4467 Results from /regulation
Robert Siciliano Security Analyst at Safr.me
In my early 20’s I bought real estate in a depressed area north of Boston in Lynn Massachusetts. At 20, that’s all I could afford. Lynn was then and is now known as “Lynn Lynn the City of Sin, you don’t go out the way you come in.” Lynn’s a hard city known for drugs and prostitution. It’s also the home of various biker gangs known as “one percent...
10 January 2010 /security /regulation
There’s a lot of excessive trust in the Facebook world. People have entirely dropped their sense of cynicism when logged on. They have no reason to distrust. People who are your “Friends” are generally those who you “know, like and trust”. In this world, your guard is as down as it will ever be. You are in the safety of your own home or office ha...
08 January 2010 /security /regulation
Lately I’ve been coming across “advertisements” posted on forums from criminal hackers looking to sell our stolen information. They are “carders” selling “dumps” and “fullz” I wrote about it HERE. Well I decided to make contact with one of them to see what the deal is. It turns out the one I connected with was less than forthcoming, but was very p...
05 January 2010 /security /regulation
Jay McDonald from Creditcards.com does a great job of summarizing Identity Theft Predictions for 2010. “Like wolves to injured prey, identity thieves are out to turn the recession struggles of average Americans to their own advantage. “In my adult life, I’ve never seen more varations of old scams and the degree of sophistication in newer scams,” ...
04 January 2010 /security /regulation
The last decade we have seen technological breakthroughs unlike any other. In response we have seen a tremendous rise in fraud. The reason? The speed of the conveniences technology have far outpaced the security of technology. PC World puts out their list: Cyberwar: In February 2000, a Canadian teenager named Mafiaboy used automated floods of inc...
02 January 2010 /security /regulation
In a recent article in Computer World, Tom Patterson CSO of Magtek, with his Glamor Shot photo, provides “5 counter-fraud tips you’ve never been told”. Anything a consumer can do to reduce their risk for account takeover, they should exercise. While in most cases the consumer isn’t responsible for the losses, as long as you refute the fraud in a ...
Retired Member
I didn't get to wait until the New Year for those GSM mobile phone conversations and phone banking sessions to become even more accessible to criminals (it is unlawful to intercept mobile communications in most civilised countries, however even governments don't seem to pay any attention to that one so criminals aren't likely to either): NYTimes G...
31 December 2009 /security /regulation Whatever...
The FBI considers the cyber threat against our nation to be one of the greatest concerns of the 21st century. Steven R. Chabinsky is deputy assistant director of the cyber division of the Federal Bureau of Investigation. This article is sourced from GovInfoSecurity.com and was adapted from written testimony he delivered earlier this month to the Se...
29 December 2009 /security /regulation
It started simply by hacking 7-Elevens public website using a SQL injection. SQL is abbreviation of Structured Query Language. Pronounced ”Ess Que El” or ”Sequel” depending on who you ask. This led to 7 elevens main servers compromised which led to ATMs within 7-Eleven hacked. Wired reports ““The Russians, evidently using an SQL injection vuln...
28 December 2009 /security /regulation
President Obama has chimed in with a directive to review the nations cyber security as it relates to security and our critical infrastructures. CNN recently reported about the “U.S. Cyber Challenge” to find and develop 10,000 cybersecurity specialists to help the U.S. regain the lead in cyberspace. In its simplest form, the U.S. Cyber Challenge p...
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.