Community
The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
As the owner, you will also give up ownership if you leave this group.
Retired Member
In March, I wrote about the attack on the infrastructure of United States of America. It wasn’t an attack on our naval bases, bridges, or water supply. It was an attack on the infrastructure of our internet, rendering websites, including Twitter and Netflix, catatonic. It was an attack with malware, allowing hackers to target websites with high tr...
19 April 2017 /security
Paul Irvine Director, Major Accounts UK&I at Fortinet
The single biggest issue we keep hearing about from financial institutions is the need to simplify and consolidate their security infrastructure. As Financial Services has evolved from person-to-person transactions to the fully digital business model it is today, network infrastructure has had to evolve as well – which has led to it becoming incre...
29 March 2017 /security
In 1983, I completed a computer security test for a Top Tier U.S. bank. Their idea not mine, because the CEO was alert enough and worried about early signs of computer crime in banking. I never considered myself a computer security expert then, and certainly not now. But the bank chose me as a guy who knew banking IT from A to Z, and could develo...
24 March 2017 /security
Mike Lynch Chief Strategy Officer at InAuth
While there is always the debate about what the biggest cybersecurity threat is today—DDoS attacks, ransomware, SQL injections, etc.—there is consensus that, based on total dollars lost, the use of automated bots to commit fraud has risen to the top of the list. Botnets are a type of malware that allows an attacker to take control of an affected c...
23 March 2017 /security
The leak of almost 9,000 documents detailing hacking and surveillance techniques used by the CIA is shocking, but not for the reasons many people think. Reading that your Smart TV or mobile phone could be monitoring what you say in your own house is alarming, but the real issue isn’t that the CIA spies on people. It’s not even that they do it thr...
09 March 2017 /security /regulation
Recently Sudo Security Group uncovered something shocking about a range of popular applications available for download in the Apple's iOS Store. While performing research for their security tool verify.ly, the team discovered 76 of them had the same security hole. Further, according to estimates from Apptopia, a provider of mobile app data and ins...
28 February 2017 /security
Pat Carroll Founder/Executive Chairman at ValidSoft
2014 shocked us all into the reality that no institution or organization, no matter how big or sophisticated, was immune to being “hacked” or “breached”. Towards the end of the year, we were all numbed into submission and the shock factor resulting from the headlines that continued to dominate, was replaced with an uneasy bewilderment. Already thi...
27 January 2015 /security
“If only I would have known” is a phase that Jennifer Lawrence, Kate Upton and possibly as many as 100 celebrities and notable personalities are likely saying after a reported massive breach of Apple’s iCloud service resulted in the unauthorized access to, and release of, personal information and photos. While the FBI, dozens of security vendors an...
05 September 2014 /security /payments
Unfortunately, it’s not going to be plain sailing on the security front in 2014. It’s a bit like Friday 13th. Many folk say that Friday 13th is not their unlucky day at all, it’s Saturday 14th they worry about! And believe me, we do have a lot to worry about. So, what am I concerned about? And is there any good news for 2014? Well, the answer to t...
20 January 2014 /security
Uri Rivner CEO and Co-Founder at Refine Intelligence
OK folks. You’ve all been hearing about Bitcoin. Your neighbors have been hearing about Bitcoin. Your dog walker has been hearing about Bitcoin. Now it’s time to separate the wheat from the chaff… Learn how to become a successful Bitcoin thief, and make lots of money in this exciting new cybercrime frontier! This practical guide is intended ONLY
04 December 2013 /payments
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.