4163 Results from /regulation
Robert Siciliano Security Analyst at Safr.me
Skimming data off of debit and credit cards has been happening at ATMs, gas pumps and electronic funds transfer point of sale terminals for quite some time. When criminals plant skimming devices, they have to physically attach a skimming device that fits over the face of the ATM’s card slot. Then they install a small camera that shoots video of y...
12 March 2010 /security /regulation
Retired Member
In February CPP looked in more detail at the issue of mobile phone insurance fraud and theft. The results were interesting and confirmed some long-held assumptions that there is a small minority who think it is totally acceptable to file a fraudulent insurance claim for financial gain. So, just how many? Eight per cent of respondents said they kne...
09 March 2010 /security /regulation Online Banking
Elizabeth Lumley Global FinTech Commentator at Girl, Disrupted
Last Friday's afternoon chat with Enrico Camerinelli, senior analyst at Celent - Processes, People and Technology in Global Transaction Banking - talked about strategies for the development of global transaction banking departments in the midst of the credit crunch. The panel, which included representatives from HSBC, Swift, IT/2 and the Cranfield...
08 March 2010 /payments /regulation Data Management 101
New Hampshire, USA. “Live Free or Die,” baby. The official state motto emblazoned on every NH license plate has always intrigued. The thought of someone from NH might bring to mind revolutionaries or America militia sympathizers. New Hampshire has come a long way since its motto was created in 1945 and is not much different than most states today....
08 March 2010 /security /regulation
When Fonzie jumped the shark on his HOG, that spelt the end of Happy Days. The FTC sending a warning to 100 companies and agencies that their employees are leaking client and sensitive data on the web via Peer to Peer file sharing (P2P) is the single most pathetic and embarrassing communication to come across the desk of an IT professional. It’s...
05 March 2010 /security /regulation
When we started looking for customers in the first payments startup I worked for, low hanging fruit were obvious. All you had to do to find them was look for a merchant's international shipping policy - or lack thereof - and continue from there. The value proposition we offered, where we would make final accept/decline decisions and insure them, w...
03 March 2010 /payments /regulation Innovation in Financial Services
A webcam is certainly one way the bad guy can get intelligence about you. They can use it to spy on you. They can listen into everything you say all day. They know when you are home or not, whether or not you have an alarm, they watch you. But in my opinion, the real issue here isn’t the webcam, but the technology that allows for full remote contr...
02 March 2010 /security /regulation
Yesterday, I briefly attended a heavily populated event looking at ... you guessed it...high frequency trading. Nothing is guaranteed to fill a room these days more that those HFTs. (2010's equivalent of 'low latency') The talk was supposed to be centred on the pros and cons of various types of market access - exchange membership, sponsored access ...
26 February 2010 /regulation
Some stories are so jaw-droppingly weird that you just have to write about them...or at least I do. This story is one of those. So let me see if I can follow the logic that would make a bank turn down deposits based on a blog. Banks are in the business of making money and social networks are in the business of making the most out of getting peo...
26 February 2010 /security /regulation Cringeworthy marketing gallery
Steven Murdoch Royal Society University Research Fellow at University College London
It has now been two weeks since we published our paper “Chip and PIN is broken”. Here, we presented the no-PIN attack, which allows criminals to use a stolen Chip and PIN card, without having to know its PIN. The paper has triggered a considerable amount of discussion, on Light Blue Touchpaper, Finextra, and elsewhere. One of the topics which has...
26 February 2010 /security /regulation Information Security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.