28 August 2014

Security

Robert SicilianoIDTheftSecurity.com - Boston

Best Way to Destroy a Computer Virus

13 hours ago  |  404 views  |  0  |  Recommends 0

Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many different kinds of computer viruses (such as worms, Trojans, spyware) are called malware: malicious software. In general, security software comes wit...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Prepaid Cards risk of Fraud

22 August 2014  |  1078 views  |  0  |  Recommends 0

Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire money for that new car or vacation package is most probably a rip-off. And the crooks behind these rackets are figuring out ways to overcome the i...

TagsSecurity
More blog posts
Myles DawsonAdyen - London

Rethinking 3D Secure: how it can increase conversion rates

21 August 2014  |  2702 views  |  0  |  Recommends 0

“3D Secure is about as helpful as a chocolate fire guard.” Merchant view of 3D Secure, as succinctly expressed on Twitter. For a number of years, the payments industry has associated 3D Secure with...

TagsSecurityPayments
Michael DavisonIBM UK Ltd - London

Anyone know where good conduct went or how to get it back?

20 August 2014  |  1377 views  |  0  |  Recommends 1

A question. Why do banking industry headlines remain so very bad when the talk is all of recovery, strengthening investment and employment indicators and an uptick in base rate soon? My acknowledg...

TagsSecurityRisk & regulation
Martin coxBell ID - Sydney

HCE mobile payments - how secure is secure enough?

20 August 2014  |  1915 views  |  0  |  Recommends 0

Since Google announced support for host card emulation (HCE) in Android KitKat 4.4 last year, the industry has been divided. Many recognize the value and opportunity that this brings to banks and othe...

TagsSecurityPayments
James LawlorCerteco - London

Three simple rules to be AML and Sanctions coherent

13 August 2014  |  1352 views  |  0  |  Recommends 0

In recent years the U.S. regulators have enjoyed flexing their Anti-Money Laundering (AML) and Sanction enforcement muscles, over $12 billion worth of fines have been settled with some of the world’s ...

TagsSecurityRisk & regulation
Derek GarriockExperian - Edinburgh

Device fraud - a serious threat to mobile banking?

30 July 2014  |  3982 views  |  1  |  Recommends 1

Current predictions show there will be five billion connected devices on planet earth this year, including smartphones and tablets, serving a billion online bank accounts and contributing to US $13tri...

TagsSecurityMobile & online
Robert SicilianoIDTheftSecurity.com - Boston

Make Information Security a Priority

29 July 2014  |  757 views  |  0  |  Recommends 0

Just about everyone has private information that should be protected. Let’s begin with something you’ve surely heard of: antivirus protection. But this isn’t enough to guard your personal data. A ...

TagsSecurity
Jeremy TaylorRule Financial - London

Process, Process, Process

25 July 2014  |  1364 views  |  0  |  Recommends 0

In the second instalment of our six part series looking at the transformation that is required in investment banking operations, today we look at how process automation will enable investment bank bus...

TagsSecurityInnovation
Anand SundaresanWipro Consulting Services - London

Do you KYC well!

23 July 2014  |  1072 views  |  0  |  Recommends 0

Not sure if the KYC being done by banks is mature enough to perform its true function using standard credit check agencies which have stood the test of time. Financial regulations have come out strong...

TagsSecurityPayments
Previous 1 | 2 | 3 | 4 | 5 |Next
 
1,409
Active bloggers
29,007
Members
7,955
Posts
10,867
Comments

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Derek Garriock

Leading strategy and solution design for...

Myles Dawson

Myes blogs from his role as UK Country M...

Michael Davison

Business Development Executive, Banking ...

Who is commenting on Security posts

Robert Siciliano
Boris Taratine
Richard Hamerton-Stove
Ketharaman Swaminathan
Uri Rivner