Join the Community

24,380
Expert opinions
40,857
Total members
334
New members (last 30 days)
247
New opinions (last 30 days)
29,364
Total comments

Latest expert opinions

clear
clear

136 Results from 2015, /security

Retired Member

Retired Member 

Life’s a breach for the unprepared

When it comes to data breaches, individuals and businesses are not seeing eye-to-eye. Executives are erroneously confident about their ability to tackle cybercrime, but their customers are growing ever more concerned about the safety of their personal data. The over-confidence of UK industry is puzzling especially when recent research has reveale...

/security /payments

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Bank Account depleted, Company sues

Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace. Bank of America got back about $400,000, but the hospital is reeling becau...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Company proves why you shouldn’t post Kids’ Pics online

What if you knew there existed a possibility that some company, without your knowledge, grabbed a photo of your child and put it on their product and then put their product online for sale? Koppie Koppie sells coffee mugs with photos of kids on them—and YOUR child could be one. Though this begs the question, who on earth would want a coffee mug w...

/security

Retired Member

Retired Member 

Online Banking Fraud

Financial Fraud Action have recently announced that during the course of 2014, there was a 48% increase of Online Banking fraud in the UK, driven by a rise in malware and fraud perpetrated through social engineering. While the FFA states that the losses are "relatively modest", it is fair to say that despite increased media coverage of th...

/security /retail

Retired Member

Retired Member 

A Weak Link for Happy Hackers

Cyber Attack Vector… the Human Operating System is 100% Vulnerable Cyber-attacks are through the roof. Numbers from the FBI, Verizon Breach Report, The Ponemon Institute and nearly every industry source all agree the number of attacks are dramatically increasing. We have all heard of Target, Neiman Marcus and so many others. So the question i...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Sheriff’s office offers Home Security Tips

Here’s good advice from a sheriff’s office about how to protect your house. Burglars and home invaders don’t give a flying hoot if you keep thinking, “It can’t happen to me and this is a safe neighborhood.” In fact, the issue isn’t how safe your neighborhood is or how watchful your neighbors are. The issue is how easy it is to simply break into yo...

/security

Anthony Pickup

Anthony Pickup Consultant at Capgemini Invent

Ubiquitous Authentication a decades old problem for the NOW generation.

In the 1960’s the user name and password system for accessing computer systems was first deployed. In mid 1970’s the ATM card and PIN was first deployed and this evolved into the now ubiquitous ATM card and Online PIN in the Eighties. Until this time PIN’s were a mixture of Online and Offline but as networks expanded and more sharing of networks h...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Hackers for Hire both Good and Bad

Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into your wife’s Facebook account to see if she’s cheating on you. However, there’s at least one hackmaking site that matches hackers to clients who want t...

/security

Retired Member

Retired Member 

Blinding bank's anti-fraud systems with FraudFox VM

Banks have invested heavily into fraud detection systems that tries to identify suspicious transactions. The systems put together network data, user's normal payment pattern... anything that can create a picture of what is normal and what is not. An important part of this is device fingerprinting, a technology that collects system information fro...

/security

Retired Member

Retired Member 

Tokenization is not enough: The role of on-device software for secure mobile payments

HCE cloud-based mobile payments have opened a new chapter in the industry's thinking around security of card data on-device and the risk management associated with it. The lack of secure element hardware storage on-device creates the need for strong software based solutions to mitigate the risk of storing sensitive card data on phone memory. Token...

/security /payments

Now Hiring