Slideshow The Week in Security

  • April 13 2012, 12:26pm EDT
More in
8 Images Total

Handy Feature

Ogaki Kyoritsu Bank in Japan will use handprint readers in its ATMs. It will accept a handprint scan in place of a plastic card for authentication, though customers must first register in a branch. (Image: ThinkStock)

Heart to Heart

Heartland Payment Systems' $1 million settlement for its 2008 data breach isn't a windfall for members of the class action. The processor paid, at most, $1,925 altogether to 11 people. The rest went to non-profit groups. (Image: ThinkStock)

Content Continues Below

Bad Deal

An online fake ID shop was also secretly an ID theft shop. After accepting orders for fake IDs, the website took the identity information and resold it. (Image: ThinkStock)

Mac Under Attack

Apple's computers are under attack by the Flashback malware, which has infected 670,000 Macs so far. Apple has released a cure for infected machines. The computers could eventually be used for financial fraud. (Image: ThinkStock)

Persistence Pays

Advanced persistent threats, which have no known signature or pattern of behavior, are on the rise. They target more than just account data; hackers could also be looking for sensitive bank M&A information. (Image: ThinkStock)

Content Continues Below

Easy Access

A security flaw in the iPhone apps for Facebook, LinkedIn and Dropbox could allow someone with physical access to the phone to steal a text file with account credentials. That file could be copied to a new phone to sign in to the victim's accounts, stealing any sensitive personal information stored online. Dropbox is updating its app to remove this flaw. (Image: ThinkStock)

Bigger Phish

Now that phishing scammers are getting better at spelling, it's harder to tell their emails apart from legitimate ones sent by banks. One red flag is if the Web address displayed when hovering over a link doesn't match that of the bank's site. Another is if the email's headers indicate an untrustworthy source. (Image: ThinkStock)


Hackers stole the personal information of 181,604 Utah residents who receive state benefits. The data, which was exposed due to an error in configuring one of the state's servers, included the Social Security numbers of more than 25,000 people. (Image: ThinkStock)