4287 Results from /regulation
Robert Siciliano Security Analyst at Safr.me
Peer to peer file sharing is a great technology used to share data over peer networks. It’s also great software to get hacked and have your identity stolen. Installing P2P software allows anyone, including criminal hackers, to access your data. This can result in data breaches, credit card fraud and identity theft. This is the easiest and, frankl
28 August 2009 /security /regulation
Retired Member
A recent TowerGroup report shows that risk management allocation of FSIs' total global IT spending is predicted to rise from 6.5 per cent in 2009 to almost 7 per cent by 2012, pointing towards a better understanding of the critical importance of expert operational and strategic risk management. Risk management is a driver for investments but sho...
28 August 2009 /regulation /retail
One of my favourite TV programmes is "The Real Hustle" where a team of ex-confidence tricksters show how easy it is to use social engineering to gain access to other peoples' goods and money. Of the three security areas that can be addressed, people, process and tools, people provide both the largest target and, due to reluctance to own ...
27 August 2009 /security /regulation Information Security
Ive taken lots of heat for my comments on a Fox News report that the Office of Management and Budget is considering reversing a nine year ban on using “cookies” to track users’ preferences and interests on federal websites. The shift in policy is being billed as a way for government to enter the 21st century and for federal agencies to use the sa
27 August 2009 /security /regulation
Background checks are a necessary tool in today’s sometimes violent and certainly litigious society. If a rug installation company was to hire an installer, who eventually rapes and kills a client, then the rug installation company would be held libel for the animals actions. This example is one that happens all to often. A background check may s
Most people are too smart to fall for a Nigerian 419 scam. But plenty of smart people fell for Bernie Madoff’s investment scams. Madoff was far more subtle than your average scammer. But in this day and age, people ought to be more alert to potential scams than ever before. And yet this wolf in sheep’s clothing was able to bilk so many investors.
26 August 2009 /security /regulation
As a “blogger” I am held accountable for what I say. Bloggers are being sued and held libel for their comments. People who comment on blogs are now coming under fire. For years I’ve put myself out there making a concerted effort to educate, inform and try help out mankind by informing people of their options to protect themselves from the bad guy. ...
25 August 2009 /security /regulation
If there was ever a week to get high, totally drunk, on information security and identity theft scammers and hackers, then this is it! Media outlets everywhere have been pumping out story after story of data breaches, identity theft, criminal hackers and indictments! Yeah team! For a criminal hacker groupie, this is Woodstock! Dark reading report
22 August 2009 /security /regulation
It wasn’t long ago that most phishing emails were from a supposed Nigerian General Matumbi Mabumboo Watumboo. And you and I were flattered that we were the chosen ones to help the general transfer 35 million out of the country, because the Nigerian government was a bunch of jerks and wouldn’t let him keep the inheritance his wife had inherited fro...
20 August 2009 /security /regulation
The Marines recently banned soldiers from using social media sites such as MySpace, Facebook and Twitter. This is for two reasons. First, because they fear that these sites’ lack of security may allow malware to infiltrate government computers. And second, they’re concerned about the potential for leaked military data. Military personnel are often...
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.