R. Kinney Williams - Yennik, Inc.
R. Kinney Williams
Yennik, Inc.

Internet Banking News
Brought to you by Yennik, Inc. the acknowledged leader in Internet auditing for financial institutions.

January 26, 2014

CONTENT Internet Compliance Web Site Audits
IT Security
Internet Privacy
Penetration Testing
Does Your Financial Institution need an affordable Internet security audit?  Yennik, Inc. has clients in 42 states that rely on our penetration testing audits to ensure proper Internet security settings and to meet the independent diagnostic test requirements of FDIC, OCC, FRB, and NCUA, which provides compliance with Gramm-Leach Bliley Act 501(b) The penetration audit and Internet security testing is an affordable-sophisticated process than goes far beyond the simple scanning of ports.  The audit focuses on a hacker's perspective, which will help you identify real-world weaknesses.  For more information, give R. Kinney Williams a call today at 806-798-7119 or visit http://www.internetbankingaudits.com/.

This newsletter is available for the Android smart phones and tablets.  Go to the Market Store and search for yennik.

FYI - Microsoft extends virus warnings for Windows XP to 2015 - Microsoft has decided to continue providing virus warnings for the ageing Windows XP operating system until 2015. http://www.bbc.co.uk/news/technology-25758308

FYI - Feds Failing To Secure Their Mobile Devices - The federal government may have specific policies for security, but many of its users aren't adopting secure mobile practices and behaviors, according to a new study by the Mobile Work Exchange. http://www.darkreading.com/end-user/feds-failing-to-secure-their-mobile-devi/240165345

FYI - 13 indicted in $2M gas station card-skimming scheme - Pump-mounted devices used Bluetooth chips that allowed the thieves to retrieve the data without having to physically connect to the devices, prosecutors allege. http://news.cnet.com/8301-1009_3-57617638-83/13-indicted-in-$2m-gas-station-card-skimming-scheme/

FYI - Companies settle over false data security framework compliance claims - Twelve U.S. companies have agreed to settle Federal Trade Commission (FTC) charges, which accuse the firms of falsely claiming to comply with an international data security framework. http://www.scmagazine.com/companies-settle-over-false-data-security-framework-compliance-claims/article/330788


FYI - A First Look at the Target Intrusion, Malware - Last weekend, Target finally disclosed at least one cause of the massive data breach that exposed personal and financial information on more than 110 million customers: Malicious software that infected point-of-sale systems at Target checkout counters. http://krebsonsecurity.com/2014/01/a-first-look-at-the-target-intrusion-malware/

FYI - Neiman Marcus breach dates back to July 2013, according to report - The attack on Neiman Marcus point-of-sale systems dates back to July 2013 and the threat was not completely mitigated until Sunday, unnamed people briefed on the retailer's investigation told the New York Times in a Thursday report. http://www.scmagazine.com/neiman-marcus-breach-dates-back-to-july-2013-according-to-report/article/329955/

FYI - Defect in Veterans Affairs eBenefits site results in data compromise - When a Navy veteran signed into the Department of Veterans Affairs (VA) eBenefits website on Wednesday night, he was shocked to see a different person's name and information pop up each time he came back. http://www.scmagazine.com/defect-in-veterans-affairs-ebenefits-site-results-in-data-compromise/article/329974/

FYI - Target's data breach: Yes, it gets worse - Target and Neiman Marcus weren't the only name-brand retailers to be stung by cybercriminals last holiday season. Plus: Was a teenager behind the malware? http://news.cnet.com/8301-1009_3-57617447-83/targets-data-breach-yes-it-gets-worse/

FYI - Data of 20 million South Koreans copied to USB stick, sold to marketing firms - An IT worker was arrested after allegedly copying names, Social Security numbers, and credit card details of 20 millions South Koreans to a USB stick, so the trove of information could be sold to phone marketing firms. http://www.scmagazine.com/data-of-20-million-south-koreans-copied-to-usb-stick-sold-to-marketing-firms/article/330613

FYI - Data breach affects 16M in Germany - A data breach affecting 16 million German internet users was announced this week by the country's Federal Office for Information Security (BSI). http://www.scmagazine.com/data-breach-affects-16m-in-germany/article/330550

FYI - Snapchat's new verification already hacked - Security researcher shows that the service's new "find the ghost" system to prove that you're a human and not a bot can be easily tricked. http://news.cnet.com/8301-1009_3-57617647-83/snapchats-new-verification-already-hacked/

Return to the top of the newsletter

Fair Housing Act

A financial institution that advertises on-line credit products that are subject to the Fair Housing Act must display the Equal Housing Lender logotype and legend or other permissible disclosure of its nondiscrimination policy if required by rules of the institution's regulator.

Home Mortgage Disclosure Act (Regulation C)

The regulations clarify that applications accepted through electronic media with a video component (the financial institution has the ability to see the applicant) must be treated as "in person" applications. Accordingly, information about these applicants' race or national origin and sex must be collected. An institution that accepts applications through electronic media without a video component, for example, the Internet or facsimile, may treat the applications as received by mail.

Return to the top of the newsletter
We continue our series on the FFIEC interagency Information Security Booklet.  


Protocols and Ports (Part 2 of 3)

Other common protocols in a TCP/IP network include the following types.

! Address resolution protocol (ARP) - Obtains the hardware address of connected devices and matches that address with the IP address for that device. The hardware address is the Ethernet card's address, technically referred to as the "media access control" (MAC) address. Ethernet systems route messages by the MAC address, requiring a router to obtain both the IP address and the MAC address of connected devices. Reverse ARP (RARP) also exists as a protocol.

! Internet control message protocol (ICMP) - Used to send messages about network health between devices, provides alternate routing information if trouble is detected, and helps to identify problems with a routing.

! File transfer protocol (FTP) - Used to browse directories and transfer files. Although access can be authenticated or anonymous, FTP does not support encrypted authentication. Conducting FTP within encrypted channels, such as a Virtual Private Network (VPN), secure shell (SSH) or secure sockets layer (SSL) sessions can improve security.

! Trivial file transfer protocol (TFTP) - A file transfer protocol with no file - browsing ability, and no support for authentication.

! Simple mail - transfer protocol (SMTP) - Commonly used in e-mail systems to send mail.

! Post office protocol (POP) - Commonly used to receive e-mail.

! Hypertext transport protocol (HTTP) - Used for Web browsing.

! Secure shell (SSH)  - Encrypts communications sessions, typically used for remote administration of servers.

! Secure sockets layer (SSL)  - Typically used to encrypt Webbrowsing sessions, sometimes used to secure e-mail transfers and FTP sessions.

Return to the top of the newsletter

- We continue our series listing the regulatory-privacy examination questions.  When you answer the question each week, you will help ensure compliance with the privacy regulations.

33. Except as permitted by 13-15, does the institution refrain from disclosing any nonpublic personal information about a consumer to a nonaffiliated third party, other than as described in the initial privacy notice provided to the consumer, unless:

a. the institution has provided the consumer with a clear and conspicuous revised notice that accurately describes the institution's privacy policies and
practices; [8(a)(1)]

b. the institution has provided the consumer with a new opt out notice;

c. the institution has given the consumer a reasonable opportunity to opt out of the disclosure, before disclosing any information; [8(a)(3)] and

d. the consumer has not opted out? [8(a)(4)]


PLEASE NOTE:  Some of the above links may have expired, especially those from news organizations.  We may have a copy of the article, so please e-mail us at examiner@yennik.com if we can be of assistance.  

Company Information
Yennik, Inc.

4409 101st Street
Lubbock, Texas 79424
Office 806-798-7119


Please visit our other web sites:
VISTA penetration-vulnerability testing
The Community Banker - Bank FFIEC & ADA Web Site Audits
Credit Union FFIEC & ADA Web Site Audits - Bank Auditing Services
US Banks on the Internet  
US Credit Unions on the Internet

All rights reserved; Our logo is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, Copyright Yennik, Incorporated