187 Results from 2011, /security
Robert Siciliano Security Analyst at Safr.me
With Valentine’s Day around the corner, many single people return to thoughts of finding love online. But while your head is in the online clouds, you should know – and sorry to sound like a parent – that cyberscammers may be there with you looking to take advantage of your vulnerable heart. To help you stay safe on Valentine’s Day and year-round...
12 February 2011 /security /regulation
Lachlan Gunn Executive Director at European Association for Secure Transactions
According to the recent ACI commissioned survey as reported on this website, 81% of the 4,200 respondents, in the 14 countries surveyed, have confidence in the ability of their bank of financial institution to protect them - despite the prevalence of card fraud. I agree with the comment made by David Divitt of ACI; this is a great statistic and ...
11 February 2011 /security
In a small Maine town, local school officials buck state requirements and tell parents not to give out their child’s Social Security number. The Bangor Daily reports “School departments across the state are required by a new state law to collect students’ Social Security numbers for all enrolled this fall. Parents, however, should know that they c...
09 February 2011 /security /regulation
Uri Rivner CEO and Co-Founder at Refine Intelligence
In this ZeusiLeaks file I’ll talk about how fraudsters tap the communications of a company’s executive board - the holy grail of inside info. Quick reminder: WikiLeaks, the largest leak of data the world has seen? Nonsense! Trojans like Zeus and SpyEye lurk on millions of personal, corporate and government PCs, stealing data 24 by 7. Everything you...
09 February 2011 /security Innovation in Financial Services
Most of us would have no idea Egypt had pulled the plug on the Internet unless it was splashed all over the news. However one company called iovation knew right away. Basically “just like that” the up to 1000 fraud checks they receive every hour out of Egypt dropped to zero. At first glance one would think there was some type of meltdown or maybe E...
02 February 2011 /security /regulation
Nick Ogden Chairman at Ogden Research
Some of the best minds in business are gathered at the London Business Design Centre today to witness cutting-edge financial and banking technology innovations at Finovate 2011. Chris Skinner kicked off the show by talking about what he sees as the top themes in innovation and the things he believes are having the biggest impact on banking. First ...
01 February 2011 /security /payments Innovation in Financial Services
The Telegraph reports that UK National Identity Cards containing biometric details, including fingerprints, “were championed by the previous Labour government as a way of preventing terrorism and identity theft.” But the new administration immediately scrapped the initiative, introducing the Identity Documents Bill to Parliament in May, which pr...
29 January 2011 /security /regulation
Retired Member
The world of NFC and contactless payments is getting red hot. The first month of 2011 has seen a slew of announcements and rumours relating to this topic. I have written before about what I believe will drive NFC mobile and contactless cards payment forward. Well, many of them now seem to be well under way. Firstly, both contactless cards/phones wi...
28 January 2011 /security /payments
Teachers in numerous Massachusetts cities and towns are not allowed to “friend’’ students on Facebook or other social networking sites, and a number of other school districts south of Boston are considering a similar ban. The Boston Globe reports that many communities are working on policies governing school staff’s use of Facebook, “inspired in p...
27 January 2011 /security /regulation
Stephen Wilson Managing Director at Lockstep Consulting
The National Strategy for Trusted Identities in Cyberspace (NSTIC) released by the Whitehouse last month, is a proposal for a new “ecosystem” of diverse Internet IDs. It is the latest incarnation of Federated Identity, where identification established with one service provider can be re-used with other services. In the words of Whitehouse cyber...
26 January 2011 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.