Security
Corporate Phone Lockdown Links
Hi, I’m looking at some of the techniques used to lockdown the Iphone, Samsung, Sony…
Secure Application Development links
Hi, I have been putting some secure application development documents together recently and have found…
EFT Syetms and Device Considerations
EFT devices and systems differ depending on hardware vendor, country and bank / payment aggregator.…
Internet Banking Security Assessment Considerations
I was asked some time ago to provide a list of things which may be…
Mobile Banking Security and Risk Assessment Considerations
When considering Mobile Banking security and the associated risks, an assessment approach depends greatly on…
DNS Hack Needs Patching – Serious Problem
Deficiencies in the DNS protocol and common DNS implementations facilitate DNS cache poisoning attacks.
Breaking VISA PIN
Below is an article I found recently. This one of the most comprehensive descriptions of…
Financial Transaction Processing
I have been recently working inside one of the larger Banks in Australia. Through this…
Contactless credit cards with RFID are easily hacked
A blog posting on BoingBoing provides further discussion as to the inappropriate deployment and of…
E-Commerce Glossary
Acquiring Institution The Financial Institution which holds the Merchant Account partaking in a financial transaction,…