Community
The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
As the owner, you will also give up ownership if you leave this group.
Uri Rivner CEO and Co-Founder at Refine Intelligence
It was one of the largest cyber-heists in human history. Like in many other cyber attacks, it started with breaching a secure network. This time the target was a US-based processor of prepaid cards issued by Bank of Oman. The attackers went in, took control of several accounts, raised the withdrawal limits and, most importantly, stole the PIN numb...
10 May 2013 /payments
Pat Carroll Founder/Executive Chairman at ValidSoft
This month, we saw Europol’s launch of EC3, the new European Cybercrime Centre that aims to be at the heart of combating cybercrime in the EU. As I blogged back in July 2012, it’s fantastic the EU recognise cybercrime as a serious enough issue to warrant a dedicated centre. In my opinion EC3 can help protect Europeans and businesses against mountin...
25 January 2013 /security
The holiday season is a prime time for fraudsters to target consumers' credit cards and it's not surprising that Dexter has come to light a week before Christmas. Dexter is yet another malware variation that targets point-of-sale purchases by skimming debit and credit cards and stealing account holders' details for subsequent fraudulent use. Dexte...
20 December 2012 /security
Steven Murdoch Royal Society University Research Fellow at University College London
The EMV (Chip & PIN) protocol requires ATMs and point-of-sale terminals to generate a random number. If this number (known in EMV terminology as the "unpredictable number") isn't random, Chip & PIN is left vulnerable to the "pre-play" attack, which is indistinguishable from card cloning to the bank which issued the card...
11 September 2012 /security /payments
A couple of weeks ago I got a LinkedIn invitation from someone called Tricia Bennett. I don’t know Tricia, and in such cases I’ve developed a best practice of first asking “hey mate, do I know you from somewhere”? What’s the rationale for linking yourself professionally only to people you’ve actually met? Well, other than general common sense, it’s...
28 August 2012 /security
Experian figures show just why we need EC3 and an industry strategy for countering Cyber Crime Following recent news from Experian that more than 12 million pieces of personal information have been illegally traded over the internet in the first four months of 2012 got me thinking about whether there is a disconnect between people’s attitudes to s...
24 July 2012 /security
This week two large-scale fraud scams caught my attention. The first scam sees fraudsters using new and improved Zeus and SpyEye malwares to infiltrate people’s computers, enabling them to steal their personal details so that they can siphon large amounts of money into their own bank accounts. This isn’t the first time that malware has conquered i...
28 June 2012 /security
Here are some further thoughts on the LinkedIn compromise, following my previous blog post. Over the years I did some unscientific research on LinkedIn. Here’s some unofficial statistics I have on LinkedIn accounts: about 25% of LinkedIn users use their real corporate email account as the user name. That’s not a good practice for many reasons, som...
13 June 2012 /security
The recent LinkedIn accounts compromise in which 6.5 million password hashes were published in the Russian hacker community grabbed a lot of media attention. In a hellish period of publicly known breaches that hit the front page news, with perimeter security defenses failing left and right in any possible vertical and geography, this incident stirs...
11 June 2012 /security
Many of us will have come back from the extended holiday period ready to start the New Year with a bang, only to realise that we’ve forgotten our computer password and can’t do anything until the IT department resets it. It’s not just the fact that you’ve been out of the office for 10 days. By insisting on “strong” passwords, IT departments are in...
03 January 2012 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.