Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
Two words: you can’t. However, there are several things you can and should do in order to manage your social media identity, which may prevent social media identity theft. What exactly is social med
It's very disheartening when an ATM user has to explain to a bank branch manager what ATM skimming is. I met a charismatic gent on FOX and Friends named Sean Seibel. Sean has a unique job title at
Lexis Nexis, which owns ChoicePoint, an information broker I recently blogged about that was hacked in 2005, was just hacked again this week. On Friday, LexisNexis Group notified more than 32,000 peo...
Social engineering is the act of manipulating people into performing certain actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically a...
Most people confuse privacy issues with security. Further, they don't really want privacy, they want convenience and discounted goods. They think they want security, but they actually want "easy
Last week Palo Alto Networks released the third edition of its Application Usage and Risk Report that found an average of Six P2P variants in 92% of the sample – with some organizations unknowingl
It wasn’t long ago that most phishing emails were from a supposed Nigerian General Matumbi Mabumboo Watumboo. And you and I were flattered that we were the chosen ones to help the general transfer 3
I was on CNN this week and CNN also featured Perez Hilton, who was hired by Donald Trump, to judge a beauty contest and Hilton made hateful remarks about Miss Californias beliefs. Perez is a hateful
Identity has become complex due to fraud. Fraud, motivated by money, easy credit, and the ease of account takeover. Because identity has yet to be effectively established, anyone can be you. “Identi
The US National Security Agency is probably the most sophisticated group of security hackers in the world. Many will argue this point. The fact is, without NSA, US STRATCOM, which directs the operat
We’ve known for some time that the long-haired, lowly, pot-smoking, havoc-reeking hacker, sitting alone in his mom’s basement, hacking for fun and fame is no more. He cut his hair and has now gradua
The holy grail of hacks may make banks have to completely revamp their payment systems. At an ATM or cash register, most debit card users are blissfully unaware of what occurs when they swipe their