Robert Siciliano Security Analyst at Safr.me
Information and phisical security in every country is continually at risk as long as identifing documents can be reproduced with ease. While progress is continually made to identify and authenticate, organized criminals skirt the system. Federal and state authorities closed a metro Denver counterfeit documents ring allegedly masterminded by a Me
16 March 2009 /security /regulation
An axiom in business is that we buy from and do business with those who we know like and trust. In the 21st century we have seen CEOs, investment bankers, politicians and those in the highest positions of trust completely screw everyone who put them on their pedestal. Madoff pleads guilty for orchestrating a 65 billion dollar Ponzi scheme and 3 ro...
13 March 2009 /security /regulation
Skimming is one of the financial industry’s fastest-growing crimes, according to the U.S. Secret Service. Also, the worldwide ATM Industry Association reports over $1 billion in annual global losses from credit card fraud and electronic crime associated with ATMs. Skimming is a relatively low tech crime. It can occur in a few different ways. The ...
12 March 2009 /security
What a nasty headline for an article. From ABCnews.com the journalist roasts IT professionals on a spit. And the comments were all inspiring. As the recession rears its ugly head, disgruntled ex employees are in the best position to drop a bomb in the companies network or suck all the data out with a few terabyte drives. A recent study by McAfee a
11 March 2009 /security /regulation
I have neighbors from hell. They do everything possible to make my life miserable. And the more I talk about my awful neighbors, I find out that everyone has a neighbor they cant stand. Its everywhere. But some neighbors are much much worse. Here a local neighborhood was terrorized by a drug addicted mom and dad who had a penchant for technology
09 March 2009 /security /regulation
Mischievous hack attacks on Twitter are increasing and it seems there is no end in sight. While twitters developers are working to make it more secure, the open nature of the application fuels mischievous and even criminal hacking. Twitter is microblogging. In 140 characters or less you tell your followers what you are doing or point them toward
06 March 2009 /security /regulation
In the US we are approaching tax time. Scammers are ramped up and looking for your money. Learn these tips and watch your back. Protect and prevent Identity Theft. 1. Text messaging scams or Phexting Like phishing but texting); Criminal hackers have access to technology that generates cell phone numbers and access to mass text messaging services.
05 March 2009 /security /payments
What many are beginning to realize, and few have known for a long time, there is a battle going on 24/7/365 between the good guys and the bad guys. Now, President Obama has chimed in with a directive to review the nations cyber security as it relates to security and our critical infrastructures. The situation isnt getting better, its getting worse...
02 March 2009 /security /regulation
There's a certain nostalgia about connecting with old Friends. It brings us back to a simpler, simple minded way. We forget for a moment our daily tasks and deadlines. We flirt with a time that was about virility, irresponsibility and youth. The community at hand is carefree and so happy to let you know they just made a tuna sandwich. Facebook is ...
27 February 2009 /security /regulation
The problem of identity theft continues to grow. The victims face an incredible amount of resistance when restoring their good name. Most spend an overwhelming amount of time fighting credit reporting companies, creditors and even law enforcement to clear their names. Relief may be in sight. A consortium of a number of companies in the identity t...
26 February 2009 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.