Category Archives: Information Security

Are you aware of the new business models which are now available on the web?

After a stimulating discussion with some work colleagues last night, I was once again reminded that there is always much more happening on the web than one can keep up with. While the media focus on teenagers spending a large … Continue reading

Posted in Information Security, IT | Tagged | 1 Comment

Fraud Numbers in Australia. Are we secure?

“UPDATE: Arno Brok, who works with met at Accenture, has just sent me this interesting article about a new credit card that is being developed and tested in Australia. Thanks Arno!” The Australian Bureau of Statistics published in June this … Continue reading

Posted in Information Security | Tagged | Leave a comment

SaaS (Software as Service) Risks

There’s been a lot of discussion recently around Software as a Service, or SaaS. Although some may say it is new concept, SaaS has been around for some time – since 2000, I believe – and used to be referred … Continue reading

Posted in Information Security | Tagged | 2 Comments

Problem solved! No more foil needed in your pocket!

When I sent an e-mail to friends and colleagues about reactivating the blog, some of them wrote to me asking about privacy and RFID. While getting up to date on the topic I found something amusing. The “Think Geek” website … Continue reading

Posted in Information Security | Tagged , , , , | 1 Comment

SANS Conference in Sydney!!!

Hey guys, SANS is comming to Sydney. It is a great opportunity to get good training with top instructors and cutting edge technology! I have attended to two conferences in Europe and highly recommend. If you want more info you … Continue reading

Posted in Information Security | Tagged , | Leave a comment

How easy is to break WEP?

I would like to start this post with an apology. It’s been a little more than a month without any post or updates. This is due to the fact that I have just started a new job at Ernst & … Continue reading

Posted in Information Security | Tagged , , , | 32 Comments

RFID Privacy Problems! Why don’t companies do resonable security?

I wonder if you ever heard about RFID. It is a technology in which data can de transferred wirelessly from a tag or a transponder, allowing passive or active identification of a device. The amount of possible implementations of the … Continue reading

Posted in Information Security | Tagged , | Leave a comment

Is 3D Secure the solution for on-line card payments? Part II

Hiya, I have received some feedback about the post on card payment solutions and one of the things it is important to say is that CAM and CVM are just components of the solution that secures POS (Point of Sale) … Continue reading

Posted in Information Security | Tagged , , | Leave a comment

Man fools ATM probably using default system password

By the way, as I just wrote about cards and payment systems, I thought that the news below could be relevant. I have just read in Bruce Schneier’s Cryptogram that a man used system codes, probably taken from an ATM … Continue reading

Posted in Information Security | Tagged , , | 4 Comments

Is CHIP + PIN the Solution for Fraud in Card Payments?

Hi all, This first post is about something I have been researching since last may: credit card transactions. As many of you probably know, there are a lot of vulnerabilities in the widely used stripe card system that is deployed … Continue reading

Posted in Information Security | Tagged , , | 33 Comments