136 Results from 2015, /security
Robert Siciliano Security Analyst at Safr.me
Does your wallet contain enough information about you for someone to steal your identity and commit crimes under your name? That’s what happened to Jessamyn Lovell when Erin Hart stole her wallet in 2011. Hart shoplifted, checked into hotels and rented cars in Lovell’s name. Of all the nerve. Lovell tracked Hart down and documented this in “Dear ...
12 March 2015 /security
Retired Member
In 2011, the African Union and United Nations Economic Commission for Africa formed a ‘High Level Panel on Illicit Financial Flows’ to investigate the extent to which illicit financial flows (IFF) are likely to hamper African development. The Panel defined IFFs as “money that is illegally earned, transferred or utilized. These funds typically orig...
10 March 2015 /security /regulation
Privacy used to mean changing clothes behind a partition. Nowadays, say “privacy” and people are likely to think in terms of cyberspace. Stay connected, and you risk losing your privacy. Even if you’re not connected, don’t even own a computer or smartphone, information about you can still be out there on the Internet, such as a listing for your add...
07 March 2015 /security
Who needs guns, threatening notes to rob a bank when you can do it with just your fingertips inside your home? A hacking ring in the eastern portion of Europe may be the most successful team of bank robbers to date, having purportedly robbed $1 billion from multiple banks. This can only be done by infecting computers with malicious software (malwar...
04 March 2015 /security
What is catphishing? It certainly isn’t Garfield lazily sitting in a canoe holding a fishing rod. Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the scammer—because eventually he’ll hit the victim up for money. But anoth...
03 March 2015 /security
Formal checking of user access privileges to data and resources within a financial business is wholly sensible. Indeed, it is strongly mandated by a range of regulatory authorities. But with audits typically required every six months or annually, this does not provide enough access certification oversight and may allow access risks to creep in leav...
02 March 2015 /security /regulation
Who’d ever think that 50 years ago, your money was safer in your bank account than it is today in this “modern” age: remote theft. If you bank with a large or small bank, your account may be at risk by hacking rings. However, most of the time, but not always, if your account is drained by a cyber thief, the bank will cover it for you. The latest in...
24 February 2015 /security
You may think you’re not dumb enough to fall for scams, but consider that someone you care deeply about is naïve enough to be conned. Besides, some scams are so clever that even those who think they’re scam-proof have actually been taken for a ride. Sometimes fraudsters pose as an authority figure. Some claim you won a prize, while others claim y...
19 February 2015 /security
Third-party due diligence is an obligation facing financial services when on-boarding and maintaining any supplier, agent, consultant, distributor or service provider to ensure they continue to comply with relevant regulations and consumer laws, protect confidential information, avoid unethical practices, protect data against identity theft, and m...
10 February 2015 /security /regulation
Andrew Churchill ID & Authentication Standards author at MIDAS Alliance
There has been much commentary of late over the surge in interest in tokenisation, not least on the back of certain mobile payment platforms. Tokenisation, as a principle, has of course been around for many years, but with the ever increasing prevalence of data breach disclosure notifications the adoption of ‘the token’ seems to coming of age. T
09 February 2015 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.