Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Keith Appleyard

Nigerian stole 500,000 dollars to buy luxury goods

According to the NY Daily News, Iguosade Osahon, a 28-year-old Nigerian-born student, has been charged with stealing the identities of 750 victims and used the $500,000 he stole to buy Rolex watches

01 Sep 2010
Whatever...
Angus Stewart

ACTIONS SPEAK FAR LOUDER THAN HOLLOW WORDS

Is it me, or is the news really as unnewsworthy as I think it is? In recent days we have been hit with headlines galore that would leave the average person thinking the UK is in the middle of a majo

31 Aug 2010
Keith Appleyard

UK Building Society lucky not to lose Customer data

Once again one hears of a Building Society not encrypting its laptops, coupled with poor physical security and password management by its employeees. In this instance, an unencrypted laptop belonging ...

30 Aug 2010
Whatever...
Uri Rivner

My wife has a Trojan!

A couple of months ago my wife, who works for a small start-up, got a brand new laptop for remote access. A small, white thing that looked pretty but, I suspected, came with little security, given tha...

30 Aug 2010
Innovation in Financial Services
Robert Siciliano

A Viable Solution to Wave of Skimming

Officials are reporting a wave of credit and debit card attacks targeting point of sale swapping, skimming of card data, and hacking into payment processors. Reports say the U.S. Secret Service, among...

30 Aug 2010
Robert Siciliano

mCrime Higher on Hackers Radar

This year’s Defcon convention of hackers in August brought to light a fact that many in the security industry have known: mobile phones are becoming a bigger target for criminals. Recent news of appli...

28 Aug 2010
Robert Siciliano

Make Personal Safety a Priority

We often hear people (including myself) drone on at how the system is broken and how good guys end up in jail and bad guys are released on good behavior. The criminal justice system is far from fair. ...

28 Aug 2010
Robert Siciliano

What is Social Registration

Social media has evolved into the fifth major form of media: print, radio, television, Internet, social. While social media functions on the Internet, there’s no denying that it is its own platform. I...

26 Aug 2010
Robert Siciliano

Celebrity Identity Theft Issues

The only difference between a so-called celebrity and you and I is exposure. Their lives are subjected to much more attention than most people and for that they pay a price. Ours is a celebrity obsess...

25 Aug 2010
Robert Siciliano

Seven Smartcard Keys To The Internet

There has been a bit of buzz lately regarding an Internet “kill switch” and a handful of trusted individuals given the responsibility of rebooting the Internet, should it go down from cyber attack or...

25 Aug 2010
Robert Siciliano

Stealing Secrets: Telling Lies Over the Phone

In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon) I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up infor...

25 Aug 2010
David Divitt

The PFM debate

This is very interesting research from Fiserv that demonstrates how security-conscious consumers are, despite the benefits that PFM sites promise. True, a full view of all your accounts in one place v...

24 Aug 2010

Now hiring