136 Results from 2015, /security
Retired Member
I’m often asked by my fellow colleagues, 'what keeps me up at night?', to which I currently reply, 'an uncomfortable bed'. For those of you who have ever had significant home renovation, I know you will sympathise. Sleeping on the sofa gets old fast – I should be back in my own bed by Christmas! Apart from the uncomfortable bed, understanding and...
28 October 2015 /security /regulation
The line between sport and business has been blurred for some time now. Sport often borrows analytical elements from corporations and manages their players like professionals, and on the other hand businesses are beginning to seek new tactical approaches already being championed by sport teams across the globe. With the Rugby World Cup 2015 in ful...
26 October 2015 /security /regulation
Robert Siciliano Security Analyst at Safr.me
If I wanted to crack one of your passwords, I could probably make a series of educated guesses and get pretty close. Why? Because people tend to stick with simple, easy to remember passwords, but these are the passwords that are easy to hack. According to Bill Carey, VP Marketing for the RoboForm Password Manager “Users need to take personal respo...
26 October 2015 /security
There’s a problem on the home front: security lapses in the computers of the Secret Service and Immigration and Customs Enforcement, says a report on townhall.com. These departments were recently audited, and weaknesses were revealed. Recently, hackers got into the White House, State Department and the Office of Personnel Management, among other en...
25 October 2015 /security
If you have made the decision to use a password manager for your personal cybersecurity, which I highly recommend, you will quickly find that you online world is safer, easier and more secure than ever before. According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager, 63% o...
24 October 2015 /security
One difference between a credit card and a debit card is that if there’s an unauthorized charge on your credit card, you just get a little sting. It’s a hassle to straighten out. But no money is taken from you. But if someone gets ahold of your debit card information, the second they use it, depending on the nature of the transaction, your bank acc...
22 October 2015 /security
Consider a keychain for a moment. For most of us, a keychain holds all of our necessities such as home keys, car keys, work keys and even forgotten keys, that we aren’t quite sure what to do with. Now, think about this. What if your keychain had keys that look identical, but each key only opens one door. If you are like most people, this key scena...
17 October 2015 /security
European regulators have issued a certain number of recommendations regarding the security of electronic payments[1]. However, in terms of technology, the power is still is the hands of the users, as they are the ones to decide whether or not to use or adopt a given technology. In businesses, computers, telephones and tablets are now chosen by the...
16 October 2015 /security
Studies across the board indicate that weak usernames and passwords are one of the top causes of data breaches, and I find that information to be unfortunate, because it is preventable. According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager: 70% reported forgetting a pa...
15 October 2015 /security
You need not be a celebrity or some big wig to suffer the devastating fallout of your online images (and videos) being stolen or used without your permission. So how does someone steal your image or use it without your permission? Hacking Hacking is one way, especially if passwords are weak and the answers to security questions can easily be figur...
13 October 2015 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.