Recently in e-Crime Category

Will 2012 be the Year that convergence finally happens?

| No Comments | No TrackBacks
| More

The rise of the smart-phone as the global social networking and on-line browsing device of choice has expedited the convergence  of fixed and mobile communications into "ubiquitous broadband" - even in the UK (which went from leader to laggard during the dead-end decade of local loop unbundling). Hence the driving force behind deals which upstage BDUK Broadband policy like that of O2 and Kensington and Westminster  in much that same way that BSkyB upstaged IBA Satellite policy, two decades ago.   

Meanwhile the fragmentation of debate over privacy, surveillance, on-line safety and cyberwarfare continues to complicate the spread of cost-effective information security by design - as opposed to coating that which is inherently insecure with layers of expensive and ineffectual scareware. Will that change as more businesses realise that using the identity chips already embedded in PCs and mobile phones enables identification of the physical device with which they are communicating? The routines are not totally spoof-proof (nothing ever is), but they do enable better, faster, less obtrusive security at lower cost. They also restrict anonymity to those willing to pay for the privilege. I look forward to seeing a converged debate flushing out the hidden agendas of those who wish to see this happen, those who do not, those who wish use all to be uniquely identifiable and those who wish to have multiple on-line personas with different attributes which they can manage separately.  

Why rational users prefer cheap dancing pigs to expensive security snake oil

| No Comments | No TrackBacks
| More

I have spent much of the last month listening to security scare stories from consultants and vendors bidding for attention and budgets. Many of the activities for which they are seeking support appear worse than useless. They distract attention from that which could and should be done to cut costs, improve service and win new business by removing vulnerabilities rather than adding new layers of sticking plaster over festering wounds. 

From Wild West to Western Front : the evolution of Cybersecurity

| No Comments | No TrackBacks
| More

"The Internet used to be compared to the WIld West, the lawless frontier; now it is more like the Western Front, a massive, unrestricted battlefield. Geopolitics is putting your data in the firing line." So concludes an article by Allan Dyer of Yui Kee Computing in the IMIS Journal. On Thursday, at the ISSA UK Chapter and I heard several presentations on what is currently happening (and what is expected to happen). One summarised a PWC study report. Another summarised the report of an ISSA Advisory Board brainstorming. Until yesterday I would have said they were both excellent. I took part in both the PWC study and the ISSA brainstorming. Then I read Allan's article. It reminded me that we in the West are at the Far End of the world from where the future is being forged. [double entendre intended].

 

Why consumers give up on cybersecurity

| No Comments | No TrackBacks
| More

I am currently attending a slew of meetings on Cybersecurity at which experts preach to each other. On monday I am due to chair a meeting skills. On November 15th the Get Safe On-line Summit will have the most powerful line-up of speakers in years. Government is taking the issues seriously - but are the security experts ready to be taken seriously. I will use a simple example: What should you actually do when you receive an e-mail asking you to renew your anti-virus software or one telling you that your automatic update has failed because your card details have not been recognised?

 

Is poor service forcing consumers off-line?

| No Comments | No TrackBacks
| More
Virgin, Tesco and Metro are all planning to open branch-based banking operations and the Post Office is planning, once again, to re-open its banking services. Why? The Financial Services Club Blog carries an interesting analysis but misses the point. There is serious money to be made by using new technology to slash the cost of "traditional" over-the-counter services - provided you have access to an existing branch network - especially one that is self-funding.  

The Objectives of the US Cybersecurity Czar

| No Comments | No TrackBacks
| More
Howard Schmidt has been e-mailing his many contacts lining up feedback routines and drawing attention to the White House Blog entry on his objectives. His UK equivalent is the Office of Cybersecurity. Just after the e-mail from Howard I received a "security alert", from a bank with whom I have no dealings, inviting me to click on their (oh so slightly different) Get Safe Online logo - as well as on the link to "fix" my account.       

How safe are you off-line anyway?

| No Comments | No TrackBacks
| More

We tend to forget that the e-mails telling us we have won the Microsoft Lottery and phone calls telling us we have won a Caribbean cruise are merely the latest variations on scams which date back hundreds of years. Just before Christmas the National Fraud Authority published an extensive research report on the experiences of fraud victims. It makes chilling reading, to complement the weather outside if you are snowed in today. You will find the "story" in more succinct (equally bleak) form on www.thinkjessica.com (supported by SOCA and the NFA).

Phished while waiting for the delivery of your on-line orders?

| No Comments | No TrackBacks
| More

The holiday season is busy for everyone including criminals. Here are some of the holiday attacks that E-Victims.Org have been seeing:

 

Is today make or break for UK trusted on-line trading?

| 2 Comments | No TrackBacks
| More
Today is the annual peak of on-line transactions in the run-up to Christmas. Will consumers stay away because they are scared of being ripped off? Will they once again flock on-line for their annual binge? If so, will the proportion of fraud be such as to trigger a backlash in the New Year?

The fight for Cybersecurity alias Cyberwarfare Budgets

| No Comments | No TrackBacks
| More
David Lacey's blog on The New Art of Warfare gave me pause for thought. I looked at it in the context of the proliferation of groups looking at cybersecurity, the Interception Modernisation Programme, scare stories about the Critical National Infrastructure and the Chinese People's Cybermilitia. Then the penny dropped.

About this Archive

This page is an archive of recent entries in the e-Crime category.

Consultations is the previous category.

eCommerce is the next category.

Find recent content on the main index or look in the archives to find all content.

Archives

Recent Comments

 

-- Advertisement --