136 Results from 2015, /security
Retired Member
When it comes to data breaches, individuals and businesses are not seeing eye-to-eye. Executives are erroneously confident about their ability to tackle cybercrime, but their customers are growing ever more concerned about the safety of their personal data. The over-confidence of UK industry is puzzling especially when recent research has reveale...
13 April 2015 /security /payments
Robert Siciliano Security Analyst at Safr.me
Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace. Bank of America got back about $400,000, but the hospital is reeling becau...
12 April 2015 /security
What if you knew there existed a possibility that some company, without your knowledge, grabbed a photo of your child and put it on their product and then put their product online for sale? Koppie Koppie sells coffee mugs with photos of kids on them—and YOUR child could be one. Though this begs the question, who on earth would want a coffee mug w...
06 April 2015 /security
Financial Fraud Action have recently announced that during the course of 2014, there was a 48% increase of Online Banking fraud in the UK, driven by a rise in malware and fraud perpetrated through social engineering. While the FFA states that the losses are "relatively modest", it is fair to say that despite increased media coverage of th...
02 April 2015 /security /retail
Cyber Attack Vector… the Human Operating System is 100% Vulnerable Cyber-attacks are through the roof. Numbers from the FBI, Verizon Breach Report, The Ponemon Institute and nearly every industry source all agree the number of attacks are dramatically increasing. We have all heard of Target, Neiman Marcus and so many others. So the question i...
31 March 2015 /security /regulation
Here’s good advice from a sheriff’s office about how to protect your house. Burglars and home invaders don’t give a flying hoot if you keep thinking, “It can’t happen to me and this is a safe neighborhood.” In fact, the issue isn’t how safe your neighborhood is or how watchful your neighbors are. The issue is how easy it is to simply break into yo...
28 March 2015 /security
Anthony Pickup Consultant at Capgemini Invent
In the 1960’s the user name and password system for accessing computer systems was first deployed. In mid 1970’s the ATM card and PIN was first deployed and this evolved into the now ubiquitous ATM card and Online PIN in the Eighties. Until this time PIN’s were a mixture of Online and Offline but as networks expanded and more sharing of networks h...
27 March 2015 /security
Ever see those public bulletin boards with all the business cards on them? Don’t be surprised if you spot one that says “Hacker•for•Hire.” These are hackers who will, for a nice juicy fee, hack into your wife’s Facebook account to see if she’s cheating on you. However, there’s at least one hackmaking site that matches hackers to clients who want t...
26 March 2015 /security
Banks have invested heavily into fraud detection systems that tries to identify suspicious transactions. The systems put together network data, user's normal payment pattern... anything that can create a picture of what is normal and what is not. An important part of this is device fingerprinting, a technology that collects system information fro...
25 March 2015 /security
HCE cloud-based mobile payments have opened a new chapter in the industry's thinking around security of card data on-device and the risk management associated with it. The lack of secure element hardware storage on-device creates the need for strong software based solutions to mitigate the risk of storing sensitive card data on phone memory. Token...
13 March 2015 /security /payments
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.