Join the Community

24,370
Expert opinions
40,842
Total members
340
New members (last 30 days)
243
New opinions (last 30 days)
29,362
Total comments

Latest expert opinions

clear
clear

136 Results from 2015, /security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Victim overcomes Identity Theft with Art

Does your wallet contain enough information about you for someone to steal your identity and commit crimes under your name? That’s what happened to Jessamyn Lovell when Erin Hart stole her wallet in 2011. Hart shoplifted, checked into hotels and rented cars in Lovell’s name. Of all the nerve. Lovell tracked Hart down and documented this in “Dear ...

/security

Retired Member

Retired Member 

Illicit financial outflows cripple African progress

In 2011, the African Union and United Nations Economic Commission for Africa formed a ‘High Level Panel on Illicit Financial Flows’ to investigate the extent to which illicit financial flows (IFF) are likely to hamper African development. The Panel defined IFFs as “money that is illegally earned, transferred or utilized. These funds typically orig...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How the Internet of Things is further killing Privacy

Privacy used to mean changing clothes behind a partition. Nowadays, say “privacy” and people are likely to think in terms of cyberspace. Stay connected, and you risk losing your privacy. Even if you’re not connected, don’t even own a computer or smartphone, information about you can still be out there on the Internet, such as a listing for your add...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Sad Scary State of Bank Security

Who needs guns, threatening notes to rob a bank when you can do it with just your fingertips inside your home? A hacking ring in the eastern portion of Europe may be the most successful team of bank robbers to date, having purportedly robbed $1 billion from multiple banks. This can only be done by infecting computers with malicious software (malwar...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What is Catphishing?

What is catphishing? It certainly isn’t Garfield lazily sitting in a canoe holding a fishing rod. Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the scammer—because eventually he’ll hit the victim up for money. But anoth...

/security

Retired Member

Retired Member 

Is it Time for Risk-Based Access Certification in Financial Services?

Formal checking of user access privileges to data and resources within a financial business is wholly sensible. Indeed, it is strongly mandated by a range of regulatory authorities. But with audits typically required every six months or annually, this does not provide enough access certification oversight and may allow access risks to creep in leav...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What happens when a Bank Account is hacked?

Who’d ever think that 50 years ago, your money was safer in your bank account than it is today in this “modern” age: remote theft. If you bank with a large or small bank, your account may be at risk by hacking rings. However, most of the time, but not always, if your account is drained by a cyber thief, the bank will cover it for you. The latest in...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

10 Skeevy Scams to watch

You may think you’re not dumb enough to fall for scams, but consider that someone you care deeply about is naïve enough to be conned. Besides, some scams are so clever that even those who think they’re scam-proof have actually been taken for a ride. Sometimes fraudsters pose as an authority figure. Some claim you won a prize, while others claim y...

/security

Retired Member

Retired Member 

Mind the gap: third-party due diligence is more important than ever

Third-party due diligence is an obligation facing financial services when on-boarding and maintaining any supplier, agent, consultant, distributor or service provider to ensure they continue to comply with relevant regulations and consumer laws, protect confidential information, avoid unethical practices, protect data against identity theft, and m...

/security /regulation

Andrew Churchill

Andrew Churchill ID & Authentication Standards author at MIDAS Alliance

Mere tokenism - how not to deploy security

There has been much commentary of late over the surge in interest in tokenisation, not least on the back of certain mobile payment platforms. Tokenisation, as a principle, has of course been around for many years, but with the ever increasing prevalence of data breach disclosure notifications the adoption of ‘the token’ seems to coming of age. T

/security

Now Hiring