Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
The October anniversary of the liability shift has passed, and anniversaries are an excellent time to look back on progress…this is no exception. The U.S. EMV migration plan was set four years ago as...
Ever peruse Craigslist for a new home? Nothing against Craigslist for doing that, but that’s where Coty Houston and David Yost happened to find a very alluring four-bed home for sale; looked perfect f...
The Dark Web, according to LeakedSource, got ahold of 33 million Twitter account details and put them up for sale. Twitter thus locked the accounts for millions of users. Twitter, however, doesn’t bel...
An impostor posed as Lorrie Cranor at a mobile phone store (in Ohio, nowhere near Cranor’s home) and obtained her number. She is the Federal Trade Commission’s chief technologist. Her impostor’s con n...
It’s all about code—the building blocks of the Internet. Software code is full of unintentional defects. Governments are paying heavy prices to skilled hackers who can unearth these vulnerabilities, s...
Get an account with TeamViewer, and you will have a software package that enables remote control, online meetings, desktop sharing and other functions between computers. But recently, customers of Tea...
You’ve probably read many times that two-factor authentication is a superb extra layer of protection against a thief hacking into your accounts, because gaining access requires entering a One Time Pas...
In 2015, depending on the kind and type of identity theft we are talking about, identity thieves impacted 1.5 million people or more, says the Javelin Strategy & Research report. That’s more than ...
Two thousand credit card payment terminals stand to become infected with malware called Trinity point of sales. Ten million credit cards were stolen by hackers, called Fin6, who may end up scoring $40...
Hackers can take over someone’s life in a matter of hours. Just ask Patsy Walsh. Though she is not a tech savvy person, the grandmother of six did have a Facebook account, and that was all the hackers...
If your car is in any way connected to the Internet, it can get hacked into. You know it’s only a matter of time before hackers begin infiltrating motor vehicles in droves, being that vehicles are pla...
“Anonymous” is an activist hacking group that has recently boasted that it will engage in 30 days of cyber assaults against “all central banks,” reports an article on cnbc.com. And their bite is as bi...