Join the Community

23,252
Expert opinions
43,794
Total members
374
New members (last 30 days)
178
New opinions (last 30 days)
29,060
Total comments

Latest expert opinions

clear
clear

136 Results from 2015, /security

Retired Member

Retired Member 

The Hacker Who Stole Christmas: What Security Threats Should You Be Looking Out For This Holiday

Tis the season to be jolly, and with big retail events like Black Friday and Cyber Monday, the Christmas season is also becoming an increasingly online experience. This also means there are a host of seasonal hackers looking to take advantage of others’ goodwill over the coming months. As we start doing more and more shopping online, often letting...

/security /regulation

Retired Member

Retired Member 

Securing Mobile Payments with a DEFENSE IN DEPTH

Mobile payments is the next “big thing” for consumers. But how can we keep it from becoming so for hackers as well? As our “always on” culture moves from good old plastic and chip cards to mobile phones, where data and software are more vulnerable to hackers, how do we maintain trust without eliminating utility? According to Verizon’s Data Breach ...

/security /regulation Innovation in Financial Services

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How to pwn Anyone

Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you are on the Internet, no matter how infrequently you post on your Facebook page...

/security

Retired Member

Retired Member 

Cyber-attack: are you combat ready?

Week by week there are stories of renewed cyber-attacks, such as the theft of customers’ personal details from TalkTalk. The simple and fundamental truth is that businesses and governments must get their systems in a state of combat readiness or risk being exposed by cyber-criminals. As hackers become more sophisticated, banks are seeking ways to ...

/security /regulation

Paul Hampton

Paul Hampton Security Expert at Thales

Will contactless kill traditional payment methods?

While cash and card payments are still the most widespread methods of payment, studies show that UK shoppers increasingly prefer using mobile payments instead of credit cards. Mobile payments could very well become the new norm, especially now that all the major players – including Apple, Google and Samsung – have developed apps enabling users to...

/security /payments

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What are Bug Bounties?

A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system. This is akin to giving a reward to a burglar for pointing out weaknesses in your home’s security. But whom better to ask than a burglar, right? Same with a company’s computer systems: The best expert may be the black hat...

/security

Nanda Kumar

Nanda Kumar CEO at SunTec Business Solutions

Back to the Future of Security in Financial Services

If the past few years have taught the world anything, it is that no business is safe online. Cyber criminals are targeting financial services organisations and this battle will rage on until security experts have found a way to stop the flow of new exploits and vulnerabilities. Recently, some of the world’s biggest telecoms, financial services an...

/security /retail

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Best practices for BYOD data storage

The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment. A company manager or owner realizes that company use of employee mobile device...

/security

Martin Ruda

Martin Ruda Managing Director at Tall Group

The Future Cheque Clearing Model

The Future Cheque Clearing Model – a fraud management opportunity As the cheque industry gets down to work in building the Future Clearing Model (FCM) in time for the 2017 implementation, some continuing debate circulates the players as to where, and how, the liability for fraud sits in the ‘new world’. Does the liability remain where it has tr...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Infrastructures under attack

It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people. A report at bits.blogs.nytimes.com notes that foreign hackers have cracked into the U.S. Department of Energy’s networks 150 times; they...

/security

Now Hiring