4163 Results from /regulation
Retired Member
Trusteer's release on the connection between phishing and individual's loss of log in information is quite interesting; what's needed for the financial technology and security now is to create an actual correlation between these two events (everyday online consumer behavior and criminal activity) and the final "missing link" of actual tr...
02 December 2009 /regulation
Robert Siciliano Security Analyst at Safr.me
Identity is a simple concept that has become a complex problem. It has become complex due to fraud. Fraud, motivated by money and the ease of obtaining credit and taking over an account. Because identity has yet to be effectively established, anyone can be you. Currently, identity is generally established when a person provides a single source of ...
02 December 2009 /security /regulation
Ever forge your husband's signature? Wife’s? Parent's? Client's? Do you think the clerk behind the counter at Walmart is skilled in handwriting analysis? I’ve always viewed a signature as a totally ridiculous form of authentication and a total waste of my time. Signing my name has always been burden and a frustrating task. Nobody seems to know whe...
01 December 2009 /security /regulation
We all know the statistics; the number of identity fraud victims is growing year-on-year and we all need to be responsible when looking after our personal information. But what happened when personal information is lost, leaked or stolen and it is outside our direct control? Who do we look to blame? In the UK, the Information Commissioner’s Office ...
30 November 2009 /security /regulation Online Banking
As cybercriminals begin to take advantage of the holiday season, McAfee, Inc. revealed the “Twelve Scams of Christmas” – the twelve most dangerous online scams that computer users should be cautious of this holiday season. According to Consumer Reports’ 2009 State of the Net Survey, cybercriminals have bilked $8 billion from consumers in the past ...
29 November 2009 /security /regulation
Cybercriminals Take Advantage of the Holiday Season, Aiming to Steal Consumers’ Money, Identities and Financial Information As cybercriminals begin to take advantage of the holiday season, McAfee, Inc. revealed the “Twelve Scams of Christmas” – the twelve most dangerous online scams that computer users should be cautious of this holiday season. Acc...
The Financial Times this morning has a video that just gobsmacked me. I know I've been vocal in the past about ID protection but I'm now at the point that I've been terribly enlightened...and saddened! An American journalist takes us to see another journalist in Russia who visits a store that sells databases on everyone. I mean everyone! Poo
26 November 2009 /security /regulation Information Security
Cybercriminals Take Advantage of the Holiday Season, Aiming to Steal Consumers’ Money, Identities and Financial Information As cybercriminals begin to take advantage of the holiday season, McAfee, Inc. revealed the “Twelve Scams of Christmas” – the twelve most dangerous online scams that computer users should be cautious of this holiday season. Ac...
26 November 2009 /security /regulation
25 November 2009 /security /regulation
Swatting is making prank calls to emergency services. In the field of information security, swatting is an attempt to trick an emergency service (such as a 911 operator) to dispatch an emergency response team, generally a SWAT team. SWAT is (Special Weapons and Tactics). Caller ID spoofing technologies are used to send law officers on bogus calls ...
24 November 2009 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.