21 August 2014

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
Pat CarrollValidSoft - London

Our Predictions for 2014: Who Will Dominate? Part 1

20 January 2014  |  1440 views  |  0  |  Recommends 0

Unfortunately, it’s not going to be plain sailing on the security front in 2014. It’s a bit like Friday 13th. Many folk say that Friday 13th is not their unlucky day at all, it’s Saturday 14th they worry about! And believe me, we do have a lot to worry about. So, what am I concerned about? And is there any good news for 2014? Well, the answer to ...

TagsSecurityInnovation
Uri RivnerBioCatch - Tel Aviv

BitCoin Explained: How to Become a BitCoin Thief - part 1

04 December 2013  |  15423 views  |  1  |  Recommends 1

OK folks. You’ve all been hearing about Bitcoin. Your neighbors have been hearing about Bitcoin. Your dog walker has been hearing about Bitcoin. Now it’s time to separate the wheat from the chaff… Learn how to become a successful Bitcoin thief, and make lots of money in this exciting new cybercrime frontier! This practical guide is intended O

TagsMobile & onlinePayments
More blog posts
Dean ProcterTransinteract - Sydney

iPhone fingerprint scanner broken by Chaos

22 September 2013  |  2955 views  |  3  |  Recommends 0

The new biometric security 'feature' if the Apple iPhone has already been breached using a simple photograph & common everyday items. It took members of the renowned Chaos Computer Club the blink...

TagsSecurityMobile & online
Dean ProcterTransinteract - Sydney

Did I mention, 'your dongle dongle is impotent'?

22 September 2013  |  2348 views  |  0  |  Recommends 0

RSA Security, is alleged to have warned thousands of its customers to immediately discontinue using all versions of company's BSAFE toolkit and Data Protection Manager (DPM), both using Dual_EC_DRNG (...

TagsSecurityMobile & online
Uri RivnerBioCatch - Tel Aviv

The positive side of Malware

20 June 2013  |  3586 views  |  0  |  Recommends 1

At precisely 20:26 local time my Yahoo app began buzzing like a bee hive. 72 ‘Mailer-Daemon’ failure to email messages popped up one after the other in my home-use email. Shortly afterwards I s

TagsSecurityMobile & online
Uri RivnerBioCatch - Tel Aviv

Take the 45 Million and Run

10 May 2013  |  3709 views  |  0  |  Recommends 0

It was one of the largest cyber-heists in human history. Like in many other cyber attacks, it started with breaching a secure network. This time the target was a US-based processor of prepaid cards i...

TagsMobile & onlinePayments
Pat CarrollValidSoft - London

Could EC3 help Europol see sense?

25 January 2013  |  4546 views  |  0  |  Recommends 0

This month, we saw Europol’s launch of EC3, the new European Cybercrime Centre that aims to be at the heart of combating cybercrime in the EU. As I blogged back in July 2012, it’s fantastic the EU re...

TagsCardsSecurity
Pat CarrollValidSoft - London

Dexter malware, targeting Christmas shoppers

20 December 2012  |  6798 views  |  0  |  Recommends 0

The holiday season is a prime time for fraudsters to target consumers' credit cards and it's not surprising that Dexter has come to light a week before Christmas. Dexter is yet another malware varia...

TagsCardsSecurity
Steven MurdochUniversity of Cambridge - Cambridge

Chip and Skim: cloning EMV cards with the pre-play attack

11 September 2012  |  5804 views  |  3  |  Recommends 1

The EMV (Chip & PIN) protocol requires ATMs and point-of-sale terminals to generate a random number. If this number (known in EMV terminology as the "unpredictable number") isn't random,...

TagsSecurityPayments
Uri RivnerBioCatch - Tel Aviv

The Tricia Bennett Mystery

28 August 2012  |  3629 views  |  0  |  Recommends 1

A couple of weeks ago I got a LinkedIn invitation from someone called Tricia Bennett. I don’t know Tricia, and in such cases I’ve developed a best practice of first asking “hey mate, do I know you fro...

TagsSecurityOnline banking
Previous 1 | 2 | 3 | 4 | 5 |Next
 
1,435
Active bloggers
31,770
Members
7,931
Posts
10,839
Comments

Top bloggers: 30 days

Most viewed Engaging

There are no top bloggers for the last 30 days.

Who is commenting on Information Security posts

Brett King
Dean Procter
Alexander Peschkoff
Nick Collin
Steven Murdoch
Uri Rivner
Christopher Mc Carthy
Ketharaman Swaminathan
John Dring
Martin Dipper
Gerhard Schwartz
Keith Appleyard