06 March 2015

Security

Robert SicilianoIDTheftSecurity.com - Boston

Sad Scary State of Bank Security

04 March 2015  |  772 views  |  0  |  Recommends 0

Who needs guns, threatening notes to rob a bank when you can do it with just your fingertips inside your home? A hacking ring in the eastern portion of Europe may be the most successful team of bank robbers to date, having purportedly robbed $1 billion from multiple banks. This can only be done by infecting computers with malicious software (malwar...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

What is Catphishing?

03 March 2015  |  875 views  |  0  |  Recommends 0

What is catphishing? It certainly isn’t Garfield lazily sitting in a canoe holding a fishing rod. Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the scammer—because eventually he’ll hit the victim up for money. But anoth...

TagsSecurity
More blog posts
Chris SullivanCourion - London

Is it Time for Risk-Based Access Certification in Financial Services?

02 March 2015  |  1868 views  |  0  |  Recommends 0

Formal checking of user access privileges to data and resources within a financial business is wholly sensible. Indeed, it is strongly mandated by a range of regulatory authorities. But with audits ty...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

What happens when a Bank Account is hacked?

24 February 2015  |  817 views  |  1  |  Recommends 0

Who’d ever think that 50 years ago, your money was safer in your bank account than it is today in this “modern” age: remote theft. If you bank with a large or small bank, your account may be at risk b...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

10 Skeevy Scams to watch

19 February 2015  |  746 views  |  0  |  Recommends 0

You may think you’re not dumb enough to fall for scams, but consider that someone you care deeply about is naïve enough to be conned. Besides, some scams are so clever that even those who think they’r...

TagsSecurity
Paul StokesWynyard Group - London

Mind the gap: third-party due diligence is more important than ever

10 February 2015  |  1707 views  |  0  |  Recommends 0

Third-party due diligence is an obligation facing financial services when on-boarding and maintaining any supplier, agent, consultant, distributor or service provider to ensure they continue to comply...

TagsSecurityRisk & regulation
Andrew ChurchillTechnology Strategy - London

Mere tokenism - how not to deploy security

09 February 2015  |  1765 views  |  0  |  Recommends 0

There has been much commentary of late over the surge in interest in tokenisation, not least on the back of certain mobile payment platforms. Tokenisation, as a principle, has of course been around

TagsSecurityMobile & online
Robert SicilianoIDTheftSecurity.com - Boston

Fixing a Credit Report after being hacked

04 February 2015  |  1424 views  |  0  |  Recommends 0

First off, how NOT to fix a hacked credit report: signing on with a service that promises to correct the problem in a jiffy—a “sounds too good to be true” advertisement. A company that claims they wil...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Data Breach Aftermath

03 February 2015  |  1212 views  |  0  |  Recommends 0

Haste certainly doesn’t make waste if you’ve suffered from an entity getting hacked resulting in a data breach. Don’t waste a single minute delaying notifying affected accounts! In the case of a credi...

TagsSecurity
Charmaine OakShift Thought - Bristol

The Passwordless Experience is set to transform the way we pay

28 January 2015  |  3755 views  |  1  |  Recommends 0

As security breaches continue to grab headlines, I was intrigued by new claims that not only could online security be improved for consumers, but it could actually become a more delightful user experi...

TagsSecurityPaymentsGroupInnovation in Financial Services
Previous 1 | 2 | 3 | 4 | 5 |Next
25,025
Members
12,192
Comments
8,580
Posts
 
1,214
Active bloggers

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Chris Sullivan

As Vice President of Advanced Solutions,...

Andrew Churchill

Research into security flaws of Governme...

Who is commenting on Security posts

Prasenjit Das
Charmaine Oak
Abhishek Chatterjee
Robert Siciliano
Ketharaman Swaminathan