The receptionist had gone home for the evening. The bank's operations office was dark and quiet, except for the glow of a computer screen and the faint sound of a lookout whispering, "Do it - quick"' to his partner.

Less than a minute later, the stealthy pair walked briskly from the building after installing a piece of software on a personal computer. The program recorded the PC user's system password and security code when he signed on the next morning.

Subscribe Now

Access to authoritative analysis and perspective and our data-driven report series.

14-Day Free Trial

No credit card required. Complete access to articles, breaking news and industry data.