269 Results from 2010, /regulation
Keith Appleyard IT Consultant at available for hire
Once again one hears of a Building Society not encrypting its laptops, coupled with poor physical security and password management by its employeees. In this instance, an unencrypted laptop belonging to the (former) Chelsea Building Society (which in April 2010 merged with Yorkshire Building Society), was stolen from its Cheltenham premises. It bel...
30 August 2010 /security /regulation Whatever...
As reported in the New York Times : www.nytimes.com/2010/08/22/business/22digi.html Papers filed in court allege that over a 4 year period, thieves created fictitious Merchants through use of accommodation addresses and stealing other peoples identities, charged more than $10 million on consumers’ credit and debit cards, and then moved the money...
30 August 2010 /payments /regulation Whatever...
Robert Siciliano Security Analyst at Safr.me
Officials are reporting a wave of credit and debit card attacks targeting point of sale swapping, skimming of card data, and hacking into payment processors. Reports say the U.S. Secret Service, among others, are in the process of investigating a multistate crime spree. The Oklahoma Bankers Association commented, “It is beyond apparent our banker...
30 August 2010 /security /regulation
This year’s Defcon convention of hackers in August brought to light a fact that many in the security industry have known: mobile phones are becoming a bigger target for criminals. Recent news of applications on the iPhone and Android that are vulnerable to attack and possibly designed to send your data offshore have reinforced the security concer...
28 August 2010 /security /regulation
We often hear people (including myself) drone on at how the system is broken and how good guys end up in jail and bad guys are released on good behavior. The criminal justice system is far from fair. Too often bad people are let out only to re-offend and sometimes do worse the second or third time around. Securing your home is crucial way of prot...
Social media has evolved into the fifth major form of media: print, radio, television, Internet, social. While social media functions on the Internet, there’s no denying that it is its own platform. It encompasses most forms of media in one tight and neat package. Some social networking sites have more users than number of residents in some countr...
26 August 2010 /security /regulation
The only difference between a so-called celebrity and you and I is exposure. Their lives are subjected to much more attention than most people and for that they pay a price. Ours is a celebrity obsessed culture that has multiple TV programs every day of the week that focus solely on the lives of the popular people. With that attention often comes ...
25 August 2010 /security /regulation
There has been a bit of buzz lately regarding an Internet “kill switch” and a handful of trusted individuals given the responsibility of rebooting the Internet, should it go down from cyber attack or be shut down for whatever reason. The operation is born of the Internet Corporation for Assigned Names and Numbers (ICAAN). ICANN was formed in 1998....
In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon) I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. At the recent Defcon event, social engineers proved that it doesn’t take much more than asking to get the necessa...
Child identity theft is a growing problem. The Federal Trade Commission estimates that there are 500,000 new victims every year. The culprits are often parents or others who have direct access to the child’s Social Security number. (In my own experience, I’ve had to give out my children’s Social Security numbers to hospitals, insurers, and schools...
24 August 2010 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.