Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
Internet criminals follow a similar editorial calendar as newspaper and magazine editors, coordinating their attacks around holidays, and the change in seasons. They further capitalize on significant ...
Near Field Communications, or NFC, is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when ma...
Our culture deemphasizes individual responsibility. In my mind, life begins when you begin taking responsibility for everything in your life. Personal security is fundamentally your own responsibility...
Cases of stolen tax returns have surged over the past five years, leaving many identity theft victims struggling to recoup their lost refunds. Approximately 155 million tax forms are filed annually. T...
You’re a CIO or senior financial manager in a typical multi-national enterprise. You probably have thousands of staff across multiple geographies using a vast array of mobile voice and data devices. ...
There was some good news this week with The UK Cards Association reporting fraud on UK credit and debit cards in 2010 was at its lowest level since 2000 – a 17% reduction on 2009 figures to £365.4 mil...
I am now asking friends and family to keep a spare CD or USB Flash Drive on which to keep a LIVE version of a linux distribution, why do i do this? Well there are a few good reasons even for the most ...
What do you do when you are picked up in a cab and the driver suspects your home will be vacant while you are gone? The Manchester Evening News reports “A BUNGLING burglar went to the same ATM more th...
In July of 2007 on a hot summer night a serial killer was arrested after he broke into a 15-year-old girl’s room in Chelmsford Massachusetts in the middle of the night and tried to rape her. The girl...
Cloning occurs when hackers scan the airwaves to obtain SIM card information, electronic serial numbers and mobile identification numbers, and then using that data on other phones. Cloning can happen ...
Did you know there is a setting on LinkedIn where they will email your entire contact list in your behalf to let everyone know about a new position you have taken with a company? I didnt. Until I got ...
It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a r...