Posted on 01 September 2011 by Thales DIS
Using secure eBanking devices reduces online fraud because a hacker cannot access (or take) money from your online banking accounts using only your stolen login information. The hacker would also need the device, a smart bankcard and reader or a secure USB token. Still not convinced you should use secure eBanking devices? Read on!
Posted on 07 September 2011 by Thales DIS
My final installment in this series features the security of a player’s online persona or assets. If you’ve ever played a game that involves accomplishments or accumulating items, you know how much you care about this layer of security. No one wants to wake up one morning, log in to World of Warcraft and find […]
Posted on 12 September 2011 by Thales DIS
Mobile phones are fast moving beyond communications, beyond gaming, social and productivity tools, to take on a vast number of new applications thanks to the use of NFC-based technology and data services. We’re theoretically able to unlock hotel rooms, pay for groceries, secure deals with location-based vouchers and work on the go. We can do […]
Posted on 15 September 2011 by Thales DIS
Bruce Schneier’s recent post in which he said that secret questions had reached a ‘new low’ may have shocked some casual observers, but for me it simply underlines a problem which is all too common. Personal verification questions (PVQs) and answers have been the de facto solution for forgotten passwords since the creation of email […]
Posted on 20 September 2011 by Thales DIS
Recently, @briankrebs highlighted a Trojan attack which showed quite how sophisticated some cyber attacks are now becoming. The case in question is being investigated by German police, and involves a new piece of malware which convinces online banking customers to willingly transfer their own money into the accounts of criminals. This particular case shows that, sometimes, even a layered […]
Posted on 21 September 2011 by Thales DIS
We’re shortly going to be researching CIOs globally on their views on security and authentication. What their concerns and pressure points are, what the barriers to implementing stronger security seem to be and where responsibility for security sits within an organization. However, we’d like YOU to pose the questions.
What would you ask?