147 Results from 2014, /security
Robert Siciliano Security Analyst at Safr.me
Identity proofing is proof of whom you are. Proving one’s identity starts with that person answering questions that only they themselves can answer (even if the answers are fictitious), such as their favorite movie, mother’s maiden name or name of their high school. Since most people provide real answers (that can be found online) rather than “Poi...
16 September 2014 /security
Retired Member
Apple has a trick it repeats every few years. It takes a technology or concept that has been around for some time, and makes it attractive and accessible for consumers. The iPod was far from the first mp3 player, but has been so successful that ‘iPod’ is now almost a generic term in the same way as ‘hoover’ and ‘frisbee’. The addition of Touch-ID ...
11 September 2014 /security
The word hacker has a pretty negative connotation. It brings to mind other words like cybercriminal, thief, and malicious. It’s easy to see why hacker has a bad rep. The news is full of stories about hackers stealing data from large companies and the government. Hackers are the bad guys. But are they? Tesla just recently announced they are hirin...
09 September 2014 /security
Pat Carroll Founder/Executive Chairman at ValidSoft
“If only I would have known” is a phase that Jennifer Lawrence, Kate Upton and possibly as many as 100 celebrities and notable personalities are likely saying after a reported massive breach of Apple’s iCloud service resulted in the unauthorized access to, and release of, personal information and photos. While the FBI, dozens of security vendors an...
05 September 2014 /security /payments Information Security
By now you’ve heard that Jennifer Lawrence’s (and other celebs’) cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the “Find My iPhone” app. Someone anonymously posted nude photos of Jennifer Lawrence and Kate Upton to the 4Chan site, and the stars confirmed the photos w...
03 September 2014 /security
The Industry is currently abuzz with talk of the Cloud as more and more firms adopt hosted solutions as part of their core operational strategy. While many of us are familiar with the benefits of hosting from a daily operational standpoint, the industry movement towards hosted third-party systems is also transforming the traditional implementation...
Elton Cane Digital product delivery at News Corp Australia
If you want a new debit or credit card in Australia, you're getting PayWave or PayPass - there's no choice. And Australian police forces, and at least some consumers, don't like it. Police are bemoaning an increase in contactless credit and debit card fraud arising from stolen tap and go cards, and point to increases in handbag thefts, car break-i...
29 August 2014 /security Future Finance
Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many different kinds of computer viruses (such as worms, Trojans, spyware) are called malware: malicious software. In general, security software comes with i...
27 August 2014 /security
Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire money for that new car or vacation package is most probably a rip-off. And the crooks behind these rackets are figuring out ways to overcome the incr...
22 August 2014 /security
“3D Secure is about as helpful as a chocolate fire guard.” Merchant view of 3D Secure, as succinctly expressed on Twitter. For a number of years, the payments industry has associated 3D Secure with a terrible shopper experience and a corresponding negative impact on conversion rates and revenue. Understandably, this has led to a general reluctance...
21 August 2014 /security /payments
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.