Join the Community

24,213
Expert opinions
40,775
Total members
355
New members (last 30 days)
216
New opinions (last 30 days)
29,305
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Retired Member

Retired Member 

The real impact of the Vault 7 CIA data leak

The leak of almost 9,000 documents detailing hacking and surveillance techniques used by the CIA is shocking, but not for the reasons many people think. Reading that your Smart TV or mobile phone could be monitoring what you say in your own house is alarming, but the real issue isn’t that the CIA spies on people. It’s not even that they do it thr...

/security /regulation

Retired Member

Retired Member 

Overcoming Vulnerabilities In TLS

Recently Sudo Security Group uncovered something shocking about a range of popular applications available for download in the Apple's iOS Store. While performing research for their security tool verify.ly, the team discovered 76 of them had the same security hole. Further, according to estimates from Apptopia, a provider of mobile app data and ins...

/security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Security by Obscurity is the key!

2014 shocked us all into the reality that no institution or organization, no matter how big or sophisticated, was immune to being “hacked” or “breached”. Towards the end of the year, we were all numbed into submission and the shock factor resulting from the headlines that continued to dominate, was replaced with an uneasy bewilderment. Already thi...

/security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

iHack Hastens Call for Multi-factor Authentication

“If only I would have known” is a phase that Jennifer Lawrence, Kate Upton and possibly as many as 100 celebrities and notable personalities are likely saying after a reported massive breach of Apple’s iCloud service resulted in the unauthorized access to, and release of, personal information and photos. While the FBI, dozens of security vendors an...

/security /payments

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Our Predictions for 2014: Who Will Dominate? Part 1

Unfortunately, it’s not going to be plain sailing on the security front in 2014. It’s a bit like Friday 13th. Many folk say that Friday 13th is not their unlucky day at all, it’s Saturday 14th they worry about! And believe me, we do have a lot to worry about. So, what am I concerned about? And is there any good news for 2014? Well, the answer to t...

/security

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

BitCoin Explained: How to Become a BitCoin Thief - part 1

OK folks. You’ve all been hearing about Bitcoin. Your neighbors have been hearing about Bitcoin. Your dog walker has been hearing about Bitcoin. Now it’s time to separate the wheat from the chaff… Learn how to become a successful Bitcoin thief, and make lots of money in this exciting new cybercrime frontier! This practical guide is intended ONLY

/payments

Retired Member

Retired Member 

iPhone fingerprint scanner broken by Chaos

The new biometric security 'feature' if the Apple iPhone has already been breached using a simple photograph & common everyday items. It took members of the renowned Chaos Computer Club the blink of an eye to defeat the iPhone 5s secured with TouchID. Here is a short video. http://www.youtube.com/watch?v=HM8b8d8kSNQ Bumometrics. You may as well...

/security

Retired Member

Retired Member 

Did I mention, 'your dongle dongle is impotent'?

RSA Security, is alleged to have warned thousands of its customers to immediately discontinue using all versions of company's BSAFE toolkit and Data Protection Manager (DPM), both using Dual_EC_DRNG (Dual Elliptic Curve Deterministic Random Bit Generator) encryption algorithm to protect sensitive data. In short, your dingle dongle is impotent. Whe...

/security

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

The positive side of Malware

At precisely 20:26 local time my Yahoo app began buzzing like a bee hive. 72 ‘Mailer-Daemon’ failure to email messages popped up one after the other in my home-use email. Shortly afterwards I started getting emails from concerned buddies. ‘You have a virus’ was the most common reaction, with ‘Hacked…’ being the second. Someone I emailed with 5

/security

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

Take the 45 Million and Run

It was one of the largest cyber-heists in human history. Like in many other cyber attacks, it started with breaching a secure network. This time the target was a US-based processor of prepaid cards issued by Bank of Oman. The attackers went in, took control of several accounts, raised the withdrawal limits and, most importantly, stole the PIN numb...

/payments

Now Hiring