CU news Logo

Your source for the latest technology information of interest to community banks across America. Subscribe to our weekly e-mail newsletter and stay on top of the latest technology trends in Hardware, Software, ATMs, Wireless, Online Banking, Marketing, Security, Internet Access and Call Centers.

February 5, 2018


Hardware News


Samsung Unveils Massive 800GB SSD

Samsung unveiled a new 800GB SSD: the SZ985 Z-SSD which is designed for high performance, high reliability, and low latency. The SZ985 Z-SSD is a single-port, four-lane drive. It utilizes Z-NAND for a 10x improvement in cell read performance over the 3-bit V-NAND chips.



Hardware Section Sponsored by
Millennial Vision, Inc. (MVi)

Back to Top

Software Updates


Windows 10 Only: No Microsoft Office 2019 If You're on Windows 7 or 8.1

When the next version of Microsoft Office launches later this year it will only be supported on Windows 10. Office 2019 will not be supported on Windows 7 or Windows 8.1, despite those operating systems being expected to remain in use until 2020 and 2023 respectively. When Office 2019 ships in the second half of 2018, it is expected to add features such as improved inking; data analysis features such as new formulas and charts for Excel; and visual-animation features such as PowerPoint Morph and Zoom.



Fiserv Has Largest U.S. Marketshare of Top Bank Core Processors

According to data gathered by, the top core processor is Brookfield, WI-based Fiserv. With more than 37% of the market share, Fiserv is well ahead of its competitors. The second, Monett, MO-based Jack Henry & Associates, has about half Fiserv’s market share with 17.6%. Close behind JHA is Fidelity National Information Services Inc., better known as FIS.



Back to Top



‘Jackpotting’ Hits US ATMs

ATM “jackpotting” — a sophisticated crime in which thieves install malicious software and/or hardware at ATMs that forces the machines to spit out huge volumes of cash on demand — has long been a threat for FIs in Europe and Asia, yet these attacks somehow have eluded U.S. ATM operators. But all that changed after the U.S. Secret Service quietly began warning FIs that jackpotting attacks have now been spotted targeting cash machines here in the US. To carry out a jackpotting attack, thieves first must gain physical access to the cash machine. From there they can use malware or specialized electronics — often a combination of both — to control the operations of the ATM.



Needles and PINs: From Jackpotting to Skimming, Why ATMs Are More Vulnerable than Ever

“ATMs are definitely subject to various forms of attack and have probably not been upgraded as much as needed over the past few decades, particularly in light of the cyber threats,” says Shirley W. Inscoe, senior analyst for the Aite Group. Skimming attacks at ATMs continue to be a big threat, especially in the US, because the use of chips instead of magnetic strips in credit/debit cards has lagged behind other nations, Inscoe says.



ATMs/Kiosks Sponsored by
Heritage Industries


Back to Top

Wireless World


Mastercard and HERE Power Ride Towards a More Connected World

Mastercard and HERE Technologies announced an agreement to jointly create more connected experiences for people on the move. Besides further advancing connected vehicle payments, additional use cases that may be explored include mobility-as-a-service (MaaS), demand management and location-based offerings.



Back to Top

Security Section


What Is Microsegmentation? How Getting Granular Improves Network Security

Traditional firewalls, intrusion prevention systems (IPS) and other security systems are designed to inspect and secure traffic coming into the data center in a north-south direction. Microsegmentation gives organizations greater control over the growing amount of east-west or lateral communication that occurs between servers, bypassing perimeter-focused security tools. If breaches occur, microsegmentation limits potential lateral exploration of networks by hackers.



Fidelis Cybersecurity Launches Intelligent Deception Technology

Fidelis Cybersecurity, a leading automation detection and response company, announced the Fidelis Deception Module as a part of Fidelis’ Elevate platform. The company says that their Deception Module improves and becomes deterministic with breadcrumbs leading to decoys to lure attackers and automated malware known to scan hundreds of applications.



Kenna Security Announces Industry's First Vulnerability Exploit Prediction Capability

Kenna Security announced that it has developed new Exploit Prediction capabilities to accurately forecast which vulnerabilities will become weaponized to alert organizations to take remediation before those exploits become a threat. The company claims that Kenna Exploit Prediction has delivered 94 percent predictive accuracy to date.



Back to Top

Technology and Marketing


Why Brand Mascots Are Stellar Storytellers for Content Marketing

The author contends that these days, with content marketing, social media, and video, organizations can get more leverage out of a character than ever before, engaging audiences, building brand loyalty, driving retention, and helping to clarify complex ideas.



Redefining the CMO

The authors state that CMOs have the shortest average tenure among all C-suite roles, as they either lose their jobs due to perceived underperformance or become frustrated and move on. They lay out some ways that CMOs can reset their roles.



Back to Top

Online Banking/E-Commerce/Website Design


Using Better Data to Fight Credit Card Fraud

Although only a fraction of a percent of credit card transactions (6 to 7 cents per $100) are fraud, that still equates to tens-of-billions of dollars in fraudulent transactions. The US, the country with the most credit card transactions, leads the way in fraud, accounting for between one-fifth to one-third of all credit card fraud depending on the year. Increasingly, artificial intelligence is being used to more accurately identify fraudulent credit card transactions - it is an example of how AI can be a powerful security technology.



Back to Top

Internet Access


Always-on in 2018 – the True Power of Multiple Clouds

There is universal recognition in the benefits of adopting cloud strategies – no matter your preference for hybrid, private, or public. With the popularity of the cloud accelerating dramatically, more applications will be built specifically for the platform, making cloud more scalable and leading to the rise in Artificial Intelligence (AI). This article covers some other cloud trends that will shape the coming year.



Smart Central Offices to Be in 85% of Provider Networks This Year

As service providers continue to migrate toward offering more software-based virtual services to businesses, the adoption of smart central offices is growing. A smart central office consists of a service provider installing servers, storage and switching to create mini data centers in selected existing COs.



Palo Alto Networks Introduces Cloud-Based Behavioral Analytics Application

Palo Alto Networks has announced the availability of Magnifier, a cloud-based behavioral analytics application delivered through Palo Alto Networks Application Framework that helps organizations to rapidly identify and prevent threats. Magnifier applies machine learning to rich network, endpoint, and cloud data, precisely detecting and preventing targeted attacks, insider abuse, and endpoint compromise.



Back to Top

Call Centers


Two Reasons Why AI Won't Replace Contact Center Agents, and One Reason Why It Might

A major conversational shift around artificial intelligence (AI) occurred in 2017. For the first time, AI was considered leading edge for a wide range of business applications – and no longer “bleeding edge.” Some pundits are fearful that AI will replace certain groups of employees entirely. While the jury is still out on that concern, contact centers and their agents will experience a significant boost in productivity and their ability to deliver exceptional consumer experiences through AI.



Back to Top


Get Our Free Email Newsletter

First Name(*)
Invalid Input

Last Name(*)
Invalid Input

Invalid Input

Invalid Email Address