MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Bank Systems & Technology
November 26, 2007
Maria Bruno-Britz
Javelin Finds More Banks Using Multi-factor Authentication With the FFIEC deadline for implementing multifactor authentication now but a memory, banks have improved their efforts to secure customers' information, according to a study. However, there is more banks can do. mark for My Articles similar articles
InternetNews
July 20, 2004
Ryan Naraine
MasterCard, Others Plug Script Injection Leak Credit card giant MasterCard is among many online financial institutions rushing to fix Web site design security flaws. mark for My Articles similar articles
Bank Systems & Technology
March 7, 2005
Cynthia Ramsaran
ID Theft Hits Paper Harder Despite growing fears of online fraud related to Web-based banking services, the increase in identity theft is hitting consumers closer to home than in cyberspace. Identity theft crimes are more often committed off-line rather than online. mark for My Articles similar articles
InternetNews
July 26, 2010
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. mark for My Articles similar articles
Bank Technology News
March 1, 2008
Glen Fest
Thwarted On-Line, Crime Looks to Past A new identity theft report survey finds a continuing overall decline in fraud numbers and victims, but unfortunately a rapidly rising number of "vishing" and other hands-on alternatives to catching consumers off guard. mark for My Articles similar articles
InternetNews
February 12, 2010
Study Puts Identity Theft Cost at $54B in 2009 Research firm Javelin estimates that more than 11 million Americans were victims of identity theft last year, a 12 percent increase that led to tens of billions of dollars in costs. mark for My Articles similar articles
U.S. Banker
October 2008
John Adams
Reinforcements: Banks Go Bad, Vets Go Back in the Breach As more banks fail, the FDIC may recruit retired workers specializing in workouts. mark for My Articles similar articles
PC Magazine
December 20, 2006
Robert Lemos
The New Security Threats More secure operating systems mean that attackers are looking elsewhere for holes to sneak through. mark for My Articles similar articles
Bank Technology News
February 2011
Shane Kite
Mobile Apps Insecure? Banks need to improve cell phone banking applications' security or face losing customers frightened by the risk, security experts say. mark for My Articles similar articles
Bank Systems & Technology
December 1, 2005
Phil Britt
High Tech, High Touch and High Net Worth As banks attempt to expand their private banking operations to attract high-net-worth customers, they're enhancing their support technologies to provide better customer service, improve profitability, and expand product and service offerings. mark for My Articles similar articles
InternetNews
October 21, 2010
Mozilla, Google Improve Browser Security Both Firefox and Chrome get security updates. mark for My Articles similar articles
InternetNews
April 29, 2011
Mozilla Firefox 4.0.1 Fixes 14 Vulnerabilities The first Firefox 4 security update is now available, patching a long list of critical memory corruption flaws. mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
InternetNews
August 25, 2010
More Security Holes in Software, Fewer Patches According to IBM's X-Force security research group, vulnerabilities are proliferating, and while companies are getting better about reporting those flaws, the number of unpatched problems continues to rise. mark for My Articles similar articles
JavaWorld
July 2001
Todd Sundsted
Secure your Java apps from end to end, Part 2 Little mistakes during application development often lead to big security problems for developers and users. This article introduces the most common types of design and implementation flaws that turn into security vulnerabilities and describes how to avoid them... mark for My Articles similar articles