Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Identity Theft Part 2 5 More Identity Theft Myths Unveiled

#1 Publically available information is not valuable to an identity thief. If I was an identity thief I’d start with the phone book. All information about you is of value to an identity thief. The bad ...

03 Nov 2010
Angus Stewart

CRIMINALS TARGET TROUBLED UK LEGAL FIRMS

Shock. Horror. Criminal gangs are doing their utmost to hijack UK legal firms! No, we're not talking about the synopsis to a sequel to The Firm, John Grisham's best-selling novel about a US law pract

02 Nov 2010
A Finextra Member

DATA BREACHES: THE 5 MOST IMPORTANT THINGS YOU NEED TO KNOW!

We often hear about data breaches in the news and the unfortunate victim whose operations have been devastated. But more often than not, this is as far as data security extends into our worlds. Do we ...

02 Nov 2010
Robert Siciliano

Part 1 of Identity Theft 5 Identity Theft Myths Unveiled

#1 You can’t protect yourself from identity theft. Some, not all Identity theft is preventable. There are many things people can do to minimize their risk, both online and offline. Shred anything tha...

01 Nov 2010
Robert Siciliano

Top Ten Most Dangerous Places to Leave Your SS Number

Universities/Colleges are the Riskiest Cases of identity theft are skyrocketing, and 32% of all ID theft victims had their social security number compromised according to Javelin’s 2010 Identity Frau...

01 Nov 2010
Robert Siciliano

Mobile Phone Security Under Attack

As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for content creators’ latest innovations, which ...

01 Nov 2010
Robert Siciliano

5 Sneaky Credit Card Scams

#1 Phone Fraud. The phone rings, a scammer poses as your banks fraud department. They may have your entire card number stolen from another source. They ask about a charge made and you deny the charge...

01 Nov 2010
A Finextra Member

Working from home, is your office data security compromised?

Key security considerations for home and mobile workers In many cases executive IT and security professionals trust their Information Security departments to provide adequate security to protect empl...

01 Nov 2010
Information Security
A Finextra Member

Are wireless networks the next threat to our identity?

There is no doubt we live in an increasingly mobile, fast-paced and complicated society. If you had asked the average person in the street five years ago how their identity could be stolen then bin ra...

29 Oct 2010
Information Security
Robert Siciliano

Five Ways Identities Are Stolen Online

Cybercrime has become a trillion dollar issue. In a recent survey, hundreds of companies around the world estimated that they had lost a combined $4.6 billion in intellectual property as a result of d...

27 Oct 2010
Lachlan Gunn

The end for the magnetic stripe on payment cards?

EAST, the European ATM Security Team, has recently released European ATM crime statistics for the period January to June 2010. The figures show a 24% increase in card skimming attacks at European AT...

27 Oct 2010
A Finextra Member

DATA THEFT NOW THE BIGGEST CAUSE OF LOSSES: A WORRYING SIGN?

According to Kroll – the US-based risk consultancy company, information theft has overtaken physical larceny of cash and stock as the biggest source of global losses for firms. Significantly, this is ...

25 Oct 2010

Now hiring