Blog

Hand Vein Authentication Bolsters Sarbanes-Oxley Compliance

Notorious frauds at many Global Fortune Companies highlight the importance of internal controls. In spite of the Sarbanes-Oxley Act of 2002 (SOX or SOA), external auditors continue to disclose large numbers of material weaknesses in internal control systems of many public companies. In some cases, external public accounting firms have reported these material weaknesses for …

The Bloomberg team that uncovered the Latin American election hacker

Andrés Sepúlveda was just a hacker, jailed in Colombia for carrying out dirty tricks in presidential elections — tricks involving malicious software, espionage and violation of personal data. But, according to a Bloomberg investigation, he led sophisticated efforts costing hundreds of thousands of dollars that even included aiding in the election of Mexican President Enrique Peña Nieto. And that’s …

Hackers Say NSA Snooped Into Banks in Palestinian Authority and Wider Middle East

The group known as Shadow Brokers says releases programs used by the U.S. security agency, including some used to hack into the Swift system for money transfers. The U.S. National Security Agency spied on money transfers through the Swift interbank network, according to a hacker group that says its data dump is meant to protest …

Fraudsters need just three details to steal your identity – and most of it can be found on Facebook

Fraudsters need just three key bits of information to steal your identity and access your accounts, take out loans, credit cards, mobile phones in your name. All it takes is a name, date of birth and address – and most of this can be found on social media profiles, such as Facebook. And if your settings are …

Microsoft says U.S. foreign intelligence surveillance requests more than doubled

WASHINGTON (Reuters) – Microsoft Corp said on Thursday it had received at least a thousand surveillance requests from the U.S. government that sought user content for foreign intelligence purposes during the first half of 2016. The amount, shared in Microsoft’s biannual transparency report, was more than double what the company said it received under the …

HACKING THE AETHER: HOW DATA CROSSES THE AIR-GAP

It is incredibly interesting how many parts of a computer system are capable of leaking data in ways that is hard to imagine. Part of securing highly sensitive locations involves securing the computers and networks used in those facilities in order to prevent this. These IT security policies and practices have been evolving and tightening …

Hacker sets off emergency alarms, frightening Dallas residents

Dallas city officials said Saturday that a hacker is to blame for setting off all the city’s 156 emergency outdoor sirens, which wailed for an hour and half overnight. Rocky Vaz, director of the city’s Office of Emergency Management, said engineers determined an unidentified hacker somewhere in the Dallas area was responsible, but has not been tracked down. …

That Fingerprint Sensor on Your Phone Is Not as Safe as You Think

Fingerprint sensors have turned modern smartphones into miracles of convenience. A touch of a finger unlocks the phone — no password required. With services like Apple Pay or Android Pay, a fingerprint can buy a bag of groceries, a new laptop or even a $1 million vintage Aston Martin. And pressing a finger inside a …

China uses facial recognition software to crack down on toilet paper theft

Many public restrooms in China are not equipped with toilet paper and instead rely on patrons to supply their own. But until recently, the bathrooms of Beijing’s Temple of Heaven, a complex of religious buildings constructed in 1420, carried rolls upon rolls of the white stuff. Unfortunately, toilet paper thieves, who had long frustrated Beijing authorities, ruined the complex’s bounty for …

How AIG’s Cyber Security Gamble Could Pay Off

American International Group (AIG) has recently begun offering personal cyber security insurance plans to individuals. The company appears to be riding a wave of individuals’ fears about losing online data or having their bank accounts emptied, and should find success with wealthier customers who have a lot to lose. But it remains to be seen …