Join the Community

24,268
Expert opinions
40,806
Total members
341
New members (last 30 days)
224
New opinions (last 30 days)
29,326
Total comments

Latest expert opinions

clear
clear

269 Results from 2010, /regulation

Keith Appleyard

Keith Appleyard IT Consultant at available for hire

UK Building Society lucky not to lose Customer data

Once again one hears of a Building Society not encrypting its laptops, coupled with poor physical security and password management by its employeees. In this instance, an unencrypted laptop belonging to the (former) Chelsea Building Society (which in April 2010 merged with Yorkshire Building Society), was stolen from its Cheltenham premises. It bel...

/security /regulation Whatever...

Keith Appleyard

Keith Appleyard IT Consultant at available for hire

How to steal 10 million dollars and get away with it

As reported in the New York Times : www.nytimes.com/2010/08/22/business/22digi.html Papers filed in court allege that over a 4 year period, thieves created fictitious Merchants through use of accommodation addresses and stealing other peoples identities, charged more than $10 million on consumers’ credit and debit cards, and then moved the money...

/payments /regulation Whatever...

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

A Viable Solution to Wave of Skimming

Officials are reporting a wave of credit and debit card attacks targeting point of sale swapping, skimming of card data, and hacking into payment processors. Reports say the U.S. Secret Service, among others, are in the process of investigating a multistate crime spree. The Oklahoma Bankers Association commented, “It is beyond apparent our banker...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

mCrime Higher on Hackers Radar

This year’s Defcon convention of hackers in August brought to light a fact that many in the security industry have known: mobile phones are becoming a bigger target for criminals. Recent news of applications on the iPhone and Android that are vulnerable to attack and possibly designed to send your data offshore have reinforced the security concer...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Make Personal Safety a Priority

We often hear people (including myself) drone on at how the system is broken and how good guys end up in jail and bad guys are released on good behavior. The criminal justice system is far from fair. Too often bad people are let out only to re-offend and sometimes do worse the second or third time around. Securing your home is crucial way of prot...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What is Social Registration

Social media has evolved into the fifth major form of media: print, radio, television, Internet, social. While social media functions on the Internet, there’s no denying that it is its own platform. It encompasses most forms of media in one tight and neat package. Some social networking sites have more users than number of residents in some countr...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Celebrity Identity Theft Issues

The only difference between a so-called celebrity and you and I is exposure. Their lives are subjected to much more attention than most people and for that they pay a price. Ours is a celebrity obsessed culture that has multiple TV programs every day of the week that focus solely on the lives of the popular people. With that attention often comes ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Seven Smartcard Keys To The Internet

There has been a bit of buzz lately regarding an Internet “kill switch” and a handful of trusted individuals given the responsibility of rebooting the Internet, should it go down from cyber attack or be shut down for whatever reason. The operation is born of the Internet Corporation for Assigned Names and Numbers (ICAAN). ICANN was formed in 1998....

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Stealing Secrets: Telling Lies Over the Phone

In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon) I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. At the recent Defcon event, social engineers proved that it doesn’t take much more than asking to get the necessa...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Child Identity Theft

Child identity theft is a growing problem. The Federal Trade Commission estimates that there are 500,000 new victims every year. The culprits are often parents or others who have direct access to the child’s Social Security number. (In my own experience, I’ve had to give out my children’s Social Security numbers to hospitals, insurers, and schools...

/security /regulation

Now Hiring