4231 Results from /regulation
Retired Member
I didn't get to wait until the New Year for those GSM mobile phone conversations and phone banking sessions to become even more accessible to criminals (it is unlawful to intercept mobile communications in most civilised countries, however even governments don't seem to pay any attention to that one so criminals aren't likely to either): NYTimes G...
31 December 2009 /security /regulation Whatever...
Robert Siciliano Security Analyst at Safr.me
The FBI considers the cyber threat against our nation to be one of the greatest concerns of the 21st century. Steven R. Chabinsky is deputy assistant director of the cyber division of the Federal Bureau of Investigation. This article is sourced from GovInfoSecurity.com and was adapted from written testimony he delivered earlier this month to the Se...
29 December 2009 /security /regulation
It started simply by hacking 7-Elevens public website using a SQL injection. SQL is abbreviation of Structured Query Language. Pronounced ”Ess Que El” or ”Sequel” depending on who you ask. This led to 7 elevens main servers compromised which led to ATMs within 7-Eleven hacked. Wired reports ““The Russians, evidently using an SQL injection vuln...
28 December 2009 /security /regulation
President Obama has chimed in with a directive to review the nations cyber security as it relates to security and our critical infrastructures. CNN recently reported about the “U.S. Cyber Challenge” to find and develop 10,000 cybersecurity specialists to help the U.S. regain the lead in cyberspace. In its simplest form, the U.S. Cyber Challenge p...
Being a “Siciliano” and having roots in Italy, namely Sicily, the little island at the bottom of the boot, we have a tradition where we celebrate “the vigil” (La Vigilia), with a Feast of the Seven Fishes (festa dei sette pesci). It’s a day of cooking, eating and enjoying your favorite beverage in substantial quantity. I do the cooking and start se...
23 December 2009 /security /regulation
Apparently I raised a hackle or two. Seems my little stunt got the attention of industry insiders, and not all of them believe that I bought a used ATM on Craigslist, which turned out to contain thousands of credit card numbers. Well, it did actually happen, and despite what many say, that the ATM couldn’t have contained 16-digit credit and debit...
22 December 2009 /security /regulation
In 2003, an estimated 1.5 million laptops were stolen worldwide. Today, that number has climbed to 2.6 million. That’s a 70% increase in just a few years. That’s one stolen laptop every 12 seconds. Laptop computers have been the source of some of the biggest data breaches of all time. 800,000 doctors were recently put at risk for identity theft whe...
The Identity Theft Resource Center® (ITRC) and Robert Siciliano (me) have joined forces to expand the pool of knowledge about identity theft issues. As nationally recognized experts in this crime, we have come up with the Top 10 predictions for what the nation might expect in the area of identity theft in 2010 and beyond. 1. More Scams: The recess...
18 December 2009 /security /regulation
Imagine trying to log into your online accounts one after the other and being locked out. At first you think the site you are visiting screwed up but then it keeps happening over and over again no matter where you go. Then you start receiving messages from friends and family asking you why you are behaving so freakishly online. This is what happe...
15 December 2009 /security /regulation
In a blog I guest contribute to called “NextAdvisor” they offer the following advice on child identity theft protection: The following post in our Reader Question series is an actual user submitted question. “Q: I found out that someone used my grandson’s Social Security number to get phone service. How can I stop this? He’s only 11 years old. A: ...
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.