Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
It's been less than a week since Windows 7 was released to manufacturer and already we're seeing reports that Windows 7 RTM Ultimate has been cracked using an OEM product key from computer manufacture...
Current authentication methods proposed by payment schemes are a joke for fraudsters. Not only are the credentials information static, but also very easy to get on the web. The fact that the code is
It is not new to the experts, but SSL (Secure Socket Layer) is not as secure as it is supposed to be. The SSL security protocol is receiving a critical security update. This update does not concern
Apple just suggested to IETF (Internet Engineering Task Force) the HTTP Streaming to replace the RTSP (Real Time Streaming Protocol) and even Flash and Silverlight. HTTP Streaming The purpose of thi
As a french citizen, I was born Chip and Pin capable!!! Actually I have not known any other system until I went out of France. Now I'm running my own company and I'm travelling more often. I started
The web 3.0 is on every mouth. It seems like it’s one of the next buzzes on the internet. What is it? What can we expect from it? Before describing the WEB 3.0, let’s go a little bit through the his
Reaction to the article of TowerGroup https://www.finextra.com/fullstory.asp?id=20137 Regarding the usage of "traditional" account information (name, address, birthdate...) as authentication...
The situation in France is pretty unique in these times of crisis. Here is how credit is structured and how French people see it and use it. CREDIT IN FRANCE What is the credit situation in France an...
In 2009 "cutting costs" is on every CEOs/VPs lips and Customer Services are often the target of this policy. Customer Services What is it? Everything is in the title. It's all about "...
Lately I have read a lot of interesting blogs and comments about identity theft. This is obviously a hot topic, Hackers have never been so active and banks have had a hard time keeping up. Prologue:
The following authentication scenarios discussed here apply to a simple connection between a client and his online banking website. After reviewing the most dangerous hacking techniques, we will see