51 Results from 2013
Robert Siciliano Security Analyst at Safr.me
What kind of debit card do you have? The two types are direct debit cards and deferred debit cards. Direct debit Use of a PIN (personal identification number), which the bank issues or you choose. Card purchases require entering the PIN, and money is taken out of your checking account on the spot. PIN-based transactions cost retailers less to proc...
28 December 2013
Isis Mobile Wallet allows you to make purchases with your phone—a technology that just went live. Just wave your Isis-compatible smartphone at select cash registers to buy soda or taxi service, via Isis’s near-field communication technology. (iPhone compatibility with NFC will come later on.) Incentives Customers of Isis Mobile Wallet can use My C...
22 December 2013 /security
Ever thought of who’d get your assets should you meet an untimely death, or even if you’re 99 and sensing that the time to check out is very soon? You may know whom you want to receive your assets, but do you know for sure that they actually will? After all, policyholders are not required to find out if the benefactor is deceased; they are only res...
21 December 2013 /security
With your cards being used online, over the phone and in person it’s easy to lose track of purchases. The key is keep good records and be diligent about your security. Here are eight great tips that will go a super long way in preventing post holiday account takeover in the form of credit card fraud. #1. To ensure your best chances of escaping f...
18 December 2013 /security
Identity theft can involve children. In fact, it’s a growing problem. The thief takes a child’s Social Security number and either uses their name or assigns it to a different name and always changes the date of birth. So 2 year old Sally is now 22 and has a Benz. The thief then uses this new identity for job applications, loans or government benef...
16 December 2013 /security
When protected, sensitive or confidential data is accessed or used by someone without authority, this is a data breach. This can involve any kind of data such as personal health, financial, or business related. Not all data breaches result from hacking into a computer. One can breach data simply by peering over someone’s shoulder at the computer sc...
09 December 2013 /security
This year, one of the biggest identity theft rings originating from Minnesota was prosecuted—spanning 14 states and involving hundreds of victims. Total theft exceeded $2.5 million, and major retailers and banks were victimized. Just who was part of this ring is mind boggling; the participants included a receptionist with the state Board of Psychol...
07 December 2013 /security
When you leave your home or apartment in the morning, you might pack up a small bag of whatever you need for the day, which might change daily. But what doesn’t change is the three things you always have, and that’s your keys, mobile device and wallet. They are three essentials we can’t function without. Fortunately, at least two out of the three ...
21 November 2013 /security
Most people give no thought whatsoever to posting pictures of their children online. They are proud of their kids, they love them…so why not show the world how wonderful they are so others can enjoy each milestone too? Plus, Grandma and Auntie live so far away, and they want to keep up with new pictures and videos. And as long as you set up all th...
16 November 2013 /security
Did you know you can buy Social Security numbers (SSNs) online? It’s legal to do so in most cases, and pretty much anyone who has an internet connection can make a purchase. Information brokers or data brokers, as they are known, sell this information in the form of background checks. In some instances, the SSN needs to be provided to get the back...
13 November 2013 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.