Join the Community

21,788
Expert opinions
43,902
Total members
471
New members (last 30 days)
206
New opinions (last 30 days)
28,628
Total comments

Latest expert opinions

clear
clear

4169 Results from /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Mobile Phones Being Hacked and Cloned

Cloning occurs when hackers scan the airwaves to obtain SIM card information, electronic serial numbers and mobile identification numbers, and then using that data on other phones. Cloning can happen anywhere, anytime that you’re using your phone. The bad guy simply uses an interceptor, hardware, and software to make a phone exactly like yours. A f...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

LinkedIn Gone Wild: Invades Inboxes

Did you know there is a setting on LinkedIn where they will email your entire contact list in your behalf to let everyone know about a new position you have taken with a company? I didnt. Until I got all kinds of “Congratulations” in my inbox. Apparently there is a new setting that by default is left “On” which in fact tells all your contacts that...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Social Security Numbers Easily Cracked

It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, using information from social networking sites, data brokers, voter registration lists, online ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Dealing With Daily Digital Surveillance

Our everyday activities are being monitored, today, right now, either by self-imposed technology or the ever-present Big Brother. Traditionally, documenting our existence went like this: You’re born, and you get a medical and a birth record. These documents follow you throughout your life, filed and viewed by many. You must present these records in...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

4 Reasons 2011 is the Year to Get Serious About Security

Prognosticators are silly. Or that’s how I’ve always viewed them, anyway. They combine past experience with their perspective on current trends to make predictions and pretend to be smarter than you. Many prognosticators in the financial world have failed miserably, and we’re all paying the price now. Their current excuse is “irrational exuberance....

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

mCrime Perfectly Positioned to Pounce in 2011

The number of households in the United States that rely solely on wireless telephones continues increasing. More than one in four households had cell phones and no landlines in the first half of 2010, which is an increase of 2.1% since the second half of 2009. And almost one in six households uses cell phones exclusively or almost exclusively desp...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Criminal Hackers Responsible For Most Data Breaches

According to the Identity Theft Resource Center, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers, and 26% involved credit or debit card data. The ITRC elaborated, “Other than breaches reported by the media and a few progressive state websites, ...

/security /regulation

Retired Member

Retired Member 

Harmonising CSDs and Settlement across the EU

It may have slipped your attention, but the European Commission consultation on CSDs (central securities depositories) and “harmonising certain aspects of securities settlement” will be closing for feedback on 1 March. If anything is fundamental to the way that securities markets work, it’s definitely settlement, and even more relevant when we ca...

/regulation

Miloslav Hoschek

Miloslav Hoschek Freelancer at e-Silk Road, NGO

Liquidity trap solution based on negative rate

The term „liquidity trap" was suggested by Keynes (1936) as a situation in which monetary policy is unable to stimulate an economy through increasing money supply or lowering interest rates. Liquidity traps typically occur when deflation is expected. Under the Keynesian conception of a liquidity trap further injections into the money ...

/regulation /sibos Payments strategies 2015-2020-2030

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Shoring Up National Cyber Security Infrastructure

The wild, wild web is the most exciting, alluring, and all-around awesome thing available to us today. It’s also something we have come to rely on to a fault. And that’s a little scary. The Internet is a decentralized wilderness, used by billions of devices worldwide. Joe Lieberman, chairman of the Homeland Security and Governmental Affairs Commit...

/security /regulation

Now Hiring