Instigate change. Start a new collaborative Blog Group

Create group
Blogs
A Finextra Member

Operation Waking Shark 2

Operation Waking Shark 2 is due to take place in Britain in mid-November and although it may sound like something from an episode of Homeland, it is in fact a serious test of Britain’s financial servi...

04 Nov 2013
Robert Siciliano

Whats the Point of 1 Million in Insurance for ID Theft

Honesty is the best policy, right? I’ve spent my life being honest, and do you know what is the most important lesson I’ve learned is? The truth hurts. And when you (meaning me too) says it like it is...

04 Nov 2013
Robert Siciliano

Danger Wireless Toilets Next on Hackers List

Just about anything wireless is hackable today. Everything—from PCs to mobiles to tablets to home automation devices to pacemakers to insulin dispensers and even cars—are hackable. And now “smart” toi...

04 Nov 2013
Robert Siciliano

5 Home Security Tactics of the Uber Rich

The uber rich have many reasons to invest in uber security. I met a woman who won a $300 million lottery, and she had some unfortunate stories about how low people go to get at and to moneyed individu...

01 Nov 2013
A Finextra Member

How to Develop Certifications for New Payment Technologies ?

A chat with Hugues Thiebeauld, UK Security Lab. Manager at UL Security Technologies, on specificity of Certifications for New Payment “With the success of new technology in the payments space largel...

31 Oct 2013
A Finextra Member

The Ten Commandments of fraud prevention

Bankers hold hope that one day improvements in technology will grind fraud to a halt. No doubt this is the right target, but worldwide banking fraud currently tops $120bn - more than New Zealand’s GDP...

30 Oct 2013
Robert Siciliano

What is Business or Commercial Identity Theft?

Business or commercial identity theft happens when thieves use an existing business’ name to get credit, or they may bill a business’ clients for products and services. Sometimes the Social Security n...

29 Oct 2013
A Finextra Member

Cyber Security: the Biggest Threat to the UK Banking Sector?

Next month the UK Government is launching one of the most extensive cyber threat exercises, which will test how prepared financial systems are to survive a sustained online attack. The move comes af...

16 Oct 2013
Miloslav Hoschek

2030 2050 Global Strategies trends

The new world between 2030 –2050 recalls past transition points—such as 1815, 1919, 1945, or 1989. In this world will exist an absence of global power. The hegemonic power will shift to networks and...

14 Oct 2013
Payments strategies 2015-2020-2030
Elton Cane

Is that a worm in my ATM?

When ATM vendors got behind Windows XP as a replacement for IBM’s OS/2 as it neared the end of its shelf life 10 years ago, there was a predictable flurry of concern. And instinctively, the concerns m...

11 Oct 2013
Future Finance
Andy Morris

What do EMV, payments fraud and the Top 40 have in common?

Pause for thought…….quiz time. Can you remember who topped the UK charts on the 14th February 2006? Now, can you also remember what was the main business driver behind the UK’s move to the EMV standar...

10 Oct 2013
Robert Siciliano

What is Synthetic Identity Theft?

Identity theft is first and foremost a problem because we rely on numerical identifiers that attach humans to credit and a variety of services. Once a criminal gets hold of those identifiers, he can s...

09 Oct 2013

Now hiring