Join the Community

23,599
Expert opinions
41,359
Total members
355
New members (last 30 days)
193
New opinions (last 30 days)
29,161
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Retired Member

Retired Member 

RANCOUR AND 10M EURO BILL FOLLOWS UBS EMAIL ERROR

Ever clicked send on an email, and instantly regretted it? I think we’ve all been there – but perhaps not to the scale of one UBS employee this week, where a small error has created some rather significant repercussions. Yes, this is the story of a UBS employee who inadvertently sent an email containing financial details of the then client General...

/security /regulation

Retired Member

Retired Member 

UK Businesses are Falling Victim to the Same Old Scams

Following recent news that more than two-thirds of companies have been hit by data breaches over the past year, the report featured in Computer Weekly is an interesting, if not alarming, confirmation that fraud is on the rise. Although person-present payments have improved security measures due to developments in global security standards like PCI...

/security /payments

Retired Member

Retired Member 

Why don't we check our credit reports?

We all know about identity fraud and the various ways this can happen, but what about the tools to fight identity fraud? Well, there are industry measures in place to stop people’s identities being used fraudulently like the work of the Dedicated Cheque and Plastic Crime Unit and CIFAS, the Fraud Intelligence Sharing System and the banks use of int...

/security

Retired Member

Retired Member 

Apple: the 800 pound gorilla of mobile payments

To date, the poor availability of phones with NFC technology has been one of the factors holding back the use of this technology to enable wave-and-pay mobile payments in a shop or peer-to-peer payments by touching phones together. It seemed earlier this year that bridging technologies may provide the kick start needed for contactless payments to ...

/payments

Retired Member

Retired Member 

Working from home, is your office data security compromised?

Key security considerations for home and mobile workers In many cases executive IT and security professionals trust their Information Security departments to provide adequate security to protect employees while operating in their business environment. However it is rare for users to extrapolate this security to a home environment. What does this ...

/security /payments

Retired Member

Retired Member 

Are wireless networks the next threat to our identity?

There is no doubt we live in an increasingly mobile, fast-paced and complicated society. If you had asked the average person in the street five years ago how their identity could be stolen then bin raiding and theft of personal mail would certainly have figured prominently. Today, ask the same question and you’re likely to get a multitude of respo...

/security

Retired Member

Retired Member 

Cairo conference focuses on Data Field Encryption

If Visa’s Payment Security Forum held in Cairo this week is anything to go by, Data Field Encryption projects certainly seem to be on the agenda for banks in the Middle East, Africa, and Eastern Europe. More than 95% of those responding to a quick poll at the conference said they were either considering, evaluating, or were actively engaged in Da...

/security /payments

Lachlan Gunn

Lachlan Gunn Executive Director at European Association for Secure Transactions

Now you can see why you should protect your PIN at an ATM!

I first did a blog on Do you Protect Your PIN at ATM on this site last winter. In it I stated: "The most common ways that criminals obtain a PIN at an ATM are by looking over your shoulder (defeated by covering your PIN), by using spy or micro cameras (also defeated by covering your PIN) and by using a false overlay over the PIN pad. It shoul...

/security

Retired Member

Retired Member 

Canada shows how EMV migration can impact fraud

The voices calling for the U.S. to migrate to EMV have been growing louder over the past few months with Walmart, T-Mobile and even the Federal Reserve calling for or discussing the move. Meanwhile, just across the border, the United States’ close northern cousins in Canada have already taken the decision to make the move and are well underway in...

/payments

Anthony Cossey

Anthony Cossey Project Manager at Fixnetix ltd

Osama Rim Laden?

The UAE and Saudi Arabia have banned certain communications services available via Blackberry devices in their countries, simply because the data leaving the device is encrypted and this makes the data difficult to perform snooping on. This to me defies logic, if were using any Internet connected device for illegal purposes, i would certainly be u...

/security

Now Hiring