_format=info:ofi/fmt:kev:mtx:ctx&rft_dat=129EEE11E71D65B0&svc_dat=InfoWeb:newcat&req_dat=B4CD8BC1A80B43D794A5481B6FC40219
  •  
    This article gives a little background information of spam in 2006, and 2008. It talks about the costs, ussage and cases. Spam acounts for nearly 200 billion messages each day, which translates to about 90% of email worldwide. The U.S. is the biggest source at 17.2%.
1 - 20 of 23 Next ›
Showing 20 items per page