136 Results from 2015, /security
Robert Siciliano Security Analyst at Safr.me
It sounds almost like science fiction, even in this cyber age: A thief hacks into your computer and encrypts your files, meaning, scrambles the information so you can’t make sense of any of it. He demands you pay him a big fat payment to “unlock” the encryption or to give you the “key,” which is contained on the thief’s remote server. You are bein...
14 September 2015 /security
Said Tabet Senior Technology Strategist, CTO Office at Dell EMC
The past few years have seen a wide shift across all kinds of organisations towards harnessing digital technologies. Gartner calls this ‘The Digital Industrial Economy’, where every business wants to become a digital leader and every company a technology company. Whilst this is happening across many industries, the Financial Services (FS) sector i...
14 September 2015 /security /regulation
Darkode anyone? Not anymore. This underground bad hackers’ forum was recently demolished by the FBI, says a report on www.justice.gov. The dozen hackers associated with Darkode are facing criminal charges. Though there are about 800 of such forums, Darkode was among the worst (or shall I say “best”?), presenting a serious threat to worldwide comput...
11 September 2015 /security
Hackers with big skills and a big ego will be drawn to Facebook and Twitter as their targets. But they’ll also target dozens of other companies, reports an article on arstechnica.com. One group in particular stands out as the attackers, using zero-day exploits. They are known as Wild Neutron and Morpho, says the article, and have been active possib...
07 September 2015 /security
Zeus is no longer a god of malware; he’s been taken down by law enforcement agencies spanning six European nations. Five people were recently arrested—believed to have infected tens of thousands of computers across the globe. There have been 60 total arrests pertaining to this cybergang. They also used malware called SpyEye, and that, along with Z...
25 August 2015 /security
John Regan Director at Platform Black
The latest Serious Fraud Office annual report highlights a rise in fraud investigations and prosecutions which is perhaps no great surprise. But what does it mean for alternative finance and are there specific areas the sector should keeping an eye on? Fraud is a difficult area to address. It can be tricky to get confirmation of first-hand experien...
24 August 2015 /security
UL in this case stands for Underwriters Laboratories. An article on darkreading.com notes that a UL official, Maarten Bron, says that they are taking part in the U.S. government’s plan to promote security certification standards. The U.S. government is interested in developing a UL-type program directed at computers and smartphones. This initiative...
20 August 2015 /security
Maybe you don’t mind the ads for that bicycle rack following you around in cyberspace after you visited a site for all things bike, but browser trackers (“cookies”) also create a profile of you that gets sold to other advertisers and third parties. Are you doomed to be stalked forever by bike ads? This is caused by third-party cookies. You can us...
18 August 2015 /security
When you subscribe to an online service, be careful of how much information you give out about yourself. Most businesses in their terms and conditions, say they “respect your privacy.” But what if these companies go under or are sold? An article from the online New York Times explores this concept. Today’s market-data-hungry-businesses can gather l...
14 August 2015 /security
Burglars get burgled, muggers get mugged, and hackers get hacked. This includes a sophisticated ring of hackers: Hacking Team, hailing from Italy, specializing in selling hacking software to major governments. An article on wired.com describes how a “400 gigabyte trove” went online by anonymous hackers who gutted the Hacking Team, including source ...
13 August 2015 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.