{"id":107,"date":"2008-02-06T15:24:57","date_gmt":"2008-02-06T23:24:57","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/02\/06\/bank-teller-arrested-for-32m-theft\/"},"modified":"2008-02-06T18:33:57","modified_gmt":"2008-02-07T02:33:57","slug":"bank-teller-arrested-for-32m-theft","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/06\/bank-teller-arrested-for-32m-theft\/","title":{"rendered":"Bank teller arrested for $3.2M theft"},"content":{"rendered":"<p>A Romanian bank teller was arrested for illegally transferring $3.2M into two bank accounts by using his director&#8217;s password.\u00a0 There is no detail in the article to describe how the teller acquired the director&#8217;s password but this could have been done in a myriad of different ways including shoulder surfing, brute force guessing, or social engineering.\u00a0 In this case, the adversary was a trusted employee and may not have been considered a threat.<\/p>\n<p><a href=\"http:\/\/www.msnbc.msn.com\/id\/23027131\/\">http:\/\/www.msnbc.msn.com\/id\/23027131\/<\/a><\/p>\n<p>This is a great example of how adversaries can be anywhere and even the most secure systems are only as secure as the people who administer them.\u00a0 All the technology we use to secure communications, systems, and data is virtually worthless when someone can acquire the necessary credentials to bypass all that.<\/p>\n<p>It is important to remember that there is more to security than just\u00a0encryption and\u00a0buffer overflows.\u00a0 Policy and user education is an equally important aspect.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Romanian bank teller was arrested for illegally transferring $3.2M into two bank accounts by using his director&#8217;s password.\u00a0 There is no detail in the article to describe how the teller acquired the director&#8217;s password but this could have been &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/06\/bank-teller-arrested-for-32m-theft\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":28,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,7],"tags":[],"class_list":["post-107","post","type-post","status-publish","format-standard","hentry","category-current-events","category-ethics"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=107"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/107\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}