Finextra Research
Sibos 2025
Sign in
Sign up
Sibos 2025
  • News
    • Latest news
    • Company updates
    • Long reads
  • TV
  • Research
  • Events
    • All
    • Conferences
    • Webinars
    • Popular
  • Community
    • Community latest
    • Latest expert opinions
    • Groups
    • Search members
  • Jobs
  • APIs
Sign in
Sign up
Sibos 2025
  • News
    • Back
    • News
    • Latest news
    • Company updates
    • Long reads
  • TV
  • Research
  • Events
    • Back
    • Events
    • All
    • Conferences
    • Webinars
    • Popular
  • Community
    • Back
    • Community
    • Community latest
    • Latest expert opinions
    • Groups
    • Search members
  • Jobs
  • APIs
  • payments
  • markets
  • retail
  • wholesale
  • wealth
  • regulation
  • crime
  • crypto
  • sustainable
  • startups
  • devops
  • identity
  • security
  • cloud
  • ai

Community

  • Your feed
  • Latest expert opinions
  • Groups

Join the Community

24,418
Expert opinions
40,797
Total members
356
New members (last 30 days)
359
New opinions (last 30 days)
29,339
Total comments
Join Sign in
the joy of fighting crime
Follow Unfollow

Uri Rivner

CEO and Co-Founder
Refine Intelligence
Member since
14 Apr 2008
Location
Tel Aviv
Followers
7
Following
1
Opinions
89
Long reads
0
Followed by John Sims, Martha Boyle and 5 others you follow
View Uri Rivner's full profile

Uri's comments

clear
Unlucky 100,000

Just one small note: the 2004 bar in the chart looks empty, but in fact it includes a little over 100 distinct shut-downs of attacks targeting several financial institutions. Back then it looked like a big number...

Stuart - to you and all the good guys who didn't sleep all night during the early days of phishing attacks!

18 Dec 2008 15:09 Read comment

Curse of the Were-Laptop

John,

I was thinking about adding the punchline about what criminals can do once they're inside the corporate firewall, but I decided to do a Hitchcock and just leave the actual murder scene for people's imaginations ;)

But basically, the answer is – whatever criminal activity fortune 1000 companies have invested billions to defend against by building corporate firewalls, network security and intrusion detection systems. And much beyond that, given the fact fraudsters today are better equipped and more globally coordinated than 10 years ago when the original problem of hacking into the enterprise loomed.

With regards to employees helping the crooks, I think it's an excellent point. You're right, people will do their best to get around security.

The magnitude of the issue became apparent in an RSA "people on the street" survey conducted last year.

35% of employees feel that they sometimes need to work around security procedures established in the corporate so they can get their job done.

68% of corporate employees and 58% of government employees said they leave the office carrying sensitive data on a mobile device such as a laptop, smartphone or USB memory stick.

92% of government employees said they get training about the importance of following security practices, as opposed to 69% in the corporate. Can this explain why government employees fair a little better?

Not really. 68% of government employees said they sent work documents to a private email address so they could work on them at home, compared to 61% in the corporate. Reconciling all these figures is simple: the public sector issues less laptops and blackberries than the private sector. So if you've got a government deadline to meet, you are more likely to work on it on your private home PC than your corporate colleague.

8% actually said they've lost a device containing corporate data. What type of data might be inside? The survey lists customer data, personally identifiable information such as Social Security numbers, company financials, credit card data, or competitively sensitive information as some possible examples.

So yes, I totally agree: the enterprise environment still didn't figure out how to balance corporate security with ease-of-use for employees.

04 Dec 2008 06:34 Read comment

Curse of the Were-Laptop

Good suggestions. Does anyone have other ideas? What do you feel about security by virtualization?

24 Nov 2008 18:29 Read comment

October Surprise

Dean,

Let me take you back to the Enigma machine.

Cracking the Enigma code was a major breakthrough, but no one claims it was the most important factor in the success of the Allies' campaign. There are a huge number of contributors, from individuals to technological advancements to tactical improvements.

Just take one historic example: the battle of the Atlantic. For years it was completely controlled by U-boat 'Wolf Packs', which were so effective in cutting Britain from fuel and supplies that in early 1943 there was talk of ceasing the war effort.

But in mid 1943 the tide turned through a combination of smart leadership by newly appointed Admiral Horton of the Royal Navy, technological advancements such as the Active Sonar, hit-and-explode depth charges and next generation radars, as well as new tactics used by allied aircrafts and escort ships.

It took several months to reverse the economical equation of sinking more ships than what the US could replace. This made U-boats less of an ultimate weapon.  

I believe the same applies to the battle over Internet Fraud. Do 56 arrests leave a dent in the economy of online crime? Yes, at least in the immediate future, if you consider the fact fraudsters believe they are not supposed to be caught. Does this win us the war? No, and no one claims it does.

It's not a war we expect to finish anytime soon. It's not a duel that any single bullet will decide. No, my friend, this campaign against online fraud, this arms race between the industry, helped by law enforcement, anti-fraud technologies and each and every one of us as an individual consumer on one hand, and the legion of criminals on the other hand, will continue to rage – but this doesn’t mean we cannot celebrate important victories and applaud the brave lads and lasses who work hard fighting the bad guys.

02 Nov 2008 21:27 Read comment

October Surprise

As always I appreciate your comments Dean – but the title managed to confuse you. It is not the industry who got surprised. It is the fraud underground, who probably expected a quiet October as many security companies and IT security professionals in Europe get ready for RSA Conference. Well, they were wrong, and got an unpleasant October Surprise.  

01 Nov 2008 09:53 Read comment

A cure to common cold is found!

I'm a big fan of out-of-band authentication via mobile or phone. It has the best chances of defeating and man-in-the-browser (MITB). I’m going to write a blog entry explaining why I like it, what its drawbacks are, and how I think it should be effectively used.

As a side note, Man-in-the-middle (MITM) is a prevalent attack vector and is pretty easy to address: the cash-out of the stolen credentials is done from another machine, so a good device recognition technique will work.

MITB is a phantom attack: with one or two exceptions, and despite common belief, it has never been tried in a live attack on a financial institution. It requires a lot of effort on the fraudster’s side, and a degree of vertical integration between credential thieves and cash-out operators that makes it impractical at this point of time. Researchers differ on predicting when it will become widespread, if it all.

My thinking is that it might happen if banks start an arms race of visible authentication that cannot be otherwise breached. 

There are plenty of covert, invisible defenses against MITB which can complete your defense array: from user behaviour profiling and pattern analysis through various clever counter-measures I won’t describe here (no need to give a freebie to fraudsters, right?).

As of now, OOB based on mobile or phone devices is the best, most cost effective authentication in a MITB scenario. Anyway, I’ll post my full thoughts on OOB at a later time and we can bicker about them ;)

25 Apr 2008 06:21 Read comment

Banks use Harry Potter Technology

Dean - you're right, and giving customers something they can see or touch is always a good idea. I'd say the best strategy is to offer security to customers who want it, protect the ones who don't care about it using invisible security, and in any case think 'flexible' and develop a 'bag of tricks' you can throw at the bad guys, rather than rely on a single layer.

17 Apr 2008 06:06 Read comment

  • 1
  • 2
  • 3
  • 4

Uri writes about

  • security
  • payments
  • regulation & compliance
  • retail banking
  • financial crime

Uri's opinion archive

  • 2023 (1)
  • 2022 (1)
  • 2020 (4)
  • 2019 (1)
  • 2018 (4)
  • 2015 (1)
  • 2014 (2)
  • 2013 (6)
  • 2012 (6)
  • 2011 (5)
  • 2010 (28)
  • 2009 (16)
  • 2008 (14)

Latest groups joined by Uri

  • Information Security

  • Transaction Fraud Systems and Analysis

  • Innovation in Financial Services

See all groups joined
ShowHide similar members

Similar members

Ofir Tahor

Ofir Tahor
CEO and Co-founder at Justt

Follow Unfollow
Vall Hèrard

Vall Hèrard
CEO and Co-founder at Saifr™

Follow Unfollow
Andrew Grevett

Andrew Grevett
CEO and Co-founder at Market Dynamics

Follow Unfollow
Ronen Cojocaru

Ronen Cojocaru
CEO and Co-Founder at 8081.io

Follow Unfollow
Henrik Grim

Henrik Grim
CEO and Co-founder at Mimo

Follow Unfollow

Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.

Please read our Privacy Policy.

Accept
Finextra

Finextra

  • About

Community

  • Rules
  • Contact the community team

News

  • Guidance
  • Contact the news desk

Sales

  • Media pack
  • Contact the sales team

Get involved

  • Finextra Live@
  • Webinars
  • Finextra TV
  • Research
  • Finextra.jobs
  • Finextra Pro

Events

  • Sustainable Finance Live
  • NextGen Nordics
  • EBAday
  • NextGen:AI

Members

Join the community News alerts

Follow

Download Finextra Pro

Download Finextra Pro from Apple App Store Download Finextra Pro from Google App Store

Download Finextra News

Download Finextra News from Apple App Store Download Finextra News from Google App Store

© Finextra Research 2025

Terms of usePrivacy PolicyCookie Centre