187 Results from 2011, /security
Robert Siciliano Security Analyst at Safr.me
According to the Identity Theft Resource Center, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers, and 26% involved credit or debit card data. The ITRC elaborated, “Other than breaches reported by the media and a few progressive state websites, ...
22 February 2011 /security /regulation
Uri Rivner CEO and Co-Founder at Refine Intelligence
2019: What we did to fight APTs The 1982 masterpiece Blade Runner by Ridley Scott is one of my old time favorites. Harrison Ford chases androids in a futuristic, visually stunning Los Angels. The future looks bleak, and technology advances did not make the human race any happier. The film is set in 2019. I don’t know what the world will look like 8...
18 February 2011 /security Innovation in Financial Services
Nick Ogden Chairman at Ogden Research
The fact that Orange is launching an NFC-enabled Samsung handset underlines the belief that mobile payments is an area full of opportunity and has potential to take a large share of the payments market. Developments that have been made in the area of e-money only go to highlight the fact that the move towards a cashless society is one that consume...
17 February 2011 /security /payments Innovation in Financial Services
The wild, wild web is the most exciting, alluring, and all-around awesome thing available to us today. It’s also something we have come to rely on to a fault. And that’s a little scary. The Internet is a decentralized wilderness, used by billions of devices worldwide. Joe Lieberman, chairman of the Homeland Security and Governmental Affairs Commit...
16 February 2011 /security /regulation
Gary Wright Analyst at BISS Research
Banker's bonuses are still dominating the news during the results season. The banks one by one, will all declare massive profits that are virtually the same as before the banking crisis. "Crisis what crisis" is the cry in the boardrooms and they're right. In just a few short years the banks that crippled many of the worlds economies are ...
16 February 2011 /security /regulation EBAday
This week marked the anniversary of when chip and PIN came into force in the UK. Five years’ on, there are apparently more than 140 million chip and PIN cards in issue in the country and more than one million chip and PIN card terminals in place, not to mention the fact that many European countries have now rolled out EMV. As a result, great strid...
15 February 2011 /security /payments Online Banking
Retired Member
NAB cleaners dumped rubbish bin bags containing personal medicare, licence, passport, birth, address, employment etc in dumpsters not even the bank's bin. This meant that accessing the information wouldn't even be illegal. Privacy breach incalculable. $4 billion profit couldn't afford a $50 paper shredder. NAB promises to review procedures.
15 February 2011 /security /retail Whatever...
Account takeover happens when your existing bank or credit card accounts are infiltrated and money is siphoned out. A hacked account or stolen credit card is often to blame. The drop in account takeover may be due in part to a few different things. Less breaches. There was a drop in data breaches from 221 million records in 604 breaches during 2009...
15 February 2011 /security /regulation
Business Continuity Planning (BCP) is at the forefront of company’s minds and is more pertinent when there is a threat to businesses or general public. One year ago, the H1N1 ‘swine flu’ pandemic forced businesses to re-evaluate their plans for managing the impact of a widespread outbreak of the virus on their organisation. But while threats like ...
14 February 2011 /security
As long as identity thieves continue to breach databases and steal Social Security numbers, new account fraud will plague the public. New account fraud refers to financial identity theft in which the victim’s personal identifying information and good credit standing are used to create new accounts, which are then used to obtain products and service...
12 February 2011 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.