294 Results from 2010, /security
Robert Siciliano Security Analyst at Safr.me
Universities/Colleges are the Riskiest Cases of identity theft are skyrocketing, and 32% of all ID theft victims had their social security number compromised according to Javelin’s 2010 Identity Fraud Survey Report. In honor of National Identity Protection week, McAfee set out to reveal the most dangerous places to leave your social security numb...
01 November 2010 /security /regulation
As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for content creators’ latest innovations, which often require more and more device access. As applications and other content are more widely distributed, security breaches will be inevitable. The s...
#1 Phone Fraud. The phone rings, a scammer poses as your banks fraud department. They may have your entire card number stolen from another source. They ask about a charge made and you deny the charge, but in order for the charge to be removed, they need your 3-4 digits CVV number off the front or back of the card. A variation may be they only hav...
Retired Member
Key security considerations for home and mobile workers In many cases executive IT and security professionals trust their Information Security departments to provide adequate security to protect employees while operating in their business environment. However it is rare for users to extrapolate this security to a home environment. What does this ...
01 November 2010 /security /payments Information Security
There is no doubt we live in an increasingly mobile, fast-paced and complicated society. If you had asked the average person in the street five years ago how their identity could be stolen then bin raiding and theft of personal mail would certainly have figured prominently. Today, ask the same question and you’re likely to get a multitude of respo...
29 October 2010 /security Information Security
Cybercrime has become a trillion dollar issue. In a recent survey, hundreds of companies around the world estimated that they had lost a combined $4.6 billion in intellectual property as a result of data breaches, and spent approximately $600 million repairing the damage. Based on these numbers, projections are that companies lost more than a tril...
27 October 2010 /security /regulation
Lachlan Gunn Executive Director at European Association for Secure Transactions
EAST, the European ATM Security Team, has recently released European ATM crime statistics for the period January to June 2010. The figures show a 24% increase in card skimming attacks at European ATMs - 5,743 attacks were reported for the period January to June 2010, compared with 4,629 for the same period in 2009. This is the highest ever figu...
27 October 2010 /security
According to Kroll – the US-based risk consultancy company, information theft has overtaken physical larceny of cash and stock as the biggest source of global losses for firms. Significantly, this is the first time this has happened – should we be concerned? Figures from the company’s 2010 Global Fraud report indicate that firms reporting incidents...
25 October 2010 /security /regulation
The card brands, Visa, MasterCard, JCB, American Express and Discover, are all mandating the universal and unquestioning acceptance and implementation of the PCI-DSS. The justification for this has always been presented as a means of ensuring the protection Cardholder Data, whatever that means. None of the card brands have really explained what ...
25 October 2010 /security
You may have seen this before, it goes like this: a pop-up pops and it looks like a window on your PC. Next thing a scan begins. It often grabs a screenshot of your “My Computer” window mimicking your PCs characteristics then tricking you into clicking on links. The scan tells you that a virus has infected your PC. And for $49.95 you can download ...
19 October 2010 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.