Join the Community

22,288
Expert opinions
44,292
Total members
325
New members (last 30 days)
163
New opinions (last 30 days)
28,772
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Retired Member

Retired Member 

iPhone fingerprint scanner broken by Chaos

The new biometric security 'feature' if the Apple iPhone has already been breached using a simple photograph & common everyday items. It took members of the renowned Chaos Computer Club the blink of an eye to defeat the iPhone 5s secured with TouchID. Here is a short video. http://www.youtube.com/watch?v=HM8b8d8kSNQ Bumometrics. You may as well...

/security

Retired Member

Retired Member 

Did I mention, 'your dongle dongle is impotent'?

RSA Security, is alleged to have warned thousands of its customers to immediately discontinue using all versions of company's BSAFE toolkit and Data Protection Manager (DPM), both using Dual_EC_DRNG (Dual Elliptic Curve Deterministic Random Bit Generator) encryption algorithm to protect sensitive data. In short, your dingle dongle is impotent. Whe...

/security

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

The positive side of Malware

At precisely 20:26 local time my Yahoo app began buzzing like a bee hive. 72 ‘Mailer-Daemon’ failure to email messages popped up one after the other in my home-use email. Shortly afterwards I started getting emails from concerned buddies. ‘You have a virus’ was the most common reaction, with ‘Hacked…’ being the second. Someone I emailed with 5

/security

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

Take the 45 Million and Run

It was one of the largest cyber-heists in human history. Like in many other cyber attacks, it started with breaching a secure network. This time the target was a US-based processor of prepaid cards issued by Bank of Oman. The attackers went in, took control of several accounts, raised the withdrawal limits and, most importantly, stole the PIN numb...

/payments

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Could EC3 help Europol see sense?

This month, we saw Europol’s launch of EC3, the new European Cybercrime Centre that aims to be at the heart of combating cybercrime in the EU. As I blogged back in July 2012, it’s fantastic the EU recognise cybercrime as a serious enough issue to warrant a dedicated centre. In my opinion EC3 can help protect Europeans and businesses against mountin...

/security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Dexter malware, targeting Christmas shoppers

The holiday season is a prime time for fraudsters to target consumers' credit cards and it's not surprising that Dexter has come to light a week before Christmas. Dexter is yet another malware variation that targets point-of-sale purchases by skimming debit and credit cards and stealing account holders' details for subsequent fraudulent use. Dexte...

/security

Steven Murdoch

Steven Murdoch Royal Society University Research Fellow at University College London

Chip and Skim: cloning EMV cards with the pre-play attack

The EMV (Chip & PIN) protocol requires ATMs and point-of-sale terminals to generate a random number. If this number (known in EMV terminology as the "unpredictable number") isn't random, Chip & PIN is left vulnerable to the "pre-play" attack, which is indistinguishable from card cloning to the bank which issued the card...

/security /payments

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

The Tricia Bennett Mystery

A couple of weeks ago I got a LinkedIn invitation from someone called Tricia Bennett. I don’t know Tricia, and in such cases I’ve developed a best practice of first asking “hey mate, do I know you from somewhere”? What’s the rationale for linking yourself professionally only to people you’ve actually met? Well, other than general common sense, it’s...

/security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Experian figures show just why we need EC3

Experian figures show just why we need EC3 and an industry strategy for countering Cyber Crime Following recent news from Experian that more than 12 million pieces of personal information have been illegally traded over the internet in the first four months of 2012 got me thinking about whether there is a disconnect between people’s attitudes to s...

/security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Combating global cyber crooks

This week two large-scale fraud scams caught my attention. The first scam sees fraudsters using new and improved Zeus and SpyEye malwares to infiltrate people’s computers, enabling them to steal their personal details so that they can siphon large amounts of money into their own bank accounts. This isn’t the first time that malware has conquered i...

/security

Now Hiring