Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
We all know about identity fraud and the various ways this can happen, but what about the tools to fight identity fraud? Well, there are industry measures in place to stop people’s identities being us...
First thing I tell my seminar attendees is “The chances of anything bad ever happening to you is very slim. So don’t worry about. However you should still put these systems in place.” Are you a helico...
Two years ago I wrote about Curse of the Were-Laptop, which highlighted the fact PCs are used for both personal use and work; your employees can get themselves infected outside the corporate firewall...
Imagine Steve Jobs saying Steve Ballmer just called him to say Microsoft decided to stop the development of Windows; that he just received a package containing the entire Windows source code; and that...
I feel like my head is going to explode. The Colorado Supreme Court has ruled “that using someone else’s Social Security number is not identity theft as long as you use your own name with it.” The def...
Living in the Northeast has its pros and cons. We have the four seasons, great food, entertainment, sports, everything is at your fingertips, and for me it’s where business gets done. Drawbacks includ...
Today’s criminal hackers are very different than those who hacked for fun and fame a decade ago. Every week, I see stories about more criminals in faraway lands, making millions from various scams, em...
Is regulatory pressure really going up? If you listen to the vendors and the press alike, that’s certainly the impression you’ll get, but is it true? We decided to find out by looking at the evidence...
Something happened last week that was so extraordinary, I had to blink and rub my eyes to really believe they weren’t deceiving me! If you have read my blogs before, you will know I regularly highligh...
A botnet is a group of Internet-connected personal computers that have been infected by a malicious application, which allows a hacker to control the infected computers without alerting the computer o...
“Spear phishing” refers to phishing scams that are directed at a specific target. Like when Tom Hanks was stranded on the island in the movie Cast Away. He whittled a spear and targeted specific fish,...
Quangos aren't organisations that receive the best of press - even when they do a good job! The Audit Commission has had its fair share of critics over the years. But, unlike many quangos, it has play...