4231 Results from /regulation
Robert Siciliano Security Analyst at Safr.me
ABC news and a bazillion other outlets report that a former informant for the Secret Service was one of three men charged with stealing credit and debit card information from 170 million accounts in the largest data breach in history. The former informant, Albert Gonzalez of Florida, A.K.A "Segvec", "SoupNazi," and "j4gu
01 September 2009 /security /regulation
Retired Member
Visible security is needed not just for banks, but for any eCommerce site e.g merchants, retailers,trading platform or social networking. Consumers groups should be applying the same visible security rule across all online business websites! Yes, the online banking services of some leading financial institutions may have weaker visible securit
In a word, no. A national ID card, on its own, will not prevent all forms of identity theft. In order for new account fraud to be entirely avoidable, a number of other factors would have to come into play, effectively establishing accountability through identity proofing. Effective identity proofing is also necessary in order to reliably prevent
Craigslist scams are in full force. Fox news reports scams targeting online car buyers. The crooks spend about a hundred dollars on a junk car and get a title. Then they steal a similar car and advertise it for sale on Craigslist. This is a form of auto identity theft too. They then take the VIN plate or vehicle identification number plate out of
29 August 2009 /security /regulation
Peer to peer file sharing is a great technology used to share data over peer networks. It’s also great software to get hacked and have your identity stolen. Installing P2P software allows anyone, including criminal hackers, to access your data. This can result in data breaches, credit card fraud and identity theft. This is the easiest and, frankl
28 August 2009 /security /regulation
A recent TowerGroup report shows that risk management allocation of FSIs' total global IT spending is predicted to rise from 6.5 per cent in 2009 to almost 7 per cent by 2012, pointing towards a better understanding of the critical importance of expert operational and strategic risk management. Risk management is a driver for investments but sho...
28 August 2009 /regulation /retail
One of my favourite TV programmes is "The Real Hustle" where a team of ex-confidence tricksters show how easy it is to use social engineering to gain access to other peoples' goods and money. Of the three security areas that can be addressed, people, process and tools, people provide both the largest target and, due to reluctance to own ...
27 August 2009 /security /regulation Information Security
Ive taken lots of heat for my comments on a Fox News report that the Office of Management and Budget is considering reversing a nine year ban on using “cookies” to track users’ preferences and interests on federal websites. The shift in policy is being billed as a way for government to enter the 21st century and for federal agencies to use the sa
27 August 2009 /security /regulation
Background checks are a necessary tool in today’s sometimes violent and certainly litigious society. If a rug installation company was to hire an installer, who eventually rapes and kills a client, then the rug installation company would be held libel for the animals actions. This example is one that happens all to often. A background check may s
Most people are too smart to fall for a Nigerian 419 scam. But plenty of smart people fell for Bernie Madoff’s investment scams. Madoff was far more subtle than your average scammer. But in this day and age, people ought to be more alert to potential scams than ever before. And yet this wolf in sheep’s clothing was able to bilk so many investors.
26 August 2009 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.