Join the Community

22,722
Expert opinions
43,857
Total members
362
New members (last 30 days)
192
New opinions (last 30 days)
28,925
Total comments

Latest expert opinions

clear
clear

126 Results from 2013, /security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What is Business or Commercial Identity Theft?

Business or commercial identity theft happens when thieves use an existing business’ name to get credit, or they may bill a business’ clients for products and services. Sometimes the Social Security number of a company’s officer or another representative is required to commit business identity theft. A big problem is that identifiers, such as fede...

/security

Retired Member

Retired Member 

Cyber Security: the Biggest Threat to the UK Banking Sector?

Next month the UK Government is launching one of the most extensive cyber threat exercises, which will test how prepared financial systems are to survive a sustained online attack. The move comes after a senior official at the Bank of England warned earlier this year that cyber attacks are the top risk for UK banks. The warning was confirmed by a...

/security /regulation

Miloslav Hoschek

Miloslav Hoschek Freelancer at e-Silk Road, NGO

2030 2050 Global Strategies trends

The new world between 2030 –2050 recalls past transition points—such as 1815, 1919, 1945, or 1989. In this world will exist an absence of global power. The hegemonic power will shift to networks and coalitions in multi polar world, with declining US capacity to serve as a global security provider. The world between 2030 –2050 will launch open ...

/security /regulation Payments strategies 2015-2020-2030

Elton Cane

Elton Cane Digital product delivery at News Corp Australia

Is that a worm in my ATM?

When ATM vendors got behind Windows XP as a replacement for IBM’s OS/2 as it neared the end of its shelf life 10 years ago, there was a predictable flurry of concern. And instinctively, the concerns made sense. Why would you use the most popular and most targeted all-purpose PC operating system to run such a machine with very specific functions and...

/security /retail Future Finance

Andy Morris

Andy Morris Risk Business Solutions Consultant at ACI Worldwide

What do EMV, payments fraud and the Top 40 have in common?

Pause for thought…….quiz time. Can you remember who topped the UK charts on the 14th February 2006? Now, can you also remember what was the main business driver behind the UK’s move to the EMV standard of “chip and pin,” which also coincidentally was the same official launch date (14th February 2006)? Well let me put you out of your misery. It was...

/security /payments

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What is Synthetic Identity Theft?

Identity theft is first and foremost a problem because we rely on numerical identifiers that attach humans to credit and a variety of services. Once a criminal gets hold of those identifiers, he can simply be you. But when that thief takes on those numerical identifiers and attaches another name or date of birth, he confuses the already broken sys...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

What is Encryption?

Encryption is the science of encoding and decoding secret messages. It began as cryptography—the ancient Greeks used it to protect sensitive information that might fall into the hands of their enemies. More recently, governments have used encryption for military purposes, but these days the term if often used in reference to online security. Encr...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Medical Identity Theft: Ins and Outs

Medical identity theft is the deadliest form of identity theft—and I say this without hyperbole or exaggeration. When financial gain is the general motivation for stealing medical information, insurance cards, records, etc., the crime is a form of account takeover fraud. Medical identity theft—the real kind—occurs when the thief’s motivation is ob...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

11 Types of Grey Charges

Grey charges: “Deceptive and unwanted credit and debit card charges that occur as a result of misleading sales and billing practices.” Technically, grey charges aren’t considered fraud because the legalese spells it all out, and trusting consumers sign on the dotted line. Merchants know levying grey charges is legal, but they also know it’s unethi...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

5 Myths and Misconceptions About Home Security

Security is one of those topics we’d rather not discuss because it requires us to acknowledge the fact that we are vulnerable to miscreants bent on doing harm. Sorry, but this is Real Life 101 here—which, unfortunately, means most people don’t do anything about their security proactively; hence, so many people are victimized and end up in complete...

/security

Now Hiring