Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Robert Siciliano

Happy Holidays and Thank You From Robert Siciliano

25 years ago I was in a situation where I needed some help. A man appeared out of nowhere and seemed to have sensed my desperation and offered assistance. I accepted. Up until that day “It was all abo...

31 Dec 2010
Robert Siciliano

Hacking Wireless for Identity Theft

The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels,...

28 Dec 2010
Steven Murdoch

UK Cards Association attempt to supress Cambridge research

The UK Cards Association (previously known as APACS) has written to the University of Cambridge asking them to remove a paper, claiming that it contains information that might be of use to criminals....

25 Dec 2010
Information Security
Retired Member

New Years Regulations

As 2010 draws to a close, it seems an appropriate time to consider the changes that have taken place over the last twelve months and look ahead to the coming year. In terms of payments security, 2010 ...

23 Dec 2010
Information Security
Uri Rivner

ZeusiLeaks Archives File 001: The ex-Agent

OK folks, quick recap: if you think WikiLeaks is the largest leak of data the world has seen, think again. In fact, think two orders of magnitude bigger. Who needs a quarter of a million diplomatic ca...

23 Dec 2010
Innovation in Financial Services
Robert Siciliano

Online Shoppers Concerned About Identity Theft

Shopping online is unquestionably more convenient and efficient than traditional commerce. But is it safer? We face risk everywhere we go. We risk car accidents on the way to the mall. Muggers and thi...

13 Dec 2010
Retired Member

Trader: social beast or lonely wolf?

At a time where Facebook could be seen as the 4th country on earth from the point of view of its “population”, how long will it be before social media reaches the trading floor? Of course, there are s...

13 Dec 2010
Retired Member

Former Goldman Programmer Convicted

Apparently 'a gentleman' at all times (FBI) the fellow has been found guilty of theft of trade secrets and transportation of stolen property. After a two week trial into IP involving a millionth of a ...

13 Dec 2010
Whatever...
Robert Siciliano

Twitter Crime on the Rise

Twitter is now beginning to see a substantial rise in active users. A recent report found that the percentage of Twitter users who have tweeted ten or more times, have more than ten followers, and fo...

09 Dec 2010
Retired Member

Plastic more popular than cash?

So, it’s official, for the first time plastic is more popular than cash. It’s been on the cards for a while - the inexhaustible rise in the use of debit and credit cards to pay for goods and services ...

08 Dec 2010
Innovation in Financial Services
Robert Siciliano

Top 5 Vishing Techniques

“Vishing” occurs when criminals call victims on the phone and attempt to lure them into divulging personal information that can be used to commit identity theft. The name comes from “voice,” and “phis...

07 Dec 2010
David Divitt

The changing nature of fraud

The reduction in fraud levels seen in Australia once again reiterate the potential savings that can be delivered if countries roll out EMV technology, and it will be interesting to see if the current ...

07 Dec 2010