Join the Community

23,550
Expert opinions
41,346
Total members
365
New members (last 30 days)
181
New opinions (last 30 days)
29,155
Total comments

Latest expert opinions

clear
clear

147 Results from 2014, /security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Protect your Cards from Multiple Kinds of Skimmers

PIN may sometimes stand for pilfered identification number if a hacker gets yours. And it’s easier than ever for thieves to get your PIN from an ATM, coming up with clever ways to beat security technology. The “primitive” way to get your card number is to manually place a phony card reader over an ATM card reader and then come back to retrieve it...

/security

Retired Member

Retired Member 

E-Identification is the next major crossroads

One of the most important topics addressed here at EBAday this week has been E-Identification. It's the kind of topic that could be swept into the "techy" drawer by many bankers, but it's probably the most critical change that all firms are going to face for the next 10 years and beyond in our interconnected world. It would be impossible...

/security /regulation

Retired Member

Retired Member 

Are Banks ready to give the fox the key to the henhouse?

Hello again. Much news, some good, some not so good on the e-crime and cyber security front. Acknowledgements and thanks to the Bank of England, BBC, Independent, Telegraph, Reuters, Bloomberg, CSO, eBay and finextra. In response to the UK Government Financial Policy Committee’s requirement that the financial sector should test and improve its def...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Data Brokers: Walking the Tightrope

Never mind the government nosing in on your business; there’s a much bigger snooper out there that’s mining to your personal data: thousands of companies whose names you may not even know. These “data brokers” aren’t “bad”, although a few are irresponsible. They collect and analyze your very personal information, then package it up and sell it fo...

/security

Ketharaman Swaminathan

Ketharaman Swaminathan Founder and CEO at GTM360 Marketing Solutions

How Security Can Actually Cause Vulnerability

Security increases friction. That's not news. I've written a few blog posts - click here, and here - on this perennial tradeoff in payments. However, I recently realized that security measures can actually cause new sources of vulnerability. Ironic but true. Since December 2013, India's central bank RBI has made it mandatory for all debit and cred...

/security

Pat Carroll

Pat Carroll Founder/Executive Chairman at ValidSoft

Chip and Skim Cards: Renewed Need for Layered Authentication

In the ongoing game of one-upmanship between hackers and payment fraud prevention technology, new research presented at the 35th IEEE Symposium on Security and Privacy suggests that the fraudsters have yet another vector to utilize, exploiting new vulnerabilities within existing implementations of EMV/Chip and Pin. The new research suggests that c...

/security Innovation in Financial Services

Retired Member

Retired Member 

Tackling the Compliance Conundrum

The Enron scandal and subsequent regulatory breaches by financial institutions during the recent economic crisis has placed organisations’ financial reporting and business processes under on-going scrutiny. Exacerbated by other high-profile incidents like the IT outages suffered by HSBC, RBS, Barclays and Santander, LIBOR rigging, PPI miss-selling...

/security /regulation

Retired Member

Retired Member 

Apple's Siri - iPhone security hole

Spear phishing is a powerful fraud technique. The objective is to get sensitive/confidential data which can then be used to mount at attack. A combination, for example, of my home and mobile numbers, as well as my work and personal email addresses is a valuable tool in "capable" hands. Obtaining such data is not easy, but Siri can help. ...

/security /payments Innovation in Financial Services

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How to safely and securely recycles Devices

Don’t just throw out your old devices; take measures to protect your personal information. Back Up Before ridding your device, back up everything on it—everything. Use an automated PC service and/or a flash drive. For the iOS and Android, activate Apple’s iCloud or the Google Auto Backup service. Wipe Wiping refers to removing all your data. Simp...

/security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

How To Protect Your Business From Internal Threats

The biggest threat to your data may not come from external hackers. Find out how to guard against intentional or accidental internal cyber breaches. The NSA leaks we keep hearing about are a constant reminder of just how vulnerable data is and how this vulnerability can result in data breaches by organization insiders. As Reuters reported, “Edwa...

/security

Now Hiring