4169 Results from /regulation
Robert Siciliano Security Analyst at Safr.me
Cloning occurs when hackers scan the airwaves to obtain SIM card information, electronic serial numbers and mobile identification numbers, and then using that data on other phones. Cloning can happen anywhere, anytime that you’re using your phone. The bad guy simply uses an interceptor, hardware, and software to make a phone exactly like yours. A f...
05 March 2011 /security /regulation
Did you know there is a setting on LinkedIn where they will email your entire contact list in your behalf to let everyone know about a new position you have taken with a company? I didnt. Until I got all kinds of “Congratulations” in my inbox. Apparently there is a new setting that by default is left “On” which in fact tells all your contacts that...
04 March 2011 /security /regulation
It is easier than ever to guess or predict an individual’s Social Security number, which puts us all at a greater risk for identity theft. Researchers at Carnegie Mellon University have developed a reliable method for predicting Social Security numbers, using information from social networking sites, data brokers, voter registration lists, online ...
02 March 2011 /security /regulation
Our everyday activities are being monitored, today, right now, either by self-imposed technology or the ever-present Big Brother. Traditionally, documenting our existence went like this: You’re born, and you get a medical and a birth record. These documents follow you throughout your life, filed and viewed by many. You must present these records in...
Prognosticators are silly. Or that’s how I’ve always viewed them, anyway. They combine past experience with their perspective on current trends to make predictions and pretend to be smarter than you. Many prognosticators in the financial world have failed miserably, and we’re all paying the price now. Their current excuse is “irrational exuberance....
28 February 2011 /security /regulation
The number of households in the United States that rely solely on wireless telephones continues increasing. More than one in four households had cell phones and no landlines in the first half of 2010, which is an increase of 2.1% since the second half of 2009. And almost one in six households uses cell phones exclusively or almost exclusively desp...
24 February 2011 /security /regulation
According to the Identity Theft Resource Center, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers, and 26% involved credit or debit card data. The ITRC elaborated, “Other than breaches reported by the media and a few progressive state websites, ...
22 February 2011 /security /regulation
Retired Member
It may have slipped your attention, but the European Commission consultation on CSDs (central securities depositories) and “harmonising certain aspects of securities settlement” will be closing for feedback on 1 March. If anything is fundamental to the way that securities markets work, it’s definitely settlement, and even more relevant when we ca...
18 February 2011 /regulation
Miloslav Hoschek Freelancer at e-Silk Road, NGO
The term „liquidity trap" was suggested by Keynes (1936) as a situation in which monetary policy is unable to stimulate an economy through increasing money supply or lowering interest rates. Liquidity traps typically occur when deflation is expected. Under the Keynesian conception of a liquidity trap further injections into the money ...
17 February 2011 /regulation /sibos Payments strategies 2015-2020-2030
The wild, wild web is the most exciting, alluring, and all-around awesome thing available to us today. It’s also something we have come to rely on to a fault. And that’s a little scary. The Internet is a decentralized wilderness, used by billions of devices worldwide. Joe Lieberman, chairman of the Homeland Security and Governmental Affairs Commit...
16 February 2011 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.