Join the Community

23,955
Expert opinions
40,652
Total members
375
New members (last 30 days)
201
New opinions (last 30 days)
29,263
Total comments

Latest expert opinions

clear
clear

96 Results from 2016, /security

Howard Berg

Howard Berg Senior V President,North and Central Europe, BPS at Gemalto DIS

Banking on IoT: Security in the Internet of Things Era

The Internet of Things (IoT) is set to completely revolutionise our economy, society and culture over the next five years, with 2016 looking set to be the year in which IoT hits the mainstream. When it comes to the future of business, we have already recently considered how the IoT will change banking and what the impact of the predicted 25 billio...

/security

Retired Member

Retired Member 

As mobile payments options expand, adoption will increase. Let’s not forget security!

The mobile payment market just got a lot more interesting with this week’s announcement about Mastercard taking its Masterpass digital payment platform mobile. The addition of Masterpass to the mobile payment market (joining the likes of Apple Pay, Samsung Pay and Android Pay) is giving consumers the options needed to drive cultural change and ...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Phone Account of FTC Chief Technologist hijacked

An impostor posed as Lorrie Cranor at a mobile phone store (in Ohio, nowhere near Cranor’s home) and obtained her number. She is the Federal Trade Commission’s chief technologist. Her impostor’s con netted two new iPhones (the priciest models—and the charges went to Cranor) with her number. In a blog post, Cranor writes: “My phones immediately sto...

/security

Retired Member

Retired Member 

SWIFT Warning Must Be Heeded

Cyber fraud losses make headlines on a regular basis – the latest target on display for all. While these reports may often be viewed as extreme, worst-case scenarios, the case of SWIFT’s recent warning to its participating financial institutions and corporate user group members has helped to highlight the importance organisations need to place on ...

/security /regulation

Alex Noble

Alex Noble Account Director at McAfee

What does HSBC’s adoption of voice biometrics tell us about trends in identity, customers and contac

Wanting a change from Brexit articles (too many of them are just too much speculation), I was looking back at some of the news stories from earlier in the year that I’d meant to blog on but hadn’t managed to. One of those was HSBC UK’s introduction of voice biometrics (see Finextra: “HSBC to roll out voice and Touch ID to 15 million UK customers”)...

/security /retail Innovation in Financial Services

Retired Member

Retired Member 

The New Rules of Pen Testing

In the past, penetration testing was a fancy name for breaking through a network firewall. However, as technology advances and breaches become even more dangerous – costing an average of £2.53 million, according to research sponsored by IBM – security executives need to revisit pen testing to make sure it is an ongoing practice in their defense ars...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Viruses as Cyberweapons for sale

It’s all about code—the building blocks of the Internet. Software code is full of unintentional defects. Governments are paying heavy prices to skilled hackers who can unearth these vulnerabilities, says an article at nytimes.com. In fact, the FBI director, James B. Comey, recommended that the FBI pay hackers a whopping $1.3 million to figure out h...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

TeamViewer Clients Victims of other Hack Attacks

Get an account with TeamViewer, and you will have a software package that enables remote control, online meetings, desktop sharing and other functions between computers. But recently, customers of TeamViewer have reported remote takedowns of their computers that resulted in different forms of monetary theft, such as bank accounts being cleaned out....

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Can Two-Factor Authentication actually fail?

You’ve probably read many times that two-factor authentication is a superb extra layer of protection against a thief hacking into your accounts, because gaining access requires entering a One Time Passcode (OTP)—sent via text or voice—into a login field. In other words, no phone, no access. But CAN a hacker get the phone? Ask Deray McKesson, an ac...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Identity Theft getting even worse

In 2015, depending on the kind and type of identity theft we are talking about, identity thieves impacted 1.5 million people or more, says the Javelin Strategy & Research report. That’s more than double than for 2014. The move from stripe cards to chip cards has motivated crooks to fasten their seatbelts and really take off with an accelerate...

/security

Now Hiring