01 April 2015

Security

Bryant TowCapco - New York

A Weak Link for Happy Hackers

11 hours ago  |  740 views  |  0  |  Recommends 0

Cyber Attack Vector… the Human Operating System is 100% Vulnerable Cyber-attacks are through the roof. Numbers from the FBI, Verizon Breach Report, The Ponemon Institute and nearly every industry source all agree the number of attacks are dramatically increasing. We have all heard of Target, Neiman Marcus and so many others. So the question i...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

Sheriff’s office offers Home Security Tips

28 March 2015  |  475 views  |  0  |  Recommends 0

Here’s good advice from a sheriff’s office about how to protect your house. Burglars and home invaders don’t give a flying hoot if you keep thinking, “It can’t happen to me and this is a safe neighborhood.” In fact, the issue isn’t how safe your neighborhood is or how watchful your neighbors are. The issue is how easy it is to simply break into yo...

TagsSecurity
More blog posts
Anthony PickupTickVantage Ltd - Manchester

Ubiquitous Authentication a decades old problem for the NOW generation.

27 March 2015  |  1154 views  |  0  |  Recommends 0

In the 1960’s the user name and password system for accessing computer systems was first deployed. In mid 1970’s the ATM card and PIN was first deployed and this evolved into the now ubiquitous ATM ca...

TagsSecurityMobile & online
Robert SicilianoIDTheftSecurity.com - Boston

Hackers for Hire both Good and Bad

26 March 2015  |  1804 views  |  0  |  Recommends 0

Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into y...

TagsSecurity
Bjorn SolandPromon AS - Oslo

Blinding bank's anti-fraud systems with FraudFox VM

25 March 2015  |  719 views  |  0  |  Recommends 0

Banks have invested heavily into fraud detection systems that tries to identify suspicious transactions. The systems put together network data, user's normal payment pattern... anything that can crea...

TagsSecurityMobile & online
Marcelo DelimaSequent - Mountain View

Tokenization is not enough: The role of on-device software for secure mobile payments

13 March 2015  |  2448 views  |  1  |  Recommends 1

HCE cloud-based mobile payments have opened a new chapter in the industry's thinking around security of card data on-device and the risk management associated with it. The lack of secure element hard...

TagsSecurityPayments
Robert SicilianoIDTheftSecurity.com - Boston

Victim overcomes Identity Theft with Art

12 March 2015  |  857 views  |  0  |  Recommends 0

Does your wallet contain enough information about you for someone to steal your identity and commit crimes under your name? That’s what happened to Jessamyn Lovell when Erin Hart stole her wallet in 2...

TagsSecurity
Paul StokesWynyard Group - London

Illicit financial outflows cripple African progress

10 March 2015  |  2024 views  |  1  |  Recommends 0

In 2011, the African Union and United Nations Economic Commission for Africa formed a ‘High Level Panel on Illicit Financial Flows’ to investigate the extent to which illicit financial flows (IFF) are...

TagsSecurityRisk & regulation
Robert SicilianoIDTheftSecurity.com - Boston

How the Internet of Things is further killing Privacy

07 March 2015  |  2042 views  |  0  |  Recommends 0

Privacy used to mean changing clothes behind a partition. Nowadays, say “privacy” and people are likely to think in terms of cyberspace. Stay connected, and you risk losing your privacy. Even if you’r...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Sad Scary State of Bank Security

04 March 2015  |  1428 views  |  1  |  Recommends 0

Who needs guns, threatening notes to rob a bank when you can do it with just your fingertips inside your home? A hacking ring in the eastern portion of Europe may be the most successful team of bank r...

TagsSecurity
Previous 1 | 2 | 3 | 4 | 5 |Next
24,860
Members
12,358
Comments
8,660
Posts
 
1,177
Active bloggers

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Chris Sullivan

As Vice President of Advanced Solutions,...

Marcelo Delima

Marcelo is Vice President of Marketing f...

Anthony Pickup

Currently CIO as of Tickvantage a compan...

Who is commenting on Security posts

Bjorn Soland
Charmaine Oak
John Candido
Ketharaman Swaminathan
Prasenjit Das
Abhishek Chatterjee