Join the Community

23,315
Expert opinions
42,505
Total members
368
New members (last 30 days)
195
New opinions (last 30 days)
29,090
Total comments

Latest expert opinions

clear
clear

294 Results from 2010, /security

Keith Appleyard

Keith Appleyard IT Consultant at available for hire

Beware e-mails from HMRC offering you a Tax Rebate

Fraudsters are sending out thousands of tax refund 'phishing' emails following the 31st January tax deadline, according to HM Revenue & Customs. The email asks you to input your credit card or bank details into an online form, so that the rebate can be paid to you. But if you provide your details, your bank account will be emptied or your credi...

/security /payments Whatever...

Cedric Pariente

Cedric Pariente Stanford Certified Project Manager at EFFI Consultants

How to Crack WiFi Network - Video Tutorial

This is a video on how to hack a wireless network. As mentioned on Lifehacker where I found this video, this is a purely educational post. Be aware that wireless networks are not secure. Lifehacker post http://lifehacker.com/5459822/crack-a-wi+fi-networks-wep-password-with-backtrack-the-fancy-video-version?skyline=true&s=i&autoplay=tr...

/security Online Banking

Michael Fuller

Michael Fuller Former Retail Banker at None

3-D Insecure -possible heresy

It's interesting both that there have been no comments so far about this story and that there are quite a number of other blogs where the value of 3-D secure has been questioned. This seems to be an example of the Emperor's new clothes where everyone knows he is naked but won't admit it. My experience of 3-D secure tends to support the Cambridge

/security

Steven Murdoch

Steven Murdoch Royal Society University Research Fellow at University College London

Verified by Visa and MasterCard SecureCode

This week, the 2010 Financial Cryptography conference is being held in Tenerife. The papers to be presented are likely of interest to the Finextra audience. Unfortunately, most are not available online, but searching for the title might show up a copy on the authors' home page. My paper at FC'10 is on the security of Verified by Visa and MasterCard...

/security /payments Information Security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Crimeware: Do It Yourself Criminal Hacking

For $400-$700 you too can be a criminal hacker. Phishing hacking and spoofing software has been around for a few years. Heres what may be an example. The ease and availability of this good for nothing other than crime software has made it easier, cheaper and more user friendly than ever to get into the cybercrime business. Anyone with moderate com...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Raoul Chiesa: UN Interregional Crime Research Inst.

In my quest to learn more about what makes a criminal hacker tick, I came across Mr Chiesa when he commented on a blog post I wrote “How I Wasted 4 Hours with a Criminal Hacker”. He warned me I was treading on dangerous ground due to the fact that when communicating with the blackhat, I used my real name and provided my web address. His concern wa...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

10 Business Identity Theft Risks in 2010

Advancements in technology over the past decade have created a tremendous amount of opportunity for the savvy businessperson. Whether it’s mobility, streamlined processes, marketing, or the ability to sell to a global market, there’s never been a better time to be in business. Like anything good, there is always a negative. While there are certain...

/security /regulation

Stephen Wilson

Stephen Wilson Managing Director at Lockstep Consulting

Don't be so cynical about privacy

Reports of the death of privacy abound, but they're premature. There are certainly those who, on the sly, would seek its demise, for privacy tends to get in their way. Like politicians on a post 9-11 national security bender, or Internet entrepreneurs who seek to monetise their eye-in-the-sky knowledge of their customers' habits. They're all tryi

/security /regulation

Steve Dance

Steve Dance Managing Partner at RiskCentric

Key themes for risk management in 2010

Every year brings it’s challenges - although I think it's fair to say that we enter 2010 with perhaps slightly more optimism than 2009. Nevertheless, economic trends, political events, responses to the banking crisis and technology devlopments are beginning to shape the risk agenda for 2010. Here’s my perspective on some of the issues that are

/security /regulation

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

First Bullet Fired in a Virtual War

I’m interrupting my series of 2009 mega-trends and 2010 projections to discuss the current situation in cybercrime. What a crazy week. First Google says it is prepared to pull its business out of China after cybercriminals used Trojans to hack into Gmail accounts of anti-Chinese government human rights activists. Then it becomes clear over 30 corp...

/security Innovation in Financial Services

Now Hiring