User Blogs

User Blogs

Discussions and Blogs
Sep 05
2013

Serious Growth for mCommerce in 2013

Posted by Robert Siciliano in mCommerce

Robert Siciliano

The practice of mCommerce (or M-commerce) is using a mobile phone to make purchases. Like credit card transactions, your card/device can be either present or not present.

Aug 16
2013

Giveaway: Free Pass to the Cyber Security & Digital Forensics Exchange

Posted by Cinthia Pilar in Untagged 

Cinthia Pilar
I would like to invite you to attend the live panel webcast on Sept 24th, 2013: Big Data Security in an Era of Social, Mobile and Cloud Computing.

At the end of the session the IT GRC Forum is giving away a $2,950 pass to the Cyber Security & Digital Forensics Exchange (www.cyber-securityexchange.com) being held in Austin, TX on December 8 - 12, 2013. The pass is for the entire 3 day event and includes meals and two night hotel accommodation.

Jul 24
2013

Social Media A Big Risk To Banks

Posted by Robert Siciliano in Social Media

Robert Siciliano

For more than a decade criminals have been attacking online banking successfully by one upping security professionals their and clients by creating viruses to bypass existing security measures.

Jul 18
2013

Banks Big And Small Targets of Cyber Gangs

Posted by Robert Siciliano in Cyber gangs

Robert Siciliano

Brilliance historically is often expressed in the simplest of technologies, the wheel or the light bulb are perfect examples. Today brilliance is often attributed to advances in technologies that cure illness, solve problems and make life easier.

Jul 16
2013

How Mobiles Have Become a Big Target for Corporate Networks

Posted by Robert Siciliano in BlackBerry

Robert Siciliano

Mobile was born with the consumer market in mind. As mobile has developed for consumer use over the past 20-something years, security hasn’t been much of a priority. Now, with a variety of different operating systems and millions of applications, security on mobiles has become a significant problem—especially in a corporate setting. Criminals know that by targeting an employee’s wireless device, they have a good chance of getting onto the corporate network.

Jul 16
2013

How to Use Foursquare to Get Free WiFi

Posted by Robert Siciliano in FourSquare

Robert Siciliano

Know Foursquare? As the company itself puts it, “Discover and share great places with friends. Over 30 million people use Foursquare to make the most of where they are. Discover and learn about great places nearby, search for what you’re craving, and get deals and tips along the way. Best of all, Foursquare is personalized. With every check-in, we get even better at recommending places for you to try.”

Jul 15
2013

“Old” Malware Attacks Rising Significantly

Posted by Robert Siciliano in Malware

Robert Siciliano

Earlier this week McAfee Labs™ released the McAfee Threats Report: First Quarter 2013, which reported that malware shows no sign of changing its steady growth, which has risen steeply during the last two quarters.

Jul 09
2013

5 More Mobile Security Tips

Posted by Robert Siciliano in mobile security

Robert Siciliano

A cybercriminal’s full time job is creating new crimes, and he or she will make full use of technology to hide their activities to fool you. And with mobile devices, this is no different.

Jul 01
2013

Why it’s Critical to Protect Data on Digital Devices

Posted by Robert Siciliano in digital devices

Robert Siciliano

When devices are lost or hacked and your data is exposed, not only is this a pain to deal with, but you could become a victim of identity theft. Not only do victims of identity theft suffer loss of time  but they also lose money that may not be able to be recovered . In McAfee’s recent study, they found on average that people have over $35,000 worth of digital assets stored on their digital devices, further demonstrating the need to protect your personal data on all of your digital devices.

Jul 01
2013

5 Mobile Security Tips

Posted by Robert Siciliano in security tips

Robert Siciliano

Cybercrime is one of the most lucrative illegal businesses of our time, and it shows no signs of slowing down. Over the last decade, cybercriminals have developed new and increasingly sophisticated ways of capitalizing on the explo­sion of Internet users, and they face little danger of being caught. Meanwhile, consumers are con­fronted with greater risks to their money and information each year.

Jun 26
2013

Your Strong Password Isn’t so Strong

Posted by Robert Siciliano in passwords , passwords

Robert Siciliano

Banks rely on usernames and passwords as a layer of protection and authentication to prevent criminals from accessing your accounts. However researchers now show that your password—even though it may be a relatively “strong” one, might not be strong enough.

Jun 26
2013

Evaluating solutions? A GRC-iers' dilemma

Posted by Thiruvadinathan A in GRC evaluation

Thiruvadinathan A

Hope some of these questions would help if you are or when you would be evaluating GRC solutions:


Subscribe via Email

 Your Email:

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps ATM Skimming Audit Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches BS 25999 burglar burglary Business Continuity BYOD change management cheating children pictures Cloud Cloud Security Cobit collaboration Community discussion Compliance computer failure Consumer IT Tips contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud Cross-Device Security Cyber gangs cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersecurity cyberwise data Data Backup Data Breaches data security Data Storage DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport EMV Endpoint Security entity theft Epsilon ERM ESI Ethics Events Facebook FCC FCPA FDIC Federal Government FFIEC Financial Crisis firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs Hackers Hackproof Hacktivism holidays home invasion home security Hotspot HP IAM iCloud id ID Theft Identity theft Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety iOS app iovation IP address iphone iPhone security ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger laptop security Litigation Malware marathon mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog Network Security New Years NFC NFC app Online Backup Online Banking online dating online gaming online identity online privacy online safety Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport passwords PCI Performance Management personal data personal device Personal Security pheasting phishing Policy predator Privacy Prize Draw QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media social network Social Security SOX spammers spokesman Spyware SSDs Standards strangers Strategy tablets tax scams Tech tech support technology Threat Management Tokenization TQM Twitter typosquatting Virus VPN wallet web Webcast Q&A Wi-Fi WIFI WiFi password wireless
Banner