4373 Results from /regulation
Robert Siciliano Security Analyst at Safr.me
A Lynn Massachusetts couple was accused of selling the identities of at least 16 Transportation Security Administration workers at Logan International Airport. Lynn was then and is now known as “Lynn Lynn the City of Sin, you don’t go out the way you come in.” Fox News reports “A federal grand jury accused the couple of stealing personal informa
26 May 2010 /security /regulation
Roy McPherson
This week, and for many weeks, George Osborne will be taking steps to rein in unnecessary expenditure, halt future white elephant projects and seek ways to reduce the Brown/Blair legacy of £157 bn pounds deficit. The newspapers are talking up the prospect of cuts to the tune of £6bn a mere 3.82% of the overall sum. The previous Government should b...
24 May 2010 /payments /regulation
On the 6th May I blogged https://www.finextra.com/blogs/fullblog.aspx?blogid=4044 to say that I thought Greece could signal a bail out of the Euro and the more I read the more I think this will happen. Angela Mekel has seen the warning signs and believes the ban on short selling will stem the flow. Unfortunately this is the financial equivalent o...
21 May 2010 /regulation
Retired Member
By trying to ring-fence the bond market Mrs Merkel's government has durably dented the world's confidence in Germany's and EU willingness to abide by principles of the free markets. Worse, this lack of understanding of market mechanisms may disrupt some important liquidity flows and unexpectedly dry out other markets. For a start, what does qualif...
20 May 2010 /regulation
So maybe you used a public PC to log into your Facebook account and you hit a button that saved your login credentials. Or maybe you received an email from what you thought was Facebook and you plugged in your username and password and got phished. Now someone other than you has your account information and they are logging in to torture you or
20 May 2010 /security /regulation
Many of today’s automated processes are designed with security and/or convenience in mind. For example, if a credit card companies’ anomaly detection software detects irregular spending on your credit card the software may freeze your account or call you to make sure you are in-fact the one making the charge. While this may help to secure you, i
19 May 2010 /security /regulation
The Anti Phishing Working Group published a new report seeking to understand such trends by quantifying the scope of the global phishing problem, especially by examining domain name usage and phishing site uptimes. Phishing has always been attractive to criminals because it has low start-up costs and few barriers to entry. But by mid-2009, phis
Gert Raeves Research Director at Adox Research Limited
No B-movie or schlocky sitcom is complete without the "letter from the grave" plot device- in which the recently departed get to tell those who are left behind where the money (or the skeleton) is hidden. While ‘resolution and recovery plans' at least have reassuring alliterative potential, "living wills" is so much better. It ...
17 May 2010 /regulation Data Management 101
Gold is on the rise but reasons to buy more of it may progressively vanish. One should always be cautious of sharp reversals with precious metals due to the concentration effect during bull runs. Whilst equity investors have tens of thousands names to choose from, all gold investors around the world have only one price to focus on. Punters easily ...
16 May 2010 /regulation
Mobile Internet access and mobile service usage is growing rapidly and cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for innovation created by application developers and other content creators who are increasingly demanding more device access. As their requests grow in numbers and they distribut...
14 May 2010 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.