4457 Results from /regulation
Robert Siciliano Security Analyst at Safr.me
A webcam is certainly one way the bad guy can get intelligence about you. They can use it to spy on you. They can listen into everything you say all day. They know when you are home or not, whether or not you have an alarm, they watch you. But in my opinion, the real issue here isn’t the webcam, but the technology that allows for full remote contr...
02 March 2010 /security /regulation
Elizabeth Lumley Global FinTech Commentator at Girl, Disrupted
Yesterday, I briefly attended a heavily populated event looking at ... you guessed it...high frequency trading. Nothing is guaranteed to fill a room these days more that those HFTs. (2010's equivalent of 'low latency') The talk was supposed to be centred on the pros and cons of various types of market access - exchange membership, sponsored access ...
26 February 2010 /regulation
Retired Member
Some stories are so jaw-droppingly weird that you just have to write about them...or at least I do. This story is one of those. So let me see if I can follow the logic that would make a bank turn down deposits based on a blog. Banks are in the business of making money and social networks are in the business of making the most out of getting peo...
26 February 2010 /security /regulation Cringeworthy marketing gallery
Steven Murdoch Royal Society University Research Fellow at University College London
It has now been two weeks since we published our paper “Chip and PIN is broken”. Here, we presented the no-PIN attack, which allows criminals to use a stolen Chip and PIN card, without having to know its PIN. The paper has triggered a considerable amount of discussion, on Light Blue Touchpaper, Finextra, and elsewhere. One of the topics which has...
26 February 2010 /security /regulation Information Security
Two weeks ago I questioned what form a ‘new risk management’ would take and how far the industry is rallied around the 2010 GARP Risk theme of “Transforming Risk into a new world order”. I had hoped that the convention would reveal risk managers finally beginning to understand the vital role data management plays in helping untangle messy inter
24 February 2010 /regulation Data Management 101
"If there are any Mattel engineers in the audience, the astronaut Barby's space suit is not crash proof" (loose paraphrasing on Will Wright's keynote) Yep, the keynote was entertaining and Engage brought a lot of vendors to snowy New York's Javits center. The two day event, though a bit low on developers, had a few interesting sessions a...
23 February 2010 /payments /regulation Innovation in Financial Services
Dan Yost Chief Technology Officer of MyLaptopGPS brought attention to the Ponemon Institute, with sponsorship from PGP, has released their “Fifth Annual U.S. Cost of Data Breach Study.” As usual, the report is a treasure trove of great data (just like most people’s laptops are). The average cost per breached data record rose $2 in 2009, to $204. T...
22 February 2010 /security /regulation
The sheer volume of potential targets coupled with the vast amounts of money to be made has captured the attention of the global criminal hacking community. Enterprise networks are becoming hardened and they are still vulnerable. Some are being penetrated directly while others are accessed through 3rd parities such as their clients or end users. Un...
20 February 2010 /security /regulation
Yes, our data show a correlation between some higher users of social media and identity fraud, yet this story screams of media sensationalism to me. There are just too many variables at play, such as the presence of multiple residents in many homes that are waiting to thwart the would-be burglar. Certainly it's foolish to share too much on social ...
19 February 2010 /security /regulation
Diploma mills were born along with elearning institutions who are actually legitimate and accredited bodies. Degrees and diplomas issued by diploma mills are frequently used for fraudulent purposes, such as obtaining employment, promotions, raises, or bonuses on false pretenses. They can also be used as a form of fake ID when posing as someone els...
17 February 2010 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.