30 July 2016

Security

Renee FrappierPacNet Services Ltd. - Vancouver

How the right credit card processing partner eases payment security burdens

28 July 2016  |  2253 views  |  0 comments | recommendations Recommends 0

Most credit card processing companies detail how they're a Payment Card Industry Level 1 service provider, meaning they adhere to the highest requirements of the PCI Data Security Standards. This sounds great for online retailers, but they should do a little more digging to see how these companies handle data before seeking a partnership. Not all...

TagsSecurityPayments
Howard BergGemalto UK - London

Banking on IoT: Security in the Internet of Things Era

19 July 2016  |  9303 views  |  2 comments | recommendations Recommends 0

The Internet of Things (IoT) is set to completely revolutionise our economy, society and culture over the next five years, with 2016 looking set to be the year in which IoT hits the mainstream. When it comes to the future of business, we have already recently considered how the IoT will change banking and what the impact of the predicted 25 billio...

TagsSecurityInnovation
More blog posts
Hannah Preston
Hannah PrestonCA - London

As mobile payments options expand, adoption will increase. Let’s not forget security!

15 July 2016  |  5906 views  |  0 comments | recommendations Recommends 0

The mobile payment market just got a lot more interesting with this week’s announcement about Mastercard taking its Masterpass digital payment platform mobile. The addition of Masterpass to the mo...

TagsSecurityMobile & online
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

Phone Account of FTC Chief Technologist hijacked

14 July 2016  |  2309 views  |  0 comments | recommendations Recommends 0

An impostor posed as Lorrie Cranor at a mobile phone store (in Ohio, nowhere near Cranor’s home) and obtained her number. She is the Federal Trade Commission’s chief technologist. Her impostor’s con n...

TagsSecurity
Andrew Davies
Andrew DaviesFiserv - London

SWIFT Warning Must Be Heeded

14 July 2016  |  3511 views  |  0 comments | recommendations Recommends 0

Cyber fraud losses make headlines on a regular basis – the latest target on display for all. While these reports may often be viewed as extreme, worst-case scenarios, the case of SWIFT’s recent warnin...

TagsSecurityRisk & regulation
Alex Noble
Alex NobleVizolution - London

What does HSBC’s adoption of voice biometrics tell us about trends in identity, customers and contac

14 July 2016  |  4442 views  |  0 comments | recommendations Recommends 0

Wanting a change from Brexit articles (too many of them are just too much speculation), I was looking back at some of the news stories from earlier in the year that I’d meant to blog on but hadn’t man...

TagsSecurityRetail bankingGroupInnovation in Financial Services
Venkat Rajaji
Venkat RajajiCore Security - Atlanta

The New Rules of Pen Testing

13 July 2016  |  3067 views  |  0 comments | recommendations Recommends 0

In the past, penetration testing was a fancy name for breaking through a network firewall. However, as technology advances and breaches become even more dangerous – costing an average of £2.53 million...

TagsSecurityRisk & regulation
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

Viruses as Cyberweapons for sale

12 July 2016  |  3152 views  |  0 comments | recommendations Recommends 0

It’s all about code—the building blocks of the Internet. Software code is full of unintentional defects. Governments are paying heavy prices to skilled hackers who can unearth these vulnerabilities, s...

TagsSecurity
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

TeamViewer Clients Victims of other Hack Attacks

08 July 2016  |  4323 views  |  0 comments | recommendations Recommends 0

Get an account with TeamViewer, and you will have a software package that enables remote control, online meetings, desktop sharing and other functions between computers. But recently, customers of Tea...

TagsSecurity
Robert Siciliano
Robert SicilianoIDTheftSecurity.com - Boston

Can Two-Factor Authentication actually fail?

06 July 2016  |  2658 views  |  0 comments | recommendations Recommends 0

You’ve probably read many times that two-factor authentication is a superb extra layer of protection against a thief hacking into your accounts, because gaining access requires entering a One Time Pas...

TagsSecurity
Previous 1 | 2 | 3 | 4 | 5 |Next
members
27,396
Members
comments
15,787
Comments
blogs
10,327
Posts
bloggers 
1,091
Active bloggers

Top security posts in last 5 days

Top bloggers: 30 days

Most viewed Engaging
Robert Siciliano
Robert Siciliano

Security analyst, published author, tele...

Hannah Preston
Hannah Preston

Coming from a background in behavioural...

Alex Noble
Alex Noble

I specialise in solutions for complex ba...

Andrew Davies
Andrew Davies

Andrew Davies is VP, global market strat...

Who is commenting on Security posts

Bo Harald
Howard Berg
Tayloe Draughon
Ketharaman Swaminathan
Stephen Wilson
Balasubramaniam Gd