Join the Community

21,775
Expert opinions
43,887
Total members
474
New members (last 30 days)
201
New opinions (last 30 days)
28,624
Total comments

Latest expert opinions

clear
clear

4169 Results from /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Hacking Wireless for Identity Theft

The ability to connect wirelessly has a lot to do with the indispensability of the Internet in our daily lives. Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-tim...

/security /regulation

Retired Member

Retired Member 

Basel III: Trust the rules

Basel III is setting the precedence for re-establishing the rules, as a result of the fall out of the financial market post-2008. The key aspects – tighter rules for tier-one capital, higher ratios of tier-one capital in relation to risk-weighted assets, new borrowing ratio relative to tier-one capital, new liquidity provisions, and measures to ...

/regulation /sibos Innovation in Financial Services

Brett King

Brett King CEO & Founder at Moven

Is Basel III bad for finance?

The Basel III accord’s stated purpose is: This consultative document presents the Basel Committee's proposals to strengthen global capital and liquidity regulations with the goal of promoting a more resilient banking sector. The objective of the Basel Committee's reform package is to improve the banking sector's ability to absorb shocks arising fr...

/regulation Innovation in Financial Services

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Online Shoppers Concerned About Identity Theft

Shopping online is unquestionably more convenient and efficient than traditional commerce. But is it safer? We face risk everywhere we go. We risk car accidents on the way to the mall. Muggers and thieves present a risk. Heck, you risk catching a cold from a sniffling salesclerk! Similarly, shopping online creates another set of pitfalls, most of w...

/security /regulation

Retired Member

Retired Member 

Can the Financial System Withstand Cyber Attack?

I report what I predict and what I observe. Risk managers should consider the risk of widespread adoption of sentiments in line with this post to an infosec site. Who would have predicted this? Will revelations about the financial industry about to be wikileaked add fuel to the fire? The kids are apparently not the only ones with ideas. I would as...

/regulation Whatever...

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Twitter Crime on the Rise

Twitter is now beginning to see a substantial rise in active users. A recent report found that the percentage of Twitter users who have tweeted ten or more times, have more than ten followers, and follow more than ten people rose from 21% to 29% in the first half of 2010. Spammers, scammers, and thieves are paying attention. In the physical world,...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Top 5 Vishing Techniques

“Vishing” occurs when criminals call victims on the phone and attempt to lure them into divulging personal information that can be used to commit identity theft. The name comes from “voice,” and “phishing,” which is, of course, the use of spoofed emails designed to trick targets into clicking malicious links. Instead of email, vishing generally rel...

/security /regulation

Retired Member

Retired Member 

Its Banking Next

For several weeks now, I’ve watched in amazement as the Bombay Stock Exchange’s benchmark index traded at barely 10% off its highs of January 2008. While India may be an outperformer, that still does not take away from the fact that worldwide, economic recovery has come at a pace few anticipated. Does this mean that we have gone back to where we w...

/regulation Innovation in Financial Services

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How Much Longer Does the Magstripe Have?

Every U.S.-based credit card has a magnetic stripe on the back. This stripe can be read and rewritten like a rewritable burnable CD, using card burners that are easily available online. The simplicity of the magstripe’s design, coupled with the availability of card reading and writing technology, results in billions of dollars in theft and fraud. E...

/security /regulation

Retired Member

Retired Member 

'PROTECT OUR DATA OR BE FINED' STATES THE UK CONSUMER!

Despite Information Commissioner doling out his first-ever fines for Data Protection Act breaches, the UK consumer wants tougher penalties for those deemed to be wrong-doers. Isn’t it great when you finally hear something completely unprovoked – and isn’t it also sweet music to your ears? It appears the ever-sharp UK consumer has obviously been r...

/security /regulation Information Security

Now Hiring