Join the Community

24,205
Expert opinions
40,782
Total members
339
New members (last 30 days)
209
New opinions (last 30 days)
29,302
Total comments

Latest expert opinions

clear
clear

4457 Results from /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

. RATs Are Committing Identity Theft Via Webcams

A webcam is certainly one way the bad guy can get intelligence about you. They can use it to spy on you. They can listen into everything you say all day. They know when you are home or not, whether or not you have an alarm, they watch you. But in my opinion, the real issue here isn’t the webcam, but the technology that allows for full remote contr...

/security /regulation

Elizabeth Lumley

Elizabeth Lumley Global FinTech Commentator at Girl, Disrupted

HFTs - Who feels their pain?

Yesterday, I briefly attended a heavily populated event looking at ... you guessed it...high frequency trading. Nothing is guaranteed to fill a room these days more that those HFTs. (2010's equivalent of 'low latency') The talk was supposed to be centred on the pros and cons of various types of market access - exchange membership, sponsored access ...

/regulation

Retired Member

Retired Member 

My Image...My Blog...My Bank..No Way

Some stories are so jaw-droppingly weird that you just have to write about them...or at least I do. This story is one of those. So let me see if I can follow the logic that would make a bank turn down deposits based on a blog. Banks are in the business of making money and social networks are in the business of making the most out of getting peo...

/security /regulation Cringeworthy marketing gallery

Steven Murdoch

Steven Murdoch Royal Society University Research Fellow at University College London

Reliability of Chip and PIN evidence in banking disputes

It has now been two weeks since we published our paper “Chip and PIN is broken”. Here, we presented the no-PIN attack, which allows criminals to use a stolen Chip and PIN card, without having to know its PIN. The paper has triggered a considerable amount of discussion, on Light Blue Touchpaper, Finextra, and elsewhere. One of the topics which has...

/security /regulation Information Security

Retired Member

Retired Member 

'New Risk Management' Needs Accurate Data

Two weeks ago I questioned what form a ‘new risk management’ would take and how far the industry is rallied around the 2010 GARP Risk theme of “Transforming Risk into a new world order”. I had hoped that the convention would reveal risk managers finally beginning to understand the vital role data management plays in helping untangle messy inter

/regulation Data Management 101

Retired Member

Retired Member 

New York under zero: some thoughts on the Engage! Expo

"If there are any Mattel engineers in the audience, the astronaut Barby's space suit is not crash proof" (loose paraphrasing on Will Wright's keynote) Yep, the keynote was entertaining and Engage brought a lot of vendors to snowy New York's Javits center. The two day event, though a bit low on developers, had a few interesting sessions a...

/payments /regulation Innovation in Financial Services

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

The 6.75 Million Dollar Laptop

Dan Yost Chief Technology Officer of MyLaptopGPS brought attention to the Ponemon Institute, with sponsorship from PGP, has released their “Fifth Annual U.S. Cost of Data Breach Study.” As usual, the report is a treasure trove of great data (just like most people’s laptops are). The average cost per breached data record rose $2 in 2009, to $204. T...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

The State of Information Security Sucks

The sheer volume of potential targets coupled with the vast amounts of money to be made has captured the attention of the global criminal hacking community. Enterprise networks are becoming hardened and they are still vulnerable. Some are being penetrated directly while others are accessed through 3rd parities such as their clients or end users. Un...

/security /regulation

Retired Member

Retired Member 

This screams of media sensationalism

Yes, our data show a correlation between some higher users of social media and identity fraud, yet this story screams of media sensationalism to me. There are just too many variables at play, such as the presence of multiple residents in many homes that are waiting to thwart the would-be burglar. Certainly it's foolish to share too much on social ...

/security /regulation

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Diploma Mills Facilitate Identity Theft

Diploma mills were born along with elearning institutions who are actually legitimate and accredited bodies. Degrees and diplomas issued by diploma mills are frequently used for fraudulent purposes, such as obtaining employment, promotions, raises, or bonuses on false pretenses. They can also be used as a form of fake ID when posing as someone els...

/security /regulation

Now Hiring