Join the Community

23,263
Expert opinions
43,814
Total members
393
New members (last 30 days)
186
New opinions (last 30 days)
29,062
Total comments

Latest expert opinions

clear
clear

147 Results from 2014, /security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Identity proofing proves who You are

Identity proofing is proof of whom you are. Proving one’s identity starts with that person answering questions that only they themselves can answer (even if the answers are fictitious), such as their favorite movie, mother’s maiden name or name of their high school. Since most people provide real answers (that can be found online) rather than “Poi...

/security

Retired Member

Retired Member 

Mobile Money: Apple’s next security pitfall?

Apple has a trick it repeats every few years. It takes a technology or concept that has been around for some time, and makes it attractive and accessible for consumers. The iPod was far from the first mp3 player, but has been so successful that ‘iPod’ is now almost a generic term in the same way as ‘hoover’ and ‘frisbee’. The addition of Touch-ID ...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Are All Hackers Bad?

The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about hackers stealing data from large companies and the government. Hackers are the bad guys. But are they? Tesla just recently announced they are hirin...

/security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

iHack Hastens Call for Multi-factor Authentication

“If only I would have known” is a phase that Jennifer Lawrence, Kate Upton and possibly as many as 100 celebrities and notable personalities are likely saying after a reported massive breach of Apple’s iCloud service resulted in the unauthorized access to, and release of, personal information and photos. While the FBI, dozens of security vendors an...

/security /payments Information Security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How to Secure Your iCloud

By now you’ve heard that Jennifer Lawrence’s (and other celebs’) cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the “Find My iPhone” app. Someone anonymously posted nude photos of Jennifer Lawrence and Kate Upton to the 4Chan site, and the stars confirmed the photos w...

/security

Retired Member

Retired Member 

The changing face of buyside implementations

The Industry is currently abuzz with talk of the Cloud as more and more firms adopt hosted solutions as part of their core operational strategy. While many of us are familiar with the benefits of hosting from a daily operational standpoint, the industry movement towards hosted third-party systems is also transforming the traditional implementation...

/security

Elton Cane

Elton Cane Digital product delivery at News Corp Australia

Contactless payments are not a choice

If you want a new debit or credit card in Australia, you're getting PayWave or PayPass - there's no choice. And Australian police forces, and at least some consumers, don't like it. Police are bemoaning an increase in contactless credit and debit card fraud arising from stolen tap and go cards, and point to increases in handbag thefts, car break-i...

/security Future Finance

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Best Way to Destroy a Computer Virus

Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many different kinds of computer viruses (such as worms, Trojans, spyware) are called malware: malicious software. In general, security software comes with i...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Prepaid Cards risk of Fraud

Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire money for that new car or vacation package is most probably a rip-off. And the crooks behind these rackets are figuring out ways to overcome the incr...

/security

Retired Member

Retired Member 

Rethinking 3D Secure: how it can increase conversion rates

“3D Secure is about as helpful as a chocolate fire guard.” Merchant view of 3D Secure, as succinctly expressed on Twitter. For a number of years, the payments industry has associated 3D Secure with a terrible shopper experience and a corresponding negative impact on conversion rates and revenue. Understandably, this has led to a general reluctance...

/security /payments

Now Hiring