681 Results
Robert Siciliano Security Analyst at Safr.me
Jose Marrero, who was born and lived his entire life in Puerto Rico, had no idea that someone else was using his name and Social Security number to charge thousands of dollars in Miami and Chicago. At least, not until the police showed up at his job to arrest him for car theft. Marrero told the Associated Press, “All of the information [on the wa...
09 August 2010 /security /regulation
Personal information on 100 million Facebook users has been scraped from the social media site and is being shared and download as a single file via what is called a Bittorrent. BitTorrent is a peer-to-peer (P2P) file sharing protocol used for distributing large amounts of data. Facebook takes on the issue is the data that was scraped wasn’t pri...
Sandra Appiah is a curvy lady who wants to friend me. She friended two of my buddies and apparently they accepted because they showed as “2 Friends in Common”. I never automatically friend anyone, so I contacted each bud and neither knew who she was. Go figure. What got my attention besides the fact that I don’t know her was that she had photos on...
01 August 2010 /security /regulation
The trouble with social media revolves around identity theft, brand hijacking and privacy issues. The opportunity social media creates for criminals is to “friend” their potential victims in order to create a false sense of trust and use that against their victims in phishing or other scams. It was big news when someone had their Facebook account...
21 July 2010 /security /regulation
Despite what silly James Bond-esque credit card commercials may imply, credit card companies don’t really protect you to the degree you expect. If a credit card company detects irregular spending on your credit card, they may freeze your account or call to verify your identity. While these measures do help secure your card to an extent, but they c...
Social engineering is a fancier, more technical form of lying. An alternative to traditional hacking, it is the act of manipulating others into performing certain actions or divulging confidential information. Social engineering or “social penetration” techniques are used to bypass sophisticated and expensive hardware and software in a corporate n...
Personally, I don’t particularly enjoy staying in hotels. Sure, after a long day of travel, the hotel is a relief, but in most cases, I’d much rather sleep in my own bed. Criminal hackers, on the other hand, love hotels. According to a recent study, 38% of all credit card breaches occur in hotels. Despite several high profile breaches that recentl...
18 July 2010 /security /regulation
The major problem that consumers face today is a fundamental lack of understanding of what identity theft actually is. Most people think of identity theft as when someone uses your credit card without your permission. Fraudulent credit card use is certainly a multibillion dollar problem, but it’s only one small part of the identity theft threat. A...
14 July 2010 /security /regulation
All across the country one by one school, administrators are slowly beginning to recognize the need to perform background checks on volunteers. In Albany County WY, “under the tentative policy, all volunteers would complete an information form when they begin their volunteer work. Additionally, volunteers would undergo screening through the Wyoming...
13 July 2010 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.