18 September 2014

Security

Robert SicilianoIDTheftSecurity.com - Boston

Identity proofing proves who You are

16 September 2014  |  1166 views  |  0  |  Recommends 0

Identity proofing is proof of whom you are. Proving one’s identity starts with that person answering questions that only they themselves can answer (even if the answers are fictitious), such as their favorite movie, mother’s maiden name or name of their high school. Since most people provide real answers (that can be found online) rather than “Po...

TagsSecurity
Thomas JorgensenEncap Security - Oslo

Mobile Money: Apple’s next security pitfall?

11 September 2014  |  5635 views  |  0  |  Recommends 0

Apple has a trick it repeats every few years. It takes a technology or concept that has been around for some time, and makes it attractive and accessible for consumers. The iPod was far from the first mp3 player, but has been so successful that ‘iPod’ is now almost a generic term in the same way as ‘hoover’ and ‘frisbee’. The addition of Touch-I...

TagsSecurityMobile & online
More blog posts
Robert SicilianoIDTheftSecurity.com - Boston

Are All Hackers Bad?

09 September 2014  |  737 views  |  0  |  Recommends 0

The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about ...

TagsSecurity
Pat CarrollValidSoft - London

iHack Hastens Call for Multi-factor Authentication

05 September 2014  |  2202 views  |  1  |  Recommends 0

“If only I would have known” is a phase that Jennifer Lawrence, Kate Upton and possibly as many as 100 celebrities and notable personalities are likely saying after a reported massive breach of Apple...

TagsSecurityPaymentsGroupInformation Security
Robert SicilianoIDTheftSecurity.com - Boston

How to Secure Your iCloud

03 September 2014  |  1595 views  |  1  |  Recommends 0

By now you’ve heard that Jennifer Lawrence’s (and other celebs’) cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the “Fin...

TagsSecurity
Nicc WrightClearStructure Financial Technology - London

The changing face of buyside implementations

03 September 2014  |  994 views  |  0  |  Recommends 0

The Industry is currently abuzz with talk of the Cloud as more and more firms adopt hosted solutions as part of their core operational strategy. While many of us are familiar with the benefits of host...

TagsSecurityInnovation
Elton Canewriter & tech geek - Brisbane

Contactless payments are not a choice

29 August 2014  |  2621 views  |  4  |  Recommends 0

If you want a new debit or credit card in Australia, you're getting PayWave or PayPass - there's no choice. And Australian police forces, and at least some consumers, don't like it. Police are bemo...

TagsCardsSecurityGroupFuture Finance
Robert SicilianoIDTheftSecurity.com - Boston

Best Way to Destroy a Computer Virus

27 August 2014  |  808 views  |  0  |  Recommends 0

Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many diffe...

TagsSecurity
Robert SicilianoIDTheftSecurity.com - Boston

Prepaid Cards risk of Fraud

22 August 2014  |  1303 views  |  0  |  Recommends 0

Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire mo...

TagsSecurity
Myles DawsonAdyen - London

Rethinking 3D Secure: how it can increase conversion rates

21 August 2014  |  3197 views  |  0  |  Recommends 0

“3D Secure is about as helpful as a chocolate fire guard.” Merchant view of 3D Secure, as succinctly expressed on Twitter. For a number of years, the payments industry has associated 3D Secure with...

TagsSecurityPayments
Previous 1 | 2 | 3 | 4 | 5 |Next
 
1,350
Active bloggers
25,622
Members
8,030
Posts
11,088
Comments

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano

Security analyst, published author, tele...

Myles Dawson

Myes blogs from his role as UK Country M...

Elton Cane

Writer and media production person

Pat Carroll

Throughout his career, Pat has been at t...

Who is commenting on Security posts

Ketharaman Swaminathan
Ilja Ilit
Chris Torr
Robert Siciliano
Boris Taratine
Richard Hamerton-Stove