294 Results from 2010, /security
Robert Siciliano Security Analyst at Safr.me
Social media has become a playground for adults, teens, and tweens. And like on any playground, when you hit the jungle gym or horseplay on the seesaw, there is always a chance that you may go home with an egg on your forehead. Or, if you are like me, a broken collarbone. Twitter and Facebook have become the most popular sites for frolicking, and ...
07 October 2010 /security /regulation
A recent study shows that organized criminals create approximately 8,000 malicious websites every day, or over 57,000 each week. These malicious websites model legitimate websites that we visit every day, such as bank websites, online shopping sites, and eBay. According to this study, the most frequently impersonated companies include Visa, Amazon....
“A prized Vincent van Gogh still life was stolen from a Cairo museum leading to a massive art hunt, conflicting reports about the details of the crime, and plenty of finger-pointing. Five people, meanwhile, have been arrested for “negligence” in relation to the embarrassing theft, which seems to have been carried out in the absence of rudimentary...
05 October 2010 /security /regulation
Retired Member
Ask yourself a question: do you know where your personal information is held and do you know how secure it is? When you deposit your savings into a bank account or leave your house keys with a trusted neighbour you do so with the conviction that your money is safe and your keys will be put somewhere secure and out of the way. We all seem accepting...
05 October 2010 /security /regulation Online Banking
Zeus is bad and future versions of malware could be much worse; when will we move beyond the exclusive strategy of trying to detect or block nefarious software? So many security specialists continue to bar the participation of one of the most effective foot-soldiers: the customer. When criminals infect computers to impersonate account-holders the ...
04 October 2010 /security
One of the most common yet underreported causes of data breaches is users’ failure to properly log out of public PCs. Is your work computer accessible to others, perhaps after business hours? How about your home computer? Does its use extend beyond your immediate family, to your kids’ friends or babysitters, for example? Do you ever log in to a hot...
02 October 2010 /security /regulation
If Visa’s Payment Security Forum held in Cairo this week is anything to go by, Data Field Encryption projects certainly seem to be on the agenda for banks in the Middle East, Africa, and Eastern Europe. More than 95% of those responding to a quick poll at the conference said they were either considering, evaluating, or were actively engaged in Da...
30 September 2010 /security /payments Information Security
Keith Appleyard IT Consultant at available for hire
[I'm surprised I haven't seen anything elsewhere on Finextra on the ACS:Law fiasco] BT has admitted it sent the personal details of more than 500 customers as an unsecured document to legal firm ACS:Law, following a court order. The unsecured Excel documents were sent in late August by a lawyer working for British Telecom, to Andrew Crossley who ru...
30 September 2010 /security /regulation Whatever...
In response to concerns about privacy and data protection in the context of the use of Biometric data for non Government related transactions, Hitachi Europe would like to clarify several points for the sake of completeness. For the purpose of this discussion we must also separate the issue of which part of a transaction relates to biometric data
29 September 2010 /security
David Divitt Senior Fraud Product Manager at VocaLink
This story shows the lengths to which criminals will go to commit fraud, and the PCeU must be congratulated on breaking this criminal gang. However, it is important that stories like this don't discourage consumers from banking online. As an individual there are a number of steps that people can take to help protect themselves from fraud - includi...
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.