25 February 2017

Transaction Fraud Systems and Analysis

A Finextra Community Group

35Posts 189,652Views 64Comments

Latest blog posts

Cedric ParienteRacine Alpha - Paris

Skype Tapping Trojan Online

29 August 2009  |  3708 views  |  0 comments | recommendations Recommends 0

The creator of Skype Trojan decided to publish the source code of his program that is able to intercept VOIP communications of Skype. Nice intentions but bad execution He pretends that his first goal is to allow antivirus software companies to update signatures to be able to detect it more easily. This trojan records your VOIP communications befo

Cedric ParienteRacine Alpha - Paris

How to Crack WiFi Encryption in 1 Minute

28 August 2009  |  6617 views  |  0 comments | recommendations Recommends 0

Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. How do they do? The attack gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA (Wi-Fi Protected Access) encryption system. The attack was developed

More blog posts
Cedric Pariente
Cedric ParienteRacine Alpha - Paris

Hidden Risks of Cloud Computing

25 August 2009  |  4073 views  |  0 comments | recommendations Recommends 0

Lots of users are moving their computing lives from the desktop to the cloud. They rely on hosted web applications to access emails, store photos and documents. But even if it comes with a lot of conv...

Cedric Pariente
Cedric ParienteRacine Alpha - Paris

Never Use Hotmail as Secondary Email Account

30 July 2009  |  4980 views  |  1 comments | recommendations Recommends 1

Registering for an account at any web site almost always requires an email address, and some people use a secondary address they don't care about instead of their real email address to avoid spam. I

Cedric Pariente
Cedric ParienteRacine Alpha - Paris

Windows 7 RTM Activation Already Cracked

30 July 2009  |  6576 views  |  0 comments | recommendations Recommends 0

It's been less than a week since Windows 7 was released to manufacturer and already we're seeing reports that Windows 7 RTM Ultimate has been cracked using an OEM product key from computer manufacture...

TagsSecurityRisk & regulation
Cedric Pariente
Cedric ParienteRacine Alpha - Paris

VBF - Verified by Fraudster

22 July 2009  |  3261 views  |  0 comments | recommendations Recommends 1

Current authentication methods proposed by payment schemes are a joke for fraudsters. Not only are the credentials information static, but also very easy to get on the web. The fact that the code is

Cedric Pariente
Cedric ParienteRacine Alpha - Paris

SSL Critical Security Weakness Revealed

19 July 2009  |  3899 views  |  1 comments | recommendations Recommends 1

It is not new to the experts, but SSL (Secure Socket Layer) is not as secure as it is supposed to be. The SSL security protocol is receiving a critical security update. This update does not concern

Cedric Pariente
Cedric ParienteRacine Alpha - Paris

Apple kills Flash and Silverlight with HTTP Streaming

14 July 2009  |  5157 views  |  1 comments | recommendations Recommends 1

Apple just suggested to IETF (Internet Engineering Task Force) the HTTP Streaming to replace the RTSP (Real Time Streaming Protocol) and even Flash and Silverlight. HTTP Streaming The purpose of thi

TagsPost-trade & ops
Andre Edelbrock
Andre EdelbrockEthoca - Toronto

Payments Fraud Hurts All of Us

02 July 2009  |  3485 views  |  0 comments | recommendations Recommends 0

This AFP survey (click to download pdf of report) makes clear a trend many have expected, that fraud would grow as the economy continues to suffer. And, no surprise, but larger organizations are a b...

TagsPaymentsRisk & regulation
Cedric Pariente
Cedric ParienteRacine Alpha - Paris

Web 3.0 and 4.0

29 June 2009  |  14401 views  |  3 comments | recommendations Recommends 1

The web 3.0 is on every mouth. It seems like it’s one of the next buzzes on the internet. What is it? What can we expect from it? Before describing the WEB 3.0, let’s go a little bit through the his

Previous 1 | 2 | 3 | 4 |Next

About this group join  Join us

Founded by Retired Member
Date 07 Feb 2008
Group profile
A community for discussion of Transaction Fraud systems and anlaytical techniques for bank card and financial services organisations.
Active bloggers

Top bloggers: 30 days

Most viewed Engaging

There are no top bloggers for the last 30 days.

Who is commenting on Transaction Fraud Systems and Analysis posts

Dean Procter
Gerhard Schwartz
Chris Antone
Cedric Pariente
Paul Penrose
Stephen Wilson
Adam Nybäck
Joe Pitcher
Jonathan Rosenne
Elton Cane

Transaction Fraud Systems and Analysis blog archive

2009 (26)2008 (9)