Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Happy Holidays and Thank You From Robert Siciliano

25 years ago I was in a situation where I needed some help. A man appeared out of nowhere and seemed to have sensed my desperation and offered assistance. I accepted. Up until that day “It was all abo...

31 Dec 2010
Robert Siciliano

Hacking Wireless for Identity Theft

The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels,...

28 Dec 2010
Retired Member

Basel III: Trust the rules

Basel III is setting the precedence for re-establishing the rules, as a result of the fall out of the financial market post-2008. The key aspects – tighter rules for tier-one capital, higher ratios o...

16 Dec 2010
Innovation in Financial Services
Brett King

Is Basel III bad for finance?

The Basel III accord’s stated purpose is: This consultative document presents the Basel Committee's proposals to strengthen global capital and liquidity regulations with the goal of promoting a more r...

15 Dec 2010
Innovation in Financial Services
Robert Siciliano

Online Shoppers Concerned About Identity Theft

Shopping online is unquestionably more convenient and efficient than traditional commerce. But is it safer? We face risk everywhere we go. We risk car accidents on the way to the mall. Muggers and thi...

13 Dec 2010
Retired Member

Can the Financial System Withstand Cyber Attack?

I report what I predict and what I observe. Risk managers should consider the risk of widespread adoption of sentiments in line with this post to an infosec site. Who would have predicted this? Will r...

13 Dec 2010
Whatever...
Robert Siciliano

Twitter Crime on the Rise

Twitter is now beginning to see a substantial rise in active users. A recent report found that the percentage of Twitter users who have tweeted ten or more times, have more than ten followers, and fo...

09 Dec 2010
Robert Siciliano

Top 5 Vishing Techniques

“Vishing” occurs when criminals call victims on the phone and attempt to lure them into divulging personal information that can be used to commit identity theft. The name comes from “voice,” and “phis...

07 Dec 2010
Retired Member

Its Banking Next

For several weeks now, I’ve watched in amazement as the Bombay Stock Exchange’s benchmark index traded at barely 10% off its highs of January 2008. While India may be an outperformer, that still does ...

07 Dec 2010
Innovation in Financial Services
Robert Siciliano

How Much Longer Does the Magstripe Have?

Every U.S.-based credit card has a magnetic stripe on the back. This stripe can be read and rewritten like a rewritable burnable CD, using card burners that are easily available online. The simplicity...

06 Dec 2010
Retired Member

'PROTECT OUR DATA OR BE FINED' STATES THE UK CONSUMER!

Despite Information Commissioner doling out his first-ever fines for Data Protection Act breaches, the UK consumer wants tougher penalties for those deemed to be wrong-doers. Isn’t it great when you ...

06 Dec 2010
Information Security
Robert Siciliano

Supercookies: What Websites Know About You

Most major websites now install cookies on your computer, which track what you do online. Over time, these cookies develop a profile, which becomes your digital fingerprint, to a certain extent. You ...

01 Dec 2010