1135 Results from 2009
Uri Rivner CEO and Co-Founder at Refine Intelligence
When Chao was arrested in September, something in the veil of anonymity surrounding cyber crime was lifted. In this special report, the Joy of Fraud Fighting reveals previously undisclosed information regarding this case. Chao was the brain behind Crime Enforcers, a busy assembly line of ATM and Point of Sale card skimmers. For eight years he asce...
20 April 2009 /security Online Banking
Elton Cane Digital product delivery at News Corp Australia
I'm expecting that again this year there will be a lot of talk about e-invoicing at EBAday in Vienna, particularly as the expert group and EPC are working to break down the remaining barriers to widespread adoption (such as these). But beyond just the level playing field for e-invoicing, I'm looking forward to hearing more about what's being done ...
20 April 2009 /payments /wholesale EBAday
Retired Member
Online banking has almost hit the 50% (OK 46.1% in the UK) penetration mark and bankers must be chuffed to bits. Online Banking is a relatively low cost route to market and providing the customer/prospect with the ability to self serve means that cost per transaction is lower too. Its savings all the way for the banks. The news from APACs that onl...
20 April 2009
Put loyalty and prepaid cards on mobile phones first, which will create the desire to have credit and debit cards as well, integrated into a single transaction. Going the other way, credit cards first, will be extremely challenging. The difference is the value proposition to customers and retailers. The main promise of putting credit and debit ca...
19 April 2009 /payments
Cedric Pariente Stanford Certified Project Manager at EFFI Consultants
The following authentication scenarios discussed here apply to a simple connection between a client and his online banking website. After reviewing the most dangerous hacking techniques, we will see what solutions can be implemented. What is a Man-in-the-middle (MITM) attack? A MITM attack is an active eavesdropping in which the attacker combin
18 April 2009 /security Transaction Fraud Systems and Analysis
Robert Siciliano Security Analyst at Safr.me
The US National Security Agency is probably the most sophisticated group of security hackers in the world. Many will argue this point. The fact is, without NSA, US STRATCOM, which directs the operation and defense of the military’s Global Information Grid, and US CERT, attacks on our critical infrastructures would be successful. We’d be living in
18 April 2009 /security /regulation
Thought I'd give you a quick update on my walk. The kick off is under 4 days away now and I will be setting off next Tuesday (21 April). I am looking forward to the challenge and the experience but I must admit I am getting a little nervous!4 months of solid training is now coming down to 9 days following the Thames through field and town - and ha...
17 April 2009 /payments /wholesale Whatever...
Paul Penrose Head of Research at Finextra
Conventional wisdom has it that bank branches should take their cue from modern retail practices. They should be bright and welcoming, preferably open plan with comfy seating and staffed by approachable, friendly sales people. So why is JPMorgan taking a bulldozer to the WaMu Occasio branch concept, a $1 billion branch remodelling exercise that fre...
17 April 2009 /retail Trends in Financial Services
This weekend's race in China promises to be entertaining. The rear diffuser design of the Brawn, Toyota & Williams teams has beem deemed legal so the other teams are in a race to develop and integrate the design on their cars in a bid to make them more competitive. It remains to be seen how this will affect this Sunday's race. For those of yo...
17 April 2009
First there were the simple times where networking involved a face to face encounter and some phone calls. Then came along email, Facebook, LinkedIn and a whole other range of tools for the personal or professional networker to make use of. The Americans have devised a tool to make all this a little bit easier. ‘Poken’ is a digital business card –...
17 April 2009 Women in Technology
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.