HackDig : Dig high-quality web security articles for hacker

PSD2 – Mandatory Account Access for Third Party Providers

On September 14th the final deadline of complying with the new Payment Service Directive PSD2 will be reached. Among other things, this directive will bring quite a few technical challenges for credit institutions. These include new requirements on two-factor authentication and API access for third parties. In this blog post we will give a short overview of
Publish At:2019-09-19 17:15 | Read:155 | Comments:0 | Tags:Misc banking finance web

Expert discovered online data belonging to the trading firm AMP

Security expert Chris Vickery reported a data breach at online trading firm AMP that exposed customer credit reports, and Social Security numbers. The popular security expert Chris Vickery has discovered a new data breach that affected the AMP online trading firm that exposed thousands of files, including credit reports, passport scans, and customer chat log
Publish At:2017-04-29 09:30 | Read:3268 | Comments:0 | Tags:Breaking News Data Breach AMP data breach data leak Finance

Study Finds Finance, HR Staff Pose Biggest Security Risks to the Enterprise

According to recent research, employees in the finance and human resources departments are seen as the mostly likely to cause a data breach.The study, which polled more than 500 information technology decision makers and 4,000 employees in the US, UK, Germany and Australia, found that nearly half of respondents (46%) believe finance departments pose the bigg
Publish At:2015-09-04 09:00 | Read:2696 | Comments:0 | Tags:Latest Security News data breach employees finance human res

Banks balance security and workflow when encrypting in the cloud

When financial institutions store data in the cloud, they use different kinds of encryption depending on security and workflow requirements, according to a new report from CipherCloud.Of 50 major global financial institutions studied, 40 percent use tokenization for highly sensitive personally identifiable information, 15 percent for less sensitive finance d
Publish At:2015-07-31 19:00 | Read:2197 | Comments:0 | Tags:Encryption Cloud Security Security Data Protection Finance C

The Upload: Your tech news briefing for Thursday, July 2

Want an IPv4 address? Get in lineCould IPv6’s day be near? The stockpile of unused IPv4 addresses in North America has fallen so low that there’s now a waiting list. On Wednesday, for the first time, the American Registry for Internet Numbers (ARIN) had to tell an applicant for new Internet addresses to wait. ARIN simply didn’t have any blocks of addresses b
Publish At:2015-07-02 21:05 | Read:3487 | Comments:0 | Tags:Internet Networking Hardware Data Center Finance Business Se

Don't look now, but ATMs are about to get a cloud makeover

Automated teller machines have been around for decades, but surprisingly few changes have been made to the technologies that run them. That’s about to change.NCR on Wednesday rolled out new software that will transform ATMs to use the cloud with Android and a thin-client model of computing. The result, it says, will be a big boost in security as well as dram
Publish At:2015-04-16 03:50 | Read:2935 | Comments:0 | Tags:Cloud Computing Data Center Finance Business Android iOS Ope

Insider Theft affects a tenth of Morgan Stanley Wealth Management Clients

Insider theft at Morgan Stanley affected nearly the ten percent of the company’s wealth management clients, the company officially confirmed the incident. The financial services company Morgan Stanley has confirmed a partial client data leak, the incident was confirmed by the firm in a statement published on its website.
Publish At:2015-01-07 17:35 | Read:3536 | Comments:0 | Tags:Digital ID Security Data theft Finance Identity Theft Inside

Scammers pose as company execs in wire transfer spam campaign

Symantec has recently seen a spam campaign involving fake wire transfer request emails. While this technique is not new, and has had some coverage in the press this year, we have seen an increase in this type of spam recently.The purpose of this type of email is very simple—to get the recipient to process a payment for non-existent goods or servi
Publish At:2014-10-29 12:50 | Read:2906 | Comments:0 | Tags:Security Security Response Email Security.cloud Endpoint Pro

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud