Join the Community

23,294
Expert opinions
42,698
Total members
364
New members (last 30 days)
182
New opinions (last 30 days)
29,081
Total comments

Latest expert opinions

clear
clear

121 Results from 2012, /security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What Are The Risks Of A Lost Or Stolen Mobile Device?

Have you ever thought about what would happen if you lost your mobile phone? These days we rely on our mobile phones more than ever. For a lot of us, it can also be a nightmare if it’s lost, stolen or hacked, especially since today it’s become our most personal computer, But despite the fact that 1/2 of of us would rather lose our wallet than our ...

/security /regulation

Retired Member

Retired Member 

Little Fluffy Clouds

I was listening to some music from my youth - Little Fluffy Clouds - The Orb - whilst watching the thunder clouds gather outside of my office. We all know that clouds live in the sky, these amorphous collections of water droplets high above our heads, drifting from location to location, with no intervention from us on the ground. To a great extent...

/security /regulation Innovation in Financial Services

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

NFC at the Summer Games Could Be Exploited

NFC is an acronym for near field communication, a wireless technology that allows devices to talk to each other. In the case of a mobile wallet application, those devices would be a mobile phone and a point of sale device at a checkout counter. Visa is testing out its NFC service PayWave contactless payment service at the Summer Olympics in London....

/security /regulation

Stephen Wilson

Stephen Wilson Managing Director at Lockstep Consulting

Now is not the time to go soft

Online computing represents probably the first new platform in thirty years. Not since the PC have we seen a whole new hardware-software-solution-product environment emerge. It's understandable that there's a mad land grab for app-driven market share. But you'd think that the rush to market would be moderated by a realisation that we ought to b...

/security /payments

Retired Member

Retired Member 

Monitoring Social Media, Surveillance or Enablement?

An article on ZDNet caught my attention recently. It looked at a Gartner report that said 60% of businesses will be monitoring social media by 2015 and asked its panel of CIOs if were they doing so already. The majority answered yes and not just for productivity reasons, but for security and brand reputation issues. However, it struck me that the...

/security Social Banks

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Using Tech Support to Set Up Your New Devices

There are some things in life that require a “professional” to get the job done properly. You wouldn’t let your cousin Larry who’s a landscaper reset a broken bone in your hand right? You can certainly go to a hardware store and buy all the wood to build a deck, but just because you know how to swing a hammer doesn’t mean the deck will be safe, or...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How Does Jailbreaking Or Rooting Affect

You may have heard the term jailbreaking or rooting in regards to your mobile phone, but what is this and what does it really mean for you? Jailbreaking is the process of removing the limitations imposed by Apple and associated carriers on devices running the iOS operating system. To “jailbreak” means to allow the phone’s owner to gain full access ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Is There A Risk With Using My Personal Device For Work?

The day after you get your shiny new mobile or tablet, chances are you’ll take it right to work and request the IT department to set it up with your work email and allow access to the company network. “Bring your own device” (BYOD) has become widely adopted to refer to workers bringing their personal mobile devices, such as smartphones, tablets an...

/security /regulation

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Experian figures show just why we need EC3

Experian figures show just why we need EC3 and an industry strategy for countering Cyber Crime Following recent news from Experian that more than 12 million pieces of personal information have been illegally traded over the internet in the first four months of 2012 got me thinking about whether there is a disconnect between people’s attitudes to s...

/security Information Security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Protecting Pin Pad Payment

It was interesting to read in the FT's special on 'Cyberwarfare' recently which identifies that pin pad payment terminals pose a security risk for millions of consumers. According to MWR InfoSecurity, cybercriminals can use fake cards containing a software code to gain access not only to a customer's PIN and primary account numbers shown on the fr...

/security Innovation in Financial Services

Now Hiring