147 Results from 2014, /security
Robert Siciliano Security Analyst at Safr.me
PIN may sometimes stand for pilfered identification number if a hacker gets yours. And it’s easier than ever for thieves to get your PIN from an ATM, coming up with clever ways to beat security technology. The “primitive” way to get your card number is to manually place a phony card reader over an ATM card reader and then come back to retrieve it...
12 June 2014 /security
Retired Member
One of the most important topics addressed here at EBAday this week has been E-Identification. It's the kind of topic that could be swept into the "techy" drawer by many bankers, but it's probably the most critical change that all firms are going to face for the next 10 years and beyond in our interconnected world. It would be impossible...
11 June 2014 /security /regulation
Hello again. Much news, some good, some not so good on the e-crime and cyber security front. Acknowledgements and thanks to the Bank of England, BBC, Independent, Telegraph, Reuters, Bloomberg, CSO, eBay and finextra. In response to the UK Government Financial Policy Committee’s requirement that the financial sector should test and improve its def...
11 June 2014 /security
Never mind the government nosing in on your business; there’s a much bigger snooper out there that’s mining to your personal data: thousands of companies whose names you may not even know. These “data brokers” aren’t “bad”, although a few are irresponsible. They collect and analyze your very personal information, then package it up and sell it fo...
10 June 2014 /security
Ketharaman Swaminathan Founder and CEO at GTM360 Marketing Solutions
Security increases friction. That's not news. I've written a few blog posts - click here, and here - on this perennial tradeoff in payments. However, I recently realized that security measures can actually cause new sources of vulnerability. Ironic but true. Since December 2013, India's central bank RBI has made it mandatory for all debit and cred...
03 June 2014 /security
Pat Carroll Founder/Executive Chairman at ValidSoft
In the ongoing game of one-upmanship between hackers and payment fraud prevention technology, new research presented at the 35th IEEE Symposium on Security and Privacy suggests that the fraudsters have yet another vector to utilize, exploiting new vulnerabilities within existing implementations of EMV/Chip and Pin. The new research suggests that c...
03 June 2014 /security Innovation in Financial Services
The Enron scandal and subsequent regulatory breaches by financial institutions during the recent economic crisis has placed organisations’ financial reporting and business processes under on-going scrutiny. Exacerbated by other high-profile incidents like the IT outages suffered by HSBC, RBS, Barclays and Santander, LIBOR rigging, PPI miss-selling...
30 May 2014 /security /regulation
Spear phishing is a powerful fraud technique. The objective is to get sensitive/confidential data which can then be used to mount at attack. A combination, for example, of my home and mobile numbers, as well as my work and personal email addresses is a valuable tool in "capable" hands. Obtaining such data is not easy, but Siri can help. ...
23 May 2014 /security /payments Innovation in Financial Services
Don’t just throw out your old devices; take measures to protect your personal information. Back Up Before ridding your device, back up everything on it—everything. Use an automated PC service and/or a flash drive. For the iOS and Android, activate Apple’s iCloud or the Google Auto Backup service. Wipe Wiping refers to removing all your data. Simp...
21 May 2014 /security
The biggest threat to your data may not come from external hackers. Find out how to guard against intentional or accidental internal cyber breaches. The NSA leaks we keep hearing about are a constant reminder of just how vulnerable data is and how this vulnerability can result in data breaches by organization insiders. As Reuters reported, “Edwa...
20 May 2014 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.