136 Results from 2015, /security
Retired Member
Tis the season to be jolly, and with big retail events like Black Friday and Cyber Monday, the Christmas season is also becoming an increasingly online experience. This also means there are a host of seasonal hackers looking to take advantage of others’ goodwill over the coming months. As we start doing more and more shopping online, often letting...
01 December 2015 /security /regulation
Mobile payments is the next “big thing” for consumers. But how can we keep it from becoming so for hackers as well? As our “always on” culture moves from good old plastic and chip cards to mobile phones, where data and software are more vulnerable to hackers, how do we maintain trust without eliminating utility? According to Verizon’s Data Breach ...
30 November 2015 /security /regulation Innovation in Financial Services
Robert Siciliano Security Analyst at Safr.me
Define Pwn: Pwn is a slang term derived from the verb own, as meaning to appropriate or to conquer to gain ownership. The term implies domination or humiliation of a rival. And when it’s done by hacking email, the person is effectively pwned. No matter how “private” you are on the Internet, no matter how infrequently you post on your Facebook page...
28 November 2015 /security
Week by week there are stories of renewed cyber-attacks, such as the theft of customers’ personal details from TalkTalk. The simple and fundamental truth is that businesses and governments must get their systems in a state of combat readiness or risk being exposed by cyber-criminals. As hackers become more sophisticated, banks are seeking ways to ...
27 November 2015 /security /regulation
Paul Hampton Security Expert at Thales
While cash and card payments are still the most widespread methods of payment, studies show that UK shoppers increasingly prefer using mobile payments instead of credit cards. Mobile payments could very well become the new norm, especially now that all the major players – including Apple, Google and Samsung – have developed apps enabling users to...
27 November 2015 /security /payments
A bug bounty refers to the reward a bad-guy hacker gets upon discovering a vulnerability, weakness or flaw in a company’s system. This is akin to giving a reward to a burglar for pointing out weaknesses in your home’s security. But whom better to ask than a burglar, right? Same with a company’s computer systems: The best expert may be the black hat...
20 November 2015 /security
Nanda Kumar CEO at SunTec Business Solutions
If the past few years have taught the world anything, it is that no business is safe online. Cyber criminals are targeting financial services organisations and this battle will rage on until security experts have found a way to stop the flow of new exploits and vulnerabilities. Recently, some of the world’s biggest telecoms, financial services an...
17 November 2015 /security /retail
The Bring Your Own Device (BYOD) movement has in some ways saved companies money, but in other ways put customer data at risk. Employees are onsite, telecommuting or traveling on business. This means their devices, and company data could be anywhere at any given moment. A company manager or owner realizes that company use of employee mobile device...
16 November 2015 /security
Martin Ruda Managing Director at Tall Group
The Future Cheque Clearing Model – a fraud management opportunity As the cheque industry gets down to work in building the Future Clearing Model (FCM) in time for the 2017 implementation, some continuing debate circulates the players as to where, and how, the liability for fraud sits in the ‘new world’. Does the liability remain where it has tr...
13 November 2015 /security /regulation
It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people. A report at bits.blogs.nytimes.com notes that foreign hackers have cracked into the U.S. Department of Energy’s networks 150 times; they...
11 November 2015 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.