Posted on 15 September 2011 by Thales DIS
Bruce Schneier’s recent post in which he said that secret questions had reached a ‘new low’ may have shocked some casual observers, but for me it simply underlines a problem which is all too common. Personal verification questions (PVQs) and answers have been the de facto solution for forgotten passwords since the creation of email […]
Posted on 20 September 2011 by Thales DIS
Recently, @briankrebs highlighted a Trojan attack which showed quite how sophisticated some cyber attacks are now becoming. The case in question is being investigated by German police, and involves a new piece of malware which convinces online banking customers to willingly transfer their own money into the accounts of criminals. This particular case shows that, sometimes, even a layered […]
Posted on 21 September 2011 by Thales DIS
We’re shortly going to be researching CIOs globally on their views on security and authentication. What their concerns and pressure points are, what the barriers to implementing stronger security seem to be and where responsibility for security sits within an organization. However, we’d like YOU to pose the questions.
What would you ask?
Posted on 28 September 2011 by Thales DIS
The front page of today’s USA Today carries a chilling warning for web users about the vulnerability of digital certificate authorities, following hacks of three such organizations this summer. There are around 650 of these authorities, and the fact that hacking has been uncovered at three of these in such quick succession should be a […]
Posted on 04 October 2011 by Thales DIS
Remember a few weeks ago when I applauded Visa for announcing plans to accelerate the migration to EMV chip technology and the adoption of mobile payments? Since then, I have been struck by a few stories in the news that really drive home what this migration will mean for the United States. First, this story […]
Posted on 05 October 2011 by Thales DIS
Our lives are increasingly online, making work and play more convenient and efficient. At the same time, the attacks on our computers and networks continue to increase. It seems like every day we read of a new data breach that has put personal identity information and corporate data in the hands of criminals. Most recently, […]