Bigger Is Better
Sometimes it pays to be bigger than your enemies.
That certainly worked for the Internet infrastructure firm Akamai Technologies Inc., which helps companies transmit data and defends against denial-of-service attacks. Its retail customers include Amazon.com Inc., one of many companies that hackers went after this month in retaliation for cutting service to WikiLeaks.
Even as the websites of major companies like MasterCard Inc. and Visa Inc. were blocked during what the hackers called Operation Payback, Amazon.com
After the 2004 incident, Akamai built a network of redundant lines and a server farm of 80,000 machines in 70 countries. So when Amazon.com and a number of other retailers it serves got hit with 10,000 times their normal traffic this month, Akamai's lines merely rolled over to extra server capacity, and Akamai's engineers hardly noticed the attacks. The Globe reported that hackers acknowledged they lacked the capacity to knock Amazon.com offline.
"The Hive isn't big enough to attack Amazon," they wrote in one post.
G-Listed
For those who wonder if the financial websites they visit have been hacked, Google Inc., which itself has suffered hack attacks on its Gmail system, is offering a service that tells consumers whether they've
Google already compiles blacklists of sites that have been compromised or that may be dangerous. Now it will section off potentially dangerous websites using a tab that says "This site may be compromised." Google told the Times that it will attempt to contact the site's operator to report the problem, and once Google is satisfied the issue has been rectified, the site will be removed from the search engine's quarantine.
Mending Medicare
Medicare is taking a page from the technology playbook bankers use to fight fraud in the credit card industry, The Boston Globe reported Dec. 16.
The Department of Health and Human Services will begin
Medicare is required to pay claims within three weeks of the time they are submitted, and that makes it more difficult to track fraud, the article said.
The data analytics engine the department plans to use will search for abnormalities in claims by examining all claims paid to a particular provider and flag the ones it thinks are suspicious. One example of a suspicious claim would be hundreds of blood tests ordered to a single patient the same day.
Congress has set aside $350 million over the next 10 years to fight health care fraud, the article said.
Debit and Credit
When all is said and done, debit cards may have
According to a Dec. 15 Reuters report, the same zero-liability protections that make credit cards such a great deal for consumers do not necessarily apply to debit. "They don't have the same legal authority as credit card protections, and may not always kick in," a spokeswoman for the Federal Trade Commission said, according to Reuters.
Average debit card fraud was $3,677 in 2009 and went undetected for an average of 35 days, though it took banks just 24 hours to resolve problems once they detected them. Reuters recommended consumers use credit cards as a safer option, assuming they pay their balances in full each month.
iSpy
It's well known that browsers collect information about consumers' Web surfing habits online, information that Internet marketing companies buy and resell to banks and others to market things like credit cards. Now it seems smartphones are collecting and transmitting
The Wall Street Journal reported Dec. 18 that it tested 101 apps popular on the Apple Inc. iPhone and Google Inc.'s Android platform, and found that more than half of the apps transmitted the phones' Unique Device ID to companies without the user's realizing it. Forty-seven of the apps transmitted a user's location. Five sent personal details such as age and gender.
Computer users can block cookies or block transmission of identifying information, but smartphone users cannot opt out of the information gathering and transmission.
Neither Apple nor Google requires privacy policies for their apps, and nearly half the apps didn't offer consumers a privacy policy, the study found. Apple told the Journal that the apps it approves for sale are not allowed to transmit information about users without their permission.
Penalty
The former financial adviser to Philadelphia Eagles quarterback Michael Vick was sentenced Monday to more than five years in prison and three years of supervised release for
Mary Wong, of Omaha, frequently took her investors on expensive trips, and she paid for her lavish lifestyle with the money she had stolen.
She promised investors 8% returns, saying she was investing in bonds, real estate and local bank stocks.
Other news sources said that Wong had not been registered to sell securities since 2004, and that the New York Stock Exchange had
Security Watch is a weekly roundup of news and developments in data security and their impact on financial services companies.
Please e-mail us any











