4231 Results from /regulation
Robert Siciliano Security Analyst at Safr.me
The Identity Theft Resource Center® Breach Report recorded 498 breaches, less than the 657 in 2008, more than the 446 in 2007. Are data breaches increasing or decreasing? That is the question no one can answer. This fact will not change until there is a single data breach list requiring mandatory public reporting. With some breaches not being rep...
12 January 2010 /security /regulation
Forrester Research, Inc. in Cambridge, MA is an independent research company that provides pragmatic and forward-thinking advice to global leaders in business and technology. They released their 2010 data security predictions. Heading into 2010, they are predicting five new data security trends: 1) Enterprises will keep their data security budgets...
Retired Member
"This was not a failure to collect intelligence, it was a failure to integrate and understand the intelligence that we already had." NYTimes quoting President Obama after his meeting with national security advisers about a terror plot to bring down a commercial jetliner on Christmas Day. (Jan 6th 2010) Going to the movies with friends fr...
11 January 2010 /payments /regulation Data Management 101
A bunch of us recently celebrated a 40th birthday of a friend. The conversation at one point revolved around my ATM scam and how easy it is to con people. A new boyfriend of a friend began to tell everyone how he often cons people to get in bars and clubs. “I NEVER wait in lines” he said, “and I always get VIP treatment”. I hate lines too, but I h...
10 January 2010 /security /regulation
In my early 20’s I bought real estate in a depressed area north of Boston in Lynn Massachusetts. At 20, that’s all I could afford. Lynn was then and is now known as “Lynn Lynn the City of Sin, you don’t go out the way you come in.” Lynn’s a hard city known for drugs and prostitution. It’s also the home of various biker gangs known as “one percent...
There’s a lot of excessive trust in the Facebook world. People have entirely dropped their sense of cynicism when logged on. They have no reason to distrust. People who are your “Friends” are generally those who you “know, like and trust”. In this world, your guard is as down as it will ever be. You are in the safety of your own home or office ha...
08 January 2010 /security /regulation
Lately I’ve been coming across “advertisements” posted on forums from criminal hackers looking to sell our stolen information. They are “carders” selling “dumps” and “fullz” I wrote about it HERE. Well I decided to make contact with one of them to see what the deal is. It turns out the one I connected with was less than forthcoming, but was very p...
05 January 2010 /security /regulation
Jay McDonald from Creditcards.com does a great job of summarizing Identity Theft Predictions for 2010. “Like wolves to injured prey, identity thieves are out to turn the recession struggles of average Americans to their own advantage. “In my adult life, I’ve never seen more varations of old scams and the degree of sophistication in newer scams,” ...
04 January 2010 /security /regulation
The last decade we have seen technological breakthroughs unlike any other. In response we have seen a tremendous rise in fraud. The reason? The speed of the conveniences technology have far outpaced the security of technology. PC World puts out their list: Cyberwar: In February 2000, a Canadian teenager named Mafiaboy used automated floods of inc...
02 January 2010 /security /regulation
In a recent article in Computer World, Tom Patterson CSO of Magtek, with his Glamor Shot photo, provides “5 counter-fraud tips you’ve never been told”. Anything a consumer can do to reduce their risk for account takeover, they should exercise. While in most cases the consumer isn’t responsible for the losses, as long as you refute the fraud in a ...
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.