27 March 2017

Information Security

A Finextra Community Group

124Posts 596,212Views 203Comments

Latest blog posts

Mike LynchInAuth - Boston

Attack of the Bots

23 March 2017  |  3770 views  |  1 comments | recommendations Recommends 0

While there is always the debate about what the biggest cybersecurity threat is today—DDoS attacks, ransomware, SQL injections, etc.—there is consensus that, based on total dollars lost, the use of automated bots to commit fraud has risen to the top of the list. Botnets are a type of malware that allows an attacker to take control of an affected c...

TagsSecurity
John SafaPushfor Ltd - London

The real impact of the Vault 7 CIA data leak

09 March 2017  |  5592 views  |  0 comments | recommendations Recommends 0

The leak of almost 9,000 documents detailing hacking and surveillance techniques used by the CIA is shocking, but not for the reasons many people think. Reading that your Smart TV or mobile phone could be monitoring what you say in your own house is alarming, but the real issue isn’t that the CIA spies on people. It’s not even that they do it thr...

TagsSecurityRisk & regulation
More blog posts
Mike Lynch
Mike LynchInAuth - Boston

Overcoming Vulnerabilities In TLS

28 February 2017  |  3639 views  |  0 comments | recommendations Recommends 0

Recently Sudo Security Group uncovered something shocking about a range of popular applications available for download in the Apple's iOS Store. While performing research for their security tool verif...

TagsSecurityMobile & online
Pat Carroll
Pat CarrollValidSoft - London

Security by Obscurity is the key!

27 January 2015  |  3489 views  |  0 comments | recommendations Recommends 0

2014 shocked us all into the reality that no institution or organization, no matter how big or sophisticated, was immune to being “hacked” or “breached”. Towards the end of the year, we were all numbe...

TagsSecurityTransaction banking
Pat Carroll
Pat CarrollValidSoft - London

iHack Hastens Call for Multi-factor Authentication

05 September 2014  |  3531 views  |  1 comments | recommendations Recommends 0

“If only I would have known” is a phase that Jennifer Lawrence, Kate Upton and possibly as many as 100 celebrities and notable personalities are likely saying after a reported massive breach of Apple’...

TagsSecurityPayments
Pat Carroll
Pat CarrollValidSoft - London

Our Predictions for 2014: Who Will Dominate? Part 1

20 January 2014  |  2246 views  |  0 comments | recommendations Recommends 0

Unfortunately, it’s not going to be plain sailing on the security front in 2014. It’s a bit like Friday 13th. Many folk say that Friday 13th is not their unlucky day at all, it’s Saturday 14th they wo...

TagsSecurityInnovation
Uri Rivner
Uri RivnerBioCatch - Tel Aviv

BitCoin Explained: How to Become a BitCoin Thief - part 1

04 December 2013  |  21412 views  |  1 comments | recommendations Recommends 1

OK folks. You’ve all been hearing about Bitcoin. Your neighbors have been hearing about Bitcoin. Your dog walker has been hearing about Bitcoin. Now it’s time to separate the wheat from the chaff… L

TagsMobile & onlinePayments
Dean Procter
Dean ProcterTransinteract - Sydney

iPhone fingerprint scanner broken by Chaos

22 September 2013  |  3818 views  |  3 comments | recommendations Recommends 0

The new biometric security 'feature' if the Apple iPhone has already been breached using a simple photograph & common everyday items. It took members of the renowned Chaos Computer Club the blink ...

TagsSecurityMobile & online
Dean Procter
Dean ProcterTransinteract - Sydney

Did I mention, 'your dongle dongle is impotent'?

22 September 2013  |  2874 views  |  0 comments | recommendations Recommends 0

RSA Security, is alleged to have warned thousands of its customers to immediately discontinue using all versions of company's BSAFE toolkit and Data Protection Manager (DPM), both using Dual_EC_DRNG (...

TagsSecurityMobile & online
Uri Rivner
Uri RivnerBioCatch - Tel Aviv

The positive side of Malware

20 June 2013  |  4206 views  |  0 comments | recommendations Recommends 1

At precisely 20:26 local time my Yahoo app began buzzing like a bee hive. 72 ‘Mailer-Daemon’ failure to email messages popped up one after the other in my home-use email. Shortly afterwards I star

TagsSecurityMobile & online
Previous 1 | 2 | 3 | 4 | 5 |Next

About this group join  Join us

Founded by An ex-member
Date 04 Apr 2007
Group profile
The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
members
28,847
Members
comments
16,884
Comments
blogs
11,076
Posts
bloggers 
1,195
Active bloggers

Top posts in the last week

Top bloggers: 30 days

Most viewed Engaging
Mike Lynch
Mike Lynch

Michael Lynch serves as Chief Strategy O...

John Safa
John Safa

John Safa is the founder of Pushfor, a s...

Who is commenting on Information Security posts

Jess Hayes
Ketharaman Swaminathan
Brett King
Dean Procter
Alexander Peschkoff