News & Commentary
Content posted in April 2000
Oracle-built COMPAS Points to Shareholder Value for First Union
News  |  4/6/2000  | 
First Union built an enterprise-wide cost measurement and profitability analysis system.
Proper Planning Keeps Information System Hackers From Becoming a Headache
News  |  4/6/2000  | 
Banks may need to upgrade their operating systems, firewalls, authentication products and encryption products.
Internet Site Breathes New Life Into Financial Product Purchases
News  |  4/6/2000  | 
BankOxygen is a Java-based trading hub that gives smaller financial institutions access to capital markets products from larger banks.
Promoting Trust
News  |  4/6/2000  | 
Dafve Oshman, senior vp of technology, Identrus
Presenting a Solution
News  |  4/6/2000  | 
For EBPP to fly, financial institutions need to improve the technology and convince customers of its value
Taking Center Stage
News  |  4/6/2000  | 
Banks explore the promise and potential peril of centrally-managed data storage
Barbed Wire
News  |  4/6/2000  | 
Determined not to lose a stake in what could be the Next Big Thing, U.S. banks have moved to cut the cords that tether their customers to their PCs and morph them into wireless.
Giantbank Kicks Off Online Lending
News  |  4/6/2000  | left nothing to chance in creating a loan feature that enables customers to use electronic inquiries to get the best rates.
Bank Automates Research Operation
News  |  4/6/2000  | 
Prosperity Bank, Springfield, Va., is creating an archive of data images to cut the amount of time required for research and customer service.
N.Y. Bank Achieves Site 'Stickiness'
News  |  4/6/2000  | 
Bank of Smithtown, headquartered in Long Island, N.Y., has taken its neighbor-to-neighbor customer relationship philosophy to the Internet with online banking and an e-commerce portal.
National City Moves Credit Data System Online
News  |  4/6/2000  | 
National City replaced a closed, hard-to-maintain, client-server environment with a modern, Web-based architecture.
CIBC Inks L/C Processing Deal With Bank of New York
News  |  4/6/2000  | 
CIBC has outsourced its trade letter of credit operations to Bank of New York, partly to take advantage of BoNY's suite of Web-based L/C products.
World Briefs
News  |  4/6/2000  | 
Dresdner Releases Middleware Source Code
News  |  4/6/2000  | 
Dresdner's Openadaptor software will aid in forging closer customer relationships while enhancing its image as a technologically-savvy bank.
Wells Fargo Kicks Off Online B2B Service
News  |  4/6/2000  | 
Wells Fargo has rolled out WellsXchange, a suite of online services designed to help e-marketplace buyers and sellers complete financial transactions online.
Bank Bytes
News  |  4/6/2000  | 
Regionals Better Than Top Banks At Handling E-Mail Communications, Survey Finds
News  |  4/6/2000  | 
The survey found that many of the top 100 banks are at best mediocre and at worst totally unresponsive in communicating via the Internet.
Information Technology Spurs Consolidation In Financial Services
News  |  4/6/2000  | 
Information technology is both spurring and facilitating consolidation in the financial services sector, according to a report by the G-10 central banks.
Star and Concord Catch EFT Merger Wave
News  |  4/6/2000  | 
The merger of Star Systems and Concord EFS, completed last month, creates an electronic payments superstore combining payment and network services under one roof.
Just Thinking
News  |  4/6/2000  | 

Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.