On 09/01/2010 01:39 PM, Perry E. Metzger wrote:
Hardly the first time such things have happened, but it does focus
the mind on what the threats are like.

http://krebsonsecurity.com/2010/09/cyber-thieves-steal-nearly-1000000-from-university-of-virginia-college/


In the mid-90s, dialup consumer online banking gave pitches on motivation for 
moving
to the internet (major justification was the significant cost in supporting 
proprietary
dialup infrastructure ... including all the issues with supporting serial-port 
modems;
one such operation claimed library of over 60 different drivers for various 
combinations
of customer PCs, operating systems, operating system levels, modems, etc).

At the same time, the dialup business/commercial online cash-management 
operations were
pitching why they would *never* move to the internet ... even with SSL, they had
a long list of possible threats and vulnerabilities.

Some of the current suggested countermeasures are that businesses have a 
separate,
dedicated PC that is dedicated solely to online banking operations (and *NEVER*
used for anything else).

a few recent posts on the subject:
http://www.garlic.com/~lynn/2010m.html#38 U.K. bank hit by massive fraud from 
ZeuS-based botnet
http://www.garlic.com/~lynn/2010m.html#53 Is the ATM still the banking 
industry's single greatest innovation?
http://www.garlic.com/~lynn/2010m.html#58 memes in infosec IV - turn off HTTP, a small 
step towards "only one mode"
http://www.garlic.com/~lynn/2010m.html#65 How Safe Are Online Financial 
Transactions?

--
virtualization experience starting Jan1968, online at home since Mar1970

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [email protected]

Reply via email to