Join the Community

23,590
Expert opinions
41,345
Total members
351
New members (last 30 days)
188
New opinions (last 30 days)
29,160
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Retired Member

Retired Member 

Yet another critical old 'black' hat web flaw re-discovered

So, the word is out. Now that many of the old spooks-only tricks to eavesdrop on unsuspecting banks, governments and consumers are out of the bag it might be time to have a moment of panic. The border gateway protocol (BGP) which routes traffic between telco's and ISP's is somewhat flawed. This has been known about since the inception of the intern...

/security

Matt White

Matt White North America editor at Finextra

IT administrators - devious and dangerous

You might want to think twice before laying off any IT administrators because it appears they can, and more importantly will, walk away with all your company secrets. A survey from Cyber Ark has found that of 300 IT security professionals questioned, 88% would steal valuable and sensitive company information if laid off tomorrow. Some would walk a...

Retired Member

Retired Member 

Blocking customers to protect them from poor systems design

The methodology let everyone down here. -'However, in this case fraud monitoring systems picked up the activity and the cards were blocked, meaning a "major fraud problem" was avoided, says the IPSO.'- They may have avoided a 'major fraud problem', but I'd suggest that they now have a 'major pain in the customer problem' and perhaps a lit...

/retail

Elton Cane

Elton Cane Digital product delivery at News Corp Australia

Massive ATM fraud in the US - who is to blame?

The UK daily newspapers and newswires are today picking up on an ongoing case in the US involving system breaches, thousands of stolen PIN numbers, card cloning and money laundering. We've been following this on The Wired Blog Network for a few weeks now - most recent post here. The main case involves Citibank branded ATMs in 7-11 convenience sto...

/security /retail

Retired Member

Retired Member 

Tech Giants to Save Us

I was wondering if I can have as many ID cards as I want - who is paying for them? Do I need a reader? Blah Blah Blah... Internet Mark2- the only 'marks' it gets are the fools dumb enough to buy in to this scam. Who woke up those sleeping giants anyway?

Elton Cane

Elton Cane Digital product delivery at News Corp Australia

Blogging from the Sifma TMC floor

White-badged visitors wander the rabbit warren of interconnected halls linked by escalators and corridors. From their designated areas, eagle-eyed sales people call out people’s names from their name badges as they walk past, fishing for leads. Casually dressed technologists (and probably the odd student) stop at each stand harvesting trade show ta...

/regulation

Retired Member

Retired Member 

Breach Laws fail to stem losses and RSA encrypto-stortion

A study by Carnegie Melon University has found that legislation mandating reporting of data breaches (and fines) has failed to lower ID theft or it's effects. Is it that nothing has changed and the downside has been built into the balance sheet or is this approach of 'shouting after the horse has bolted' simply a pointless excercise? I would have ...

/security

Retired Member

Retired Member 

Risks in the global payments and settlement systems.

There are some lovely little new systems which have well and truly taken that into account. In fact it has to be the foundation of any architecture. Robust, proven '5 nines' technology and equipment and decentralised. At the end ot the day...when you settle - so long as you can. So long as you can see what your exposure is you're ok. Of course it...

/regulation

Retired Member

Retired Member 

Data At Risk During Travel - Warning

Association of Corporate Travel Executives advice to business travelers states: That you should not carry any confidential, personal information that you do not want examined by third parties on your computer – or other electronic devices. This includes financial data, photographs, and email stored on computers, wireless phones, Blackberries, or...

/security /regulation

Retired Member

Retired Member 

Inconvenient Data Breaches

I get a the feeling that the government is more than a little miffed that their own data leak severely wounded their ID card proposal and that someone is going to pay. I suppose it distracts from the inconvenient truth that the details of 25 million citizens were lost by government, and they can't fine themselves after all. Of course I do not con...

/security

Now Hiring