187 Results from 2011, /security
Robert Siciliano Security Analyst at Safr.me
If I ever strived to be a dumb criminal I’d want to be Timothy James Chapek, 24 years old from Portland, Ore. This cat breaks into a home and jumps in the shower when the woman who lived there came home. The kid locked the bathroom door and called 911. From the 911 call: “I just broke into a house and the owners came home…I think they have guns,” h...
21 March 2011 /security /regulation
Retired Member
Undoubtedly the mobile phone has over the past few years become a technologically advanced device that offers a large host of features beyond its traditional use as a communications device. Today almost every mobile phone now features some sort of ability to store and record information or the ability to take either photographs or capture video. A...
21 March 2011 /security Online Banking
Passwords are the bane of the security community. We are forced to rely on them, while knowing they’re only as secure as our operating systems, which can be compromised by spyware and malware. There are a number of common techniques used to crack passwords. Dictionary attacks: These rely on software that automatically plugs common words into passwo...
19 March 2011 /security /regulation
The statistics quoted within the Informatica report carried out by the Ponemon Institute present a picture that does not surprise me and rightly emphasises the risks around the use of ‘real’ data. Over the last 15-20 years, the use of such data within the software testing of banking applications has become increasingly prevalent and worryingly reg
18 March 2011 /security /regulation
Internet criminals follow a similar editorial calendar as newspaper and magazine editors, coordinating their attacks around holidays, and the change in seasons. They further capitalize on significant events and natural disasters. Japans earthquake is a biggie. Whenever a natural disaster hits normal people get an urge to help those in distress. Our...
17 March 2011 /security /regulation
Near Field Communications, or NFC, is the exchange of information between two devices via wireless signal. For example, a wireless signal emitting from your cell phone can act as a credit card when making a purchase. This year, over 70 million mobile phones will be manufactured and sold with NFC built in. NFC can be used in other ways beyond credi...
Our culture deemphasizes individual responsibility. In my mind, life begins when you begin taking responsibility for everything in your life. Personal security is fundamentally your own responsibility and, while you may not be responsible for a crime happening to you, you are the one in the best position to prevent it. In the last decade, as much ...
13 March 2011 /security /regulation
Cases of stolen tax returns have surged over the past five years, leaving many identity theft victims struggling to recoup their lost refunds. Approximately 155 million tax forms are filed annually. This provides identity thieves with an opportunity to come out of the woodwork and steal from Americans who are just trying to pay their taxes correctl...
10 March 2011 /security /regulation
You’re a CIO or senior financial manager in a typical multi-national enterprise. You probably have thousands of staff across multiple geographies using a vast array of mobile voice and data devices. And if that’s not enough, they’ll all be supplied by a variety of different providers. So, how to manage this diverse communications landscape? A re...
09 March 2011 /security Unified Communications in Financial Services
There was some good news this week with The UK Cards Association reporting fraud on UK credit and debit cards in 2010 was at its lowest level since 2000 – a 17% reduction on 2009 figures to £365.4 million. Two questions come to mind, what’s behind the reduction and should we let our guard down when it comes to protecting our credit and debit card d...
09 March 2011 /security Online Banking
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.