Join the Community

21,775
Expert opinions
43,887
Total members
474
New members (last 30 days)
201
New opinions (last 30 days)
28,624
Total comments

Latest expert opinions

clear
clear

4169 Results from /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Women Proved Securest in the Defcon Social Engineering Game

In a recent post (Hackers Play “Social Engineering Capture The Flag” At Defcon), I pointed to a game in which contestants used the telephone to convince company employees to voluntarily cough up information they probably shouldn’t have. Of 135 “targets” of the social engineering “game,” 130 blurted out too much information. All five holdouts were ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Half Billion Records Breached in 5 Years

In the late 90s and early 2000s, hacking had evolved from “phreaking” (hacking phone systems) to “cracking” (breaking into networks). At the time, hackers hacked for fun, for the challenge, and for fame and popularity within the hacking community. But soon enough, the public began spending more time online, shopping, banking, and managing personal...

/security /regulation

Miloslav Hoschek

Miloslav Hoschek Freelancer at e-Silk Road, NGO

The deflation helix differs from deflation spiral

Let's define at first the abstract new terminology related to our theme. We will suppose that the deflation spiral has limited constraints and frames. We will explain here how the deflation spiral transform to a deflation helix under the influence of a negative discount rate. cont. copyright Miloslav HOSCHEK PhD independent consultant mhoschek/ad...

/payments /regulation Payments strategies 2015-2020-2030

Uri Rivner

Uri Rivner CEO and Co-Founder at Refine Intelligence

James Bond and the Quantum Worm

Only select few have had a look at the script of the next James Bond feature film. It seems like Quantum, the secret criminal organization that in previous installments was busy short-selling the stock market by staging terrorist attacks and taking over water supplies to control the economy of South America, has a new target in its crosshairs: the...

/security /regulation Innovation in Financial Services

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Social Media is a Criminals Playground

Social media has become a playground for adults, teens, and tweens. And like on any playground, when you hit the jungle gym or horseplay on the seesaw, there is always a chance that you may go home with an egg on your forehead. Or, if you are like me, a broken collarbone. Twitter and Facebook have become the most popular sites for frolicking, and ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Criminal Hackers Create 3 Million Fraud Websites Annually

A recent study shows that organized criminals create approximately 8,000 malicious websites every day, or over 57,000 each week. These malicious websites model legitimate websites that we visit every day, such as bank websites, online shopping sites, and eBay. According to this study, the most frequently impersonated companies include Visa, Amazon....

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

50 Million Dollar Van Gogh Stolen No Alarm System

“A prized Vincent van Gogh still life was stolen from a Cairo museum leading to a massive art hunt, conflicting reports about the details of the crime, and plenty of finger-pointing. Five people, meanwhile, have been arrested for “negligence” in relation to the embarrassing theft, which seems to have been carried out in the absence of rudimentary...

/security /regulation

Retired Member

Retired Member 

When data loss gets personal

Ask yourself a question: do you know where your personal information is held and do you know how secure it is? When you deposit your savings into a bank account or leave your house keys with a trusted neighbour you do so with the conviction that your money is safe and your keys will be put somewhere secure and out of the way. We all seem accepting...

/security /regulation Online Banking

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Log Out, Log Out, I repeat, LOG OUT

One of the most common yet underreported causes of data breaches is users’ failure to properly log out of public PCs. Is your work computer accessible to others, perhaps after business hours? How about your home computer? Does its use extend beyond your immediate family, to your kids’ friends or babysitters, for example? Do you ever log in to a hot...

/security /regulation

Keith Appleyard

Keith Appleyard IT Consultant at available for hire

British Telecom sends Customers personal details unencrypted

[I'm surprised I haven't seen anything elsewhere on Finextra on the ACS:Law fiasco] BT has admitted it sent the personal details of more than 500 customers as an unsecured document to legal firm ACS:Law, following a court order. The unsecured Excel documents were sent in late August by a lawyer working for British Telecom, to Andrew Crossley who ru...

/security /regulation Whatever...

Now Hiring