Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
According to this article yesterday on Computerworld a sophisticated crew of German speaking hackers have conducted a data mining exercise with a difference. They've trolled through the account detai...
Recent revelations of China's state-sponsored cyber attacks on U.K. financial institutions underscores that strategic financial power is high on Beijing's list of priorities. Moreover, these attacks ...
What is it about politics and embarrassing metadata? UK readers will be familiar with the row about dodgy political donations that is currently surrounding the Labour party. It was perhaps only a ma...
Given that much of my time spent in conversations around metadata leakage being someone else's fault / responsibility, it was fascinating to watch the Chancellor's performance in the House this aftern...
Perhaps we should not be surprised, but every time one of these stories concerning multi-million dollar organised cyber crime hits the headlines, the sheer scale of the operation is startling, even to...
In July, 2003, the Pentagon's Defense Advanced Research Projects Agency (DARPA) scuttled an ill-conceived terrorism futures market. While the project was a political failure, the idea underscores the...
Very disappointing, as I am sure we all agree. Doubly so knowing Lord Erroll's dedication and enthusiasm for the work of the Committee (having heard his impassioned views on the issues at our recent I...
Interestingly, this was exactly the topic of conversation at a couple of CIO / CTO level Information Security dinners that we have hosted in the city recently, and follows hot (OK, warm) on the heels ...
Fyodor, the author of the popular Nmap FOSS for network exploration or security auditing, has released the list of the top 100 network security tools (excluding Nmap). He has compiled the list based ...
Story URL: http://www.theregister.co.uk/2007/09/01/bank_of_india_website_takeover/ The recent, crippling, malware attack on the website of Bank of India (http://www.bankofindia.com) is a stark remind...
Interesting to watch the increasing trend in the security industry of thinking more about insider threats. Is this because companies are feeling more on top of the external hackers and viruses, or a g...
Banks and their customers have very different ideas about what constitutes "sensitive data", and what communication should take place if data security is compromised. And one bank in particu...