25 July 2016

Information Security

A Finextra Community Group

120Posts 563,783Views 202Comments

Latest blog posts

Pat CarrollValidSoft - London

Security by Obscurity is the key!

27 January 2015  |  2986 views  |  0 comments | recommendations Recommends 0

2014 shocked us all into the reality that no institution or organization, no matter how big or sophisticated, was immune to being “hacked” or “breached”. Towards the end of the year, we were all numbed into submission and the shock factor resulting from the headlines that continued to dominate, was replaced with an uneasy bewilderment. Already thi...

TagsSecurityTransaction banking
Pat CarrollValidSoft - London

iHack Hastens Call for Multi-factor Authentication

05 September 2014  |  3264 views  |  1 comments | recommendations Recommends 0

“If only I would have known” is a phase that Jennifer Lawrence, Kate Upton and possibly as many as 100 celebrities and notable personalities are likely saying after a reported massive breach of Apple’s iCloud service resulted in the unauthorized access to, and release of, personal information and photos. While the FBI, dozens of security vendors an...

TagsSecurityPayments
More blog posts
Pat Carroll
Pat CarrollValidSoft - London

Our Predictions for 2014: Who Will Dominate? Part 1

20 January 2014  |  2061 views  |  0 comments | recommendations Recommends 0

Unfortunately, it’s not going to be plain sailing on the security front in 2014. It’s a bit like Friday 13th. Many folk say that Friday 13th is not their unlucky day at all, it’s Saturday 14th they wo...

TagsSecurityInnovation
Uri Rivner
Uri RivnerBioCatch - Tel Aviv

BitCoin Explained: How to Become a BitCoin Thief - part 1

04 December 2013  |  20587 views  |  1 comments | recommendations Recommends 1

OK folks. You’ve all been hearing about Bitcoin. Your neighbors have been hearing about Bitcoin. Your dog walker has been hearing about Bitcoin. Now it’s time to separate the wheat from the chaff… L

TagsMobile & onlinePayments
Dean Procter
Dean ProcterTransinteract - Sydney

iPhone fingerprint scanner broken by Chaos

22 September 2013  |  3521 views  |  3 comments | recommendations Recommends 0

The new biometric security 'feature' if the Apple iPhone has already been breached using a simple photograph & common everyday items. It took members of the renowned Chaos Computer Club the blink ...

TagsSecurityMobile & online
Dean Procter
Dean ProcterTransinteract - Sydney

Did I mention, 'your dongle dongle is impotent'?

22 September 2013  |  2734 views  |  0 comments | recommendations Recommends 0

RSA Security, is alleged to have warned thousands of its customers to immediately discontinue using all versions of company's BSAFE toolkit and Data Protection Manager (DPM), both using Dual_EC_DRNG (...

TagsSecurityMobile & online
Uri Rivner
Uri RivnerBioCatch - Tel Aviv

The positive side of Malware

20 June 2013  |  3995 views  |  0 comments | recommendations Recommends 1

At precisely 20:26 local time my Yahoo app began buzzing like a bee hive. 72 ‘Mailer-Daemon’ failure to email messages popped up one after the other in my home-use email. Shortly afterwards I star

TagsSecurityMobile & online
Uri Rivner
Uri RivnerBioCatch - Tel Aviv

Take the 45 Million and Run

10 May 2013  |  4222 views  |  0 comments | recommendations Recommends 0

It was one of the largest cyber-heists in human history. Like in many other cyber attacks, it started with breaching a secure network. This time the target was a US-based processor of prepaid cards is...

TagsMobile & onlinePayments
Pat Carroll
Pat CarrollValidSoft - London

Could EC3 help Europol see sense?

25 January 2013  |  5067 views  |  0 comments | recommendations Recommends 0

This month, we saw Europol’s launch of EC3, the new European Cybercrime Centre that aims to be at the heart of combating cybercrime in the EU. As I blogged back in July 2012, it’s fantastic the EU rec...

TagsCardsSecurity
Pat Carroll
Pat CarrollValidSoft - London

Dexter malware, targeting Christmas shoppers

20 December 2012  |  7591 views  |  0 comments | recommendations Recommends 0

The holiday season is a prime time for fraudsters to target consumers' credit cards and it's not surprising that Dexter has come to light a week before Christmas. Dexter is yet another malware variat...

TagsCardsSecurity
Previous 1 | 2 | 3 | 4 | 5 |Next

About this group join  Join us

Founded by Retired Member
Date 04 Apr 2007
Group profile
The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
members
27,334
Members
comments
15,752
Comments
blogs
10,299
Posts
bloggers 
1,086
Active bloggers

Top bloggers: 30 days

Most viewed Engaging

There are no top bloggers for the last 30 days.

Who is commenting on Information Security posts

Ketharaman Swaminathan
Brett King
Dean Procter
Alexander Peschkoff
Nick Collin
Steven Murdoch
Uri Rivner
John Dring
Gerhard Schwartz