Tag: Two factor authentication

SpyEye targets security blindspots

According to this article from USA Today last week, cyber-attacks are set to increase over the remainder of this year due to the widespread availability of a new SpyEye hacker toolkit. The software allows hackers or cybercriminals to control a network of up to thousands of botnets, which can then be used for spamming, DDOS […]

Why use secure eBanking devices?

Using secure eBanking devices reduces online fraud because a hacker cannot access (or take) money from your online banking accounts using only your stolen login information. The hacker would also need the device, a smart bankcard and reader or a secure USB token. Still not convinced you should use secure eBanking devices? Read on!

Multi-factor authentication – the popular kid at school…

In light of all the recent cyber attacks costing companies money, reputation and customer trust, stronger security and additional layers is increasingly becoming top of the shopping list for IT professionals. But there is still some confusion as to what are the best security elements that need to be in place to provide the best […]

Building consumer trust in mobile banking

Smartphones are becoming more and more pervasive in our lives these days, as recent research from Nielsen and Javelin Strategy Research shows. Consumers are embracing smartphones in record numbers, however the uptake of mobile banking technologies does not match this high rate of adoption.

Building a More Secure Internet

It is critical that consumers are certain that the site they visit is the one they intended to access. A new policy signed by the Obama Administration will change the way we do business on the internet.

Save a Whale… Save your Job!

When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.