147 Results from 2014, /security
Robert Siciliano Security Analyst at Safr.me
There once was a guy named Albert Gonzalez who dressed like a woman—but not because he got off on this, but because he wanted to conceal his actual appearance while he used a ream of phony cards to steal money from an ATM in 2003. A cop noticed the activity and didn’t quite buy the disguise. The police officer nabbed the thin, disheveled Gonzale...
26 November 2014 /security
The Internet—one of history’s greatest inventions—is also one of history’s greatest platforms for crime. Here are ways things can go very wrong with the Internet of Things. Med-hacking. Researchers have hacked many medical devices. Though it apparently hasn’t happened in the real world, yet, but it looks like it’s only a matter of time before med...
25 November 2014 /security
Ever wonder just how hackers bust into systems and cause destruction? One reason is because people are still using weak passwords. While your pet’s name and wedding anniversary dates are easy to remember and sentimental to use, this approach makes a hacker’s job all too easy. Here are 10 things you should know about passwords. Never use the sam...
20 November 2014 /security
Don’t blame the hackers; don’t blame the bank; apparently it’s the victim’s fault that a Missouri escrow firm was robbed of $440,000 in a cybercrime, says a report on computerworld.com. The attack occurred in 2010, but the appeals court’s March 2013 ruling declared that the firm, Choice Escrow and Title LLC, can’t hold its bank accountable. The ...
12 November 2014 /security
Retired Member
In a single move, mergers and acquisitions can provide businesses with a tremendous tool for increasing growth, profitability and improving strategic capabilities. M&As are gathering speed and last year domestic acquisitions between UK companies were valued at £2.1 billion. Investment projects like this shape the future of the businesses invol...
11 November 2014 /security /regulation
CEB TowerGroup predicts mobile banking usage will reach 17 billion transactions in 2015. At the same time, customers are still worried about security, which is the number one fear among potential mobile banking customers (according to a recent Javelin study). Yet this fear has to be balanced with usability. Some banks have turned to the concept ...
11 November 2014 /security
In the movies, the good guys always get the bad guys. In cyber reality, no such thing exists. A survey of 5,000 IT security professionals turns up the following: 63% doubt they can stop data breaches. 69% think threats slip through the cracks of their security systems. 57% believe their company lacks protection from advanced attacks. 80% think ...
08 November 2014 /security
In part one of this blog series, I explained that firms need to take a holistic three stage approach to ensure data is kept secure, and therefore comply with data protection regulation and avoid fines. In this blog, I explore how companies can put these three stages - education, policy and technology - into practice: Implement a policy Businesse...
07 November 2014 /security
Mashable.com says that recently over 98,000 photos have been leaked from Snapsaved.com, which has shut down. The Snapchat app makers won’t take any credit, even though previously, 4.7 million phone numbers and usernames were leaked. The company seems indifferent, though this May, they reached a settlement with the FTC. Snapchat blames third-part...
04 November 2014 /security
Cyber storage does not always = secure backup. Users of cloud storage have many potential tools at hand to beef up security. And just because cloud services have some loopholes doesn’t mean you should just throw in the towel, as the saying goes, and figure “What’s the point?”. Here are some ways to beef up cloud storage security and manage your on...
29 October 2014 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.