Collected Postings

2023- Collected Postings, 2016-2022 Collected Postings, 2013-2016 Collected Postings, 2011-2012 Collected Postings, 2009-2010 Collected Postings, 2007-2008 Collected Postings, 2005-2006 Collected Postings, 2003-2004 Collected Postings, 2001-2002 Collected Postings, 1993-2000 Collected Postings, Internet History Postings, Old EMAIL Index

three factor authentcation
Assurance
some mention of EU FINREAD
Risk, Fraud, Exploits, Threats, Vulnerabilities
Account Number Harvesting
postings mentioning MITM attacks
Buffer overflows, overruns, exploits
Secrets and Account numbers
Counterfeit YES CARDS
Naked Transaction Metaphor

Risk, Fraud, Exploits, Threats, Vulnerabilities

Identify theft posts, LIBOR fraud posts, Madoff fraud posts, Money Laundering posts Tax Evasion posts

2024e.html#123 big, fast, etc, was is Vax addressing sane today
2024e.html#120 big, fast, etc, was is Vax addressing sane today
2024d.html#75 Joe Biden Kicked Off the Encryption Wars
2023g.html#9 Viruses & Exploits
2023d.html#77 Private Equity Firms Increasingly Held Responsible for Healthcare Fraud
2023d.html#50 UNMITIGATED RISK
2023d.html#48 UNMITIGATED RISK
2023c.html#4 Impunity and Capitalism: The Afterlives of European Financial Crises, 1690-1830
2023c.html#2 The Bunker: What the Leak Really Reveals
2023b.html#94 After the storm, hopefully
2023b.html#94 After the storm, hopefully
2023b.html#93 Corporate Greed Is a Root Cause of Rail Disasters Around the World
2023b.html#42 Silicon Valley Bank collapses after failing to raise capital
2023b.html#40 Silicon Valley Bank collapses after failing to raise capital
2023b.html#33 Silicon Valley Bank collapses after failing to raise capital
2023.html#56 Classified Material and Security
2022h.html#75 Researchers found security pitfalls in IBM's cloud infrastructure
2022h.html#9 US Banks Reported $1 Billion in 2021 Ransomware Payments
2022b.html#108 Attackers exploit fundamental flaw in the web's security to steal $2 million in cryptocurrency
2022b.html#47 Security
2022b.html#14 Arbitration Antics: Warren, Porter, Press Regulator to Explain Yet Another Way Wells Fargo Found to Game the System
2021h.html#74 "Safe" Internet Payment Products
2021g.html#84 EMV migration compliance for banking from IBM (1997)
2021e.html#96 The Full Story of the Stunning RSA Hack Can Finally Be Told
2021e.html#92 Anti-virus
2021e.html#64 Hacking, Exploits and Vulnerabilities
2021e.html#60 Hacking, Exploits and Vulnerabilities
2021e.html#56 Hacking, Exploits and Vulnerabilities
2021e.html#52 How America Became the Money Laundering Capital of the World
2021d.html#64 Money Laundering
2021c.html#45 McAfee antivirus software creator charged with cheating investors
2021c.html#30 The Supreme Court Finally Lets the Light Shine on Trump
2021c.html#4 Microsoft president asks Congress to force private-sector orgs to publicly admit when they've been hacked
2021b.html#69 Fumble Finger Distribution list
2021.html#43 Dialup Online Banking
2020.html#19 What is a mainframe?
2019e.html#157 American Cities Are Becoming Shell Companies for the Rich
2019d.html#113 Internet and Business Critical Dataprocessing
2019d.html#56 Disabled by default: Microsoft ups the ante in its war against VBScript on Internet Explorer
2019c.html#10 mainframe hacking "success stories"?
2019b.html#70 Russia Hacked Clinton's Computers Five Hours After Trump's Call
2018f.html#105 Is LINUX the inheritor of the Earth?
2018f.html#36 Banking via home computers/internet is a disaster for the computer world
2018f.html#32 Banking via home computers/internet is a disaster for the computer world
2018e.html#52 The ABCs of Hacking a Voting Machine
2018e.html#48 Multimillion-dollar award against PwC is window into typically secret auditor settlements
2018e.html#40 Yar, thar she blows: Corp-cash-stealing email whaling attacks now a $12.5bn industry
2018d.html#56 Mexico Foiled a $110 Million Bank Heist, Then Kept It a Secret
2018c.html#9 Graph database on z/OS?
2018b.html#95 The Return Of Haim Bodek - HFT's First Whistleblower
2018b.html#58 Computer science hot major in college (article)
2017i.html#27 Equifax executives out after massive hack
2017f.html#2 Gotcha, Tatcha! Thieves hide in servers to hoover up victims' bank card numbers mid-order
2017f.html#1 Time to sack the chief of computing in the NHS?
2017e.html#93 Ransomware on Mainframe application ?
2017b.html#21 Pre-internet email and usenet (was Re: How to choose the best news server for this newsgroup in 40tude Dialog?)
2017.html#40 The economics of corporate crime
2017.html#34 If economists want to be trusted again, they should learn to tell jokes
2017.html#33 Moody's Agrees to Settle Financial Crisis-Era Claims for $864 Million
2017.html#25 How the U.S. Hobbled Its Hacking Case Against Russia and Enabled Truthers
2016g.html#65 In the Trump Era, Leaking and Whistleblowing Are More Urgent, and More Noble, Than Ever
2016g.html#36 Whitehouse EMAIL
2016e.html#109 Why Aren't Any Bankers in Prison for Causing the Financial Crisis?
2016d.html#19 Banking; The Book That Will Save Banking From Itself
2016d.html#17 Cybercrime
2016c.html#84 Wells Fargo "Admits Deceiving" U.S. Government, Pays Record $1.2 Billion Settlement
2016c.html#58 Qbasic
2016b.html#38 Ransomware
2016b.html#37 Ransomware
2016.html#102 Thanks Obama
2016.html#8 "Too Big To Fail"
2016.html#8 "Too Big To Fail"
2015h.html#80 Corruption Is as Bad in the US as in Developing Countries
2015h.html#31 Talk of Criminally Prosecuting Corporations Up, Actual Prosecutions Down
2015h.html#29 Ernst & Young Confronts Madoff's Specter in Trial Over Audits
2015g.html#66 Michael Hudson's New Book: Wall Street Parasites Have Devoured Their Hosts -- Your Retirement Plan and the U.S. Economy
2015g.html#64 Intel: Criminals getting better at data exfiltration
2015f.html#38 LIBOR: History's Largest Financial Crime that the WSJ and NYT Would Like You to Forget
2015f.html#18 Credit card fraud solution coming to America...finally
2015f.html#17 Credit card fraud solution coming to America...finally
2015e.html#70 Encryption "would not have helped" at OPM, says DHS official
2015e.html#61 Fed agency blames giant hack on 'neglected' security system
2015e.html#58 Time to Fire Mary Jo White: SEC Covers Up for Bank Capital Accounting Scam Promoted by Her Former Firm, Debevoise
2015e.html#50 old amiga HVAC
2015e.html#42 The real story of how the Internet became so vulnerable
2015e.html#16 The real story of how the Internet became so vulnerable
2015e.html#12 The real story of how the Internet became so vulnerable
2015d.html#79 Greedy Banks Nailed With $5 BILLION+ Fine For Fraud And Corruption
2015d.html#78 Greedy Banks Nailed With $5 BILLION+ Fine For Fraud And Corruption
2015c.html#99 Cyber Threat Sharing is Great in Theory, But Tough in Practice
2015b.html#21 Hackers stole from 100 banks and rigged ATMs to spew cash
2015b.html#20 $2 Billion City Of Tampa Pension Story Major Media Missed
2015.html#24 Forget the McDonnells. We're ignoring bigger, more pernicious corruption right under our noses
2015.html#23 Young's Black Hat 2013 talk - was mainframe tribute song
2015.html#15 Banking Culture Encourages Dishonesty
2014m.html#177 LEO
2014m.html#124 Commissioner Adrian Leppard calls for legislation to compel the banking system to report fraud
2014m.html#92 The 10 Biggest Bank Card Hacks
2014k.html#44 LA Times commentary: roll out "smart" credit cards to deter fraud
2014j.html#106 only sometimes From looms to computers to looms
2014i.html#45 Sale receipt--obligatory?
2014i.html#42 Sale receipt--obligatory?
2014i.html#15 Instead of focusing on big fines, law enforcement should seek long prison terms for the responsible executives
2014i.html#14 Instead of focusing on big fines, law enforcement should seek long prison terms for the responsible executives
2014i.html#10 Instead of focusing on big fines, law enforcement should seek long prison terms for the responsible executives
2014h.html#113 Follow the Money: How Finance Keeps the Whip Hand
2014h.html#112 In Banking World, Fraud Is an Epidemic
2014h.html#111 Maine Supreme Court Hands Major Defeat to MERS Mortgage Registry
2014h.html#97 Laundering Illegal Money? There's Ultraluxury New York Real Estate For That
2014h.html#96 'Synthetic' ID Theft Emerging As Fastest-Growing Type Of Consumer Fraud
2014h.html#64 Dark Pool Greed Drove Barclays to Lie to Clients, N.Y. Says
2014h.html#63 European bank 'hit by sophisticated cyber-thefts
2014g.html#44 SEC Official Describes Widespread Lawbreaking and Material Weakness in Controls in Private Equity Industry
2014f.html#91 Open Books Stop Self-Dealing and Corruption
2014f.html#77 SEC Official Describes Widespread Lawbreaking and Material Weakness in Controls in Private Equity Industry
2014f.html#71 Stopping Cybersecurity Breaches Means Rethinking Consequences
2014f.html#66 GAO and Wall Street Journal Whitewash Huge Criminal Bank Frauds
2014f.html#60 GAO and Wall Street Journal Whitewash Huge Criminal Bank Frauds
2014f.html#13 Before the Internet: The golden age of online services
2014f.html#3 Three Expensive Milliseconds
2014e.html#72 Three Expensive Milliseconds
2014e.html#33 As US card fraud rises, firms increase security spending
2014e.html#32 The dark side of digital banking
2014e.html#31 U.S. States Investigating Breach at Experian
2014e.html#30 Zeus malware found with valid digital certificate
2014e.html#18 FBI Investigates High-Speed Trading
2014e.html#6 Credit Card Breach at California DMV Provides Yet Another Warning of Cyber Insecurities
2014e.html#5 Economic Network of Organized Crime Revealed
2014d.html#64 Wells Fargo made up on-demand foreclosure papers plan: court filing charges
2014d.html#53 FDIC Sues 16 Big Banks That Set Key Rate
2014d.html#7 N.Y. Barclays Libor Traders Said to Face U.K. Charges
2014d.html#3 Let's Face It--It's the Cyber Era and We're Cyber Dumb
2014c.html#98 Credit Suisse 'cloak-and-dagger' tactics cost US taxpayers billions
2014c.html#25 Royal Pardon For Turin
2014c.html#16 Precious Metals Manipulation Worse Than Libor Scandal, German Regulator Says
2014b.html#69 Why is the US a decade behind Europe on 'chip and pin' cards?
2014b.html#19 Royal Pardon For Turing
2014.html#87 Royal Pardon For Turing
2014.html#80 Washington Post on Target store data thefts
2014.html#65 Washington Post on Target store data thefts
2014.html#57 Washington Post on Target store data thefts
2014.html#53 Why the Target Breach Might Be Even Bigger: Big Data Means Big Breach
2014.html#34 The invincible JP Morgan
2013o.html#79 Would Target cybersecurity breach occur with a digital ID system?
2013o.html#70 Who broke the law, Snowden or the NSA?
2013o.html#60 Target Offers Free Credit Monitoring Following Security Breach
2013o.html#59 Target breach likely involved inside knowledge, experts say
2013o.html#58 US a laggard in adopting more secure credit cards
2013o.html#35 Criminal Action Is Expected for JPMorgan in Madoff Case
2013o.html#34 The Federal Reserve Lost $9 Trillion? What Liars! They gave that money away!
2013o.html#33 60 Minutes Puff Piece Claims NSA Saved U.S. From Cyberterrorism
2013o.html#17 Book-Cooking Bank Gets to Keep Cooked Books
2013n.html#89 Another Batch of Wall Street Villains Freed on Technicality
2013n.html#53 'Free Unix!': The world-changing proclamationmade30yearsagotoday
2013n.html#12 How the IETF plans to protect the web from NSA snooping
2013m.html#97 Confirmed: the US DoJ will not put the bankers in jail, no matter how deep the fraud
2013m.html#92 HSBC exposed in massive data leak in Belgium
2013m.html#77 OCC Replies to Elizabeth Warren Reveal Extent of Regulatory Capture on Derivatives
2013m.html#76 The Scholars Who Shill for Wall Street
2013m.html#2 UK NHS £10bn project failure
2013l.html#57 What the Orgy of "Lehman Five Years On" Stories Missed
2013l.html#48 Ex-Wall Street chieftains living large in post-meltdown world
2013l.html#17 What Makes a Tax System Bizarre?
2013k.html#86 What Makes a Tax System Bizarre?
2013k.html#68 Steve B sees what investors think
2013k.html#64 What Makes a Tax System Bizarre?
2013k.html#47 The Incredible Con the Banksters Pulled on the FBI
2013k.html#46 Why DOJ Deemed Bank Execs Too Big To Jail
2013k.html#45 What Makes a Tax System Bizarre?
2013k.html#43 What Makes a Tax System Bizarre?
2013k.html#41 What Makes a Tax System Bizarre?
2013k.html#37 Do You Want Better Security? Eliminate System Administrators!
2013k.html#36 The Incredible Con the Banksters Pulled on the FBI
2013k.html#34 What Makes a Tax System Bizarre?
2013k.html#32 What Makes a Tax System Bizarre?
2013k.html#29 The agency problem and how to create a criminogenic environment
2013k.html#26 The agency problem and how to create a criminogenic environment
2013k.html#14 What Makes Infrastructure investment not bizarre
2013k.html#13 Justice Dept. Sues Bank of America Over Mortgage Securities
2013k.html#9 Why DOJ Deemed Bank Execs Too Big To Jail
2013j.html#90 copyright protection/Doug Englebart
2013j.html#89 FBI Finds Holes in System Protecting Economic Data
2013j.html#82 copyright protection/Doug Englebart
2013j.html#77 Why DOJ Deemed Bank Execs Too Big To Jail
2013j.html#76 Barclays, Traders Fined $487.9 Million by U.S. Regulator
2013j.html#75 The Most dishonest bankers walk away with the most monety
2013j.html#73 Why DOJ Deemed Bank Execs Too Big To Jail
2013j.html#69 OSI: The Internet That Wasn't
2013j.html#52 U.S. agents 'got lucky' pursuing accused Russia master hackers
2013j.html#47 Feds indict indentity theft ring
2013j.html#46 Feds indict indentity theft ring
2013j.html#45 U.S. agents 'got lucky' pursuing accused Russia master hackers
2013j.html#26 What Makes an Architecture Bizarre?
2013j.html#22 What Makes a Tax System Bizarre?
2013j.html#20 What Makes a Tax System Bizarre?
2013j.html#18 What Makes an Architecture Bizarre?
2013j.html#14 Barclays, Traders Fined $487.9 Million by U.S. Regulator
2013j.html#6 Barclays, Traders Fined $487.9 Million by U.S. Regulator
2013j.html#5 Botnets Unearthed -- The ZEUS BOT
2013i.html#79 What Makes an Architecture Bizarre?
2013i.html#76 The failure of cyber defence - the mindset is against it
2013i.html#41 Is newer technology always better? It almost is. Exceptions?
2013i.html#35 Some Hard Numbers On The Western Banking System
2013i.html#12 Corrupted credit ratings: Standard & Poor's lawsuit and the evidence
2013i.html#10 EBCDIC and the P-Bit
2013h.html#58 Traders Said to Rig Currency Rates to Profit Off Clients
2013h.html#52 "Highway Patrol" back on TV
2013h.html#50 OT: "Highway Patrol" back on TV
2013h.html#49 OT: "Highway Patrol" back on TV
2013h.html#48 OT: "Highway Patrol" back on TV
2013h.html#46 OT: "Highway Patrol" back on TV
2013h.html#25 'Big four' accountants 'use knowledge of Treasury to help rich avoid tax'
2013h.html#23 Check out Moto X: Motorola reveals plans for ink and even pills to replace AL
2013h.html#20 How about the old mainframe error messages that actually give you a clue about what's broken
2013h.html#12 Why Didn't the SEC Catch Madoff? It Might Have Been Policy Not To
2013g.html#90 Experts: Network security deteriorating, privacy a lost cause
2013g.html#86 How Wall Street Defanged Dodd-Frank
2013g.html#57 banking fraud; regulation,bridges,streams
2013g.html#55 banking fraud; regulation,bridges,streams
2013g.html#38 regulation,bridges,streams
2013g.html#37 regulation,bridges,streams
2013f.html#47 Pirate Bay co-founder charged with hacking IBM mainframes, stealing money
2013f.html#8 What Makes an Architecture Bizarre?
2013e.html#95 Secrecy for Sale: Inside the Global Offshore Money Maze
2013e.html#94 KPMG quits as Skechers and Herbalife auditor amid insider trading allegations
2013e.html#89 What Makes an Architecture Bizarre?
2013e.html#83 What Makes an Architecture Bizarre?
2013e.html#49 What Makes bank regulation and insurance Bizarre?
2013e.html#27 Secrecy for Sale: Inside the Global Offshore Money Maze
2013e.html#25 What Makes bank regulation and insurance Bizarre?
2013d.html#42 What Makes an Architecture Bizarre?
2013d.html#41 Computer Simulations Reveal Benefits of Random Investment Strategies Over Traditional Ones
2013d.html#35 Ex-Bailout Watchdog: JPMorgan's Actions "Entirely Consistent With Fraud"
2013d.html#25 Senator Sherrod Brown Drops a Bombshell in Mary Jo White's Hearing
2013d.html#4 Live-Blogging Senate Hearing Tomorrow, When J.P. Morgan Chase Will Be Torn a New One
2013c.html#85 Digital Certificates Hide Malware
2013c.html#82 Retailer Sues Visa Over $13 Million "Fine" for Being Hacked
2013c.html#64 NBC's website hacked with malware
2013c.html#58 More Whistleblower Leaks on Foreclosure Settlement Show Both Suppression of Evidence and Gross Incompetence
2013c.html#55 How to Cut Megabanks Down to Size
2013c.html#34 The United States is leaking 1TB of data daily to foreign countries
2013c.html#26 How to Cut Megabanks Down to Size
2013c.html#7 LIBOR: Viewing the Biggest Financial Crime in History
2013c.html#6 More Whistleblower Leaks on Foreclosure Settlement Show Both Suppression of Evidence and Gross Incompetence
2013c.html#5 How to Cut Megabanks Down to Size
2013c.html#4 You Call This an Army? The Terrifying Shortage of U.S. Cyberwarriors
2013c.html#2 Legal Lessons from PATCO Fraud Case
2013b.html#69 NBC's website hacked with malware
2013b.html#67 NBC's website hacked with malware
2013b.html#64 More Whistleblower Leaks on Foreclosure Settlement Show Both Suppression of Evidence and Gross Incompetence
2013b.html#63 NBC's website hacked with malware
2013b.html#62 America Is Basically Helpless Against The Chinese Hackers
2013b.html#30 Email Trails Show Bankers Behaving Badly
2013b.html#29 Destructive Destruction? An Ecological Study of High Frequency Trading
2013b.html#16 More Whistleblower Leaks on Foreclosure Settlement Show Both Suppression of Evidence and Gross Incompetence
2013b.html#1 Libor Lies Revealed in Rigging of $300 Trillion Benchmark
2013.html#68 Choice of Mary Jo White to Head SEC Puts Fox In Charge of Hen House
2013.html#66 How to Cut Megabanks Down to Size
2013.html#57 How to Cut Megabanks Down to Size
2013.html#49 Insider Fraud: What to Monitor
2013.html#37 Kaspersky identifies 'Red October' cyberespionage network
2013.html#36 JPMorgan Chase slammed by regulators for control failings after botched derivatives bet
2013.html#35 Does the UK Government Really Want us to Report Fraud?
2013.html#34 How Bankers Help Drug Traffickers and Terrorists
2013.html#23 AIG may join bailout lawsuit against U.S. government
2013.html#20 The Big Fail
2013.html#4 HSBC's Settlement Leaves Us In A Scary Place
2012p.html#62 Search Google, 1960:s-style
2012p.html#54 UBS Faces Potential LIBOR Fine Of $1 Billion -- Twice What Barclays Paid
2012p.html#51 Search Google, 1960:s-style
2012p.html#49 Regulator Tells Banks to Share Cyber Attack Information
2012p.html#39 UBS Faces Potential LIBOR Fine Of $1 Billion -- Twice What Barclays Paid
2012p.html#38 There can be no System Security without System Integrity
2012p.html#37 Some interesting post about the importance of Security and what it means for the Mainframe
2012p.html#28 Some interesting post about the importance of Security and what it means for the Mainframe
2012p.html#24 OCC Confirms that Big Banks are Badly Managed, Lack Adequate Risk Management Controls
2012p.html#20 HSBC, SCB Agree to AML Penalties
2012o.html#73 These Two Charts Show How The Priorities Of US Companies Have Gotten Screwed Up
2012o.html#69 Can Open Source Ratings Break the Ratings Agency Oligopoly?
2012o.html#0 history of Programming language and CPU in relation to each other
2012n.html#77 U.S. banks on high alert against cyberattacks
2012n.html#63 history of Programming language and CPU in relation to each other
2012n.html#34 System/360--50 years--the future?
2012n.html#12 Why Auditors Fail To Detect Frauds?
2012n.html#1 STOP PRESS! An Auditor has been brought to task for a failed bank!
2012m.html#68 General Mills computer
2012m.html#30 General Mills computer
2012m.html#26 Chip and pin 'weakness' exposed by Cambridge researchers
2012m.html#20 Hundreds Of Billions Of Dollars Expected To Be Withdrawn From Swiss Banks Amid Tax Evasion Crackdown
2012m.html#19 Why Auditors Fail To Detect Frauds?
2012m.html#12 Does the IBM System z Mainframe rely on Security by Obscurity or is it Secure by Design
2012l.html#68 Singer Cartons of Punch Cards
2012l.html#43 Judge dismisses BancorpSouth defense in online theft suit
2012l.html#32 Use another browser - Kaspersky follows suit
2012l.html#14 The growing openness of an organization's infrastructure has greatly impacted security landscape
2012l.html#10 Cultural attitudes towards failure
2012k.html#38 Four Signs Your Awesome Investment May Actually Be A Ponzi Scheme
2012k.html#22 Four Signs Your Awesome Investment May Actually Be A Ponzi Scheme
2012k.html#16 Breakdown of the $26 Trillion the Federal Reserve Handed Out to Save Incompetent, but Rich Investors
2012j.html#97 Gordon Crovitz: Who Really Invented the Internet?
2012j.html#94 Gordon Crovitz: Who Really Invented the Internet?
2012j.html#73 Is it time to consider a stand-alone PC for online banking?
2012j.html#67 Protecting Pin Pad Payment
2012j.html#60 Auditors All Fall Down; PFGBest and MF Global Frauds Reveal Weak Watchdogs
2012j.html#59 Bank Sues Customer Over ACH/Wire Fraud
2012j.html#57 Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
2012j.html#50 The Games Played By JP Morgan Chase
2012j.html#49 Naked emperors, holy cows and Libor
2012j.html#47 Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
2012j.html#40 A whistleblower emerges from the shadows
2012j.html#37 Naked emperors, holy cows and Libor
2012j.html#36 UH-OH: $220 Million May Be Missing From Brokerage
2012j.html#35 The Conceptual ATM program
2012j.html#25 This Is The Wall Street Scandal Of All Scandals
2012j.html#18 Monopoly/ Cartons of Punch Cards
2012j.html#15 Naked emperors, holy cows and Libor
2012j.html#8 Federal appeal court raps bank over shoddy online security
2012j.html#4 Interesting News Article
2012j.html#0 Federal appeal court raps bank over shoddy online security
2012i.html#91 Operating System, what is it?
2012i.html#90 Operating System, what is it?
2012i.html#79 Does Two-Factor Authentication Need Fixing?
2012i.html#76 Naked emperors, holy cows and Libor
2012i.html#41 Lawmakers reworked financial portfolios after talks with Fed, Treasury officials
2012i.html#37 Simulated PDP-11 Blinkenlight front panel for SimH
2012i.html#32 Zeus/SpyEye 'Automatic Transfer' Module Masks Online Banking Theft
2012i.html#31 US Senate proposes national data breach notification act
2012i.html#30 US Senate proposes national data breach notification act
2012i.html#18 Zeus/SpyEye 'Automatic Transfer' Module Masks Online Banking Theft
2012i.html#17 Monopoly/ Cartons of Punch Cards
2012i.html#13 Monopoly/ Cartons of Punch Cards
2012g.html#63 SEC: Taking on Big Firms is 'Tempting,' But We Prefer Picking on Little Guys
2012g.html#59 Why Hasn't The Government Prosecuted Anyone For The 2008 Financial recession?
2012g.html#56 Why Hasn't The Government Prosecuted Anyone For The 2008 Financial recession?
2012g.html#53 The secret's out for secure chip design
2012g.html#27 Weak PINs, Habits Increase Risk of Financial Fraud
2012g.html#16 Psychology Of Fraud: Why Good People Do Bad Things
2012g.html#14 Psychology Of Fraud: Why Good People Do Bad Things
2012g.html#10 Accidentally Released - and Incredibly Embarrassing - Documents Show How Goldman et al Engaged in 'Naked Short Selling'
2012g.html#5 What are the implication of the ongoing cyber attacks on critical infrastructure
2012g.html#2 What are the implication of the ongoing cyber attacks on critical infrastructure
2012f.html#75 Fed Report: Mortgage Mess NOT an Inside Job
2012f.html#74 Psychology Of Fraud: Why Good People Do Bad Things
2012f.html#38 UK firms need to 'fess up to security boobs
2012e.html#85 Slide Show: 10 SQL Injection Tools For Database Pwnage
2012e.html#82 Fighting Cyber Crime with Transparency
2012e.html#53 GOLD STANDARD GOOD OR BAD?
2012e.html#37 The $30 billion Social Security hack
2012e.html#32 Visa, MasterCard warn of 'massive' security breach
2012e.html#31 PC industry is heading for more change
2012e.html#30 Senators Who Voted Against Ending Big Oil Tax Breaks Received Millions From Big Oil
2012e.html#29 Visa, MasterCard warn of 'massive' security breach
2012e.html#22 Malicious Software Protection
2012e.html#17 Data theft: Hacktivists 'steal more than criminals'
2012d.html#68 Memory versus processor speed
2012d.html#63 Fans of Threat Modelling reach for their guns ... but can they afford the bullets?
2012d.html#62 Gordon Gekko Says
2012d.html#55 Do you know where all your sensitive data is located?
2012d.html#47 You Don't Need a Cyber Attack to Take Down The North American Power Grid
2012d.html#34 Gordon Gekko Says
2012d.html#8 Time to pull the PIN!
2012c.html#11 The 15 Worst Data Security Breaches of the 21st Century
2012c.html#6 The 15 Worst Data Security Breaches of the 21st Century
2012c.html#4 Bank of America Fined $1 Billion for Mortgage Fraud
2012b.html#96 Infographic: Online payment security
2012b.html#95 Bank of America Fined $1 Billion for Mortgage Fraud
2012b.html#82 Mathematics < Integrity = Financial Fraud
2012b.html#80 U.S. Cybersecurity Debate Risks Leaving Critical Infrastructure in the Dark
2012b.html#71 Password shortcomings
2012b.html#70 Four Sources of Trust, Crypto Not Scaling
2012b.html#69 PKI and SSL - the jaws of trust snap shut
2012b.html#61 Banking malware a growing threat, as new variant of Zeus is detected
2012b.html#54 The New Age Bounty Hunger -- Showdown at the SEC Corral
2012b.html#53 Can America Lead the World's Fight Against Corruption?
2012b.html#3 Why Threat Modelling fails in practice
2012.html#65 Reject gmail
2012.html#9 Anyone sceptically about about Two Factor Authentication?
2012.html#1 The war on terabytes
2011p.html#141 With cloud computing back to old problems as DDos attacks
2011p.html#96 Republicans Propose Bill to Treat Mexican Drug Cartels as 'Terrorist Insurgency'
2011p.html#79 Financial Crimes Bedevil Prosecutors
2011p.html#65 Why (my, all) financial systems fail -- information complexity
2011o.html#59 The lost art of real programming
2011o.html#56 Using Cross-Channel Fraud Detection
2011o.html#54 Speed: Re: Soups
2011o.html#27 Measuring Cyberfraud, the fall rate of sky, and other metrics from the market for Silver Bullets
2011n.html#49 The men who crashed the world
2011n.html#28 Massive SQL injection attack has compromised nearly 200,000 ASP.Net sites
2011n.html#17 Dennis Ritchie
2011n.html#3 Banks Face Ongoing Cyber Threats
2011m.html#57 ISBNs
2011m.html#53 ISBNs
2011m.html#48 ISBNs
2011m.html#48 ISBNs
2011m.html#40 ISBNs
2011m.html#38 ISBNs
2011m.html#33 Deloitte sued for $7.6 billion, accused of missing fraud
2011m.html#23 Benefits of Online Banking
2011l.html#72 Selectric Typewriter--50th Anniversary
2011l.html#71 Selectric Typewriter--50th Anniversary
2011l.html#57 Does outsourcing cause data loss?
2011l.html#56 Does outsourcing cause data loss?
2011l.html#49 Does outsourcing cause data loss?
2011l.html#10 Cracking the code
2011k.html#83 California blazes trail again with enhanced breach alert law
2011k.html#64 Fraudulent Google credential found in the wild
2011k.html#40 Banks blocking more fraudulent money transfers from hijacked business accounts
2011k.html#35 Chase, Bank of America credit cards too hacker-friendly?
2011k.html#30 Regulators seek to plug derivatives data gaps
2011k.html#22 Slouching toward Weimar
2011k.html#16 Feds Launch Probe Into S&P Mortgage Rates
2011k.html#15 Is the SEC Covering Up Wall Street Crimes?
2011j.html#63 Why do defenders keep losing to smaller cyberwarriors?
2011j.html#45 S&P's History of Relentless Political Advocacy
2011j.html#44 S&P Downgrades USA; Time to Downgrade S&P?
2011j.html#41 Advice from Richard P. Feynman
2011j.html#40 Advice from Richard P. Feynman
2011j.html#25 Cloud computing - is it a financial con trick?
2011j.html#24 rating agencies
2011j.html#21 disclosing "business" information on the internet
2011j.html#19 disclosing "business" information on the internet
2011j.html#2 House panel approves data breach notification bill
2011i.html#45 Happy 100th Birthday, IBM!
2011i.html#27 PDCA vs. OODA
2011i.html#12 Happy 100th Birthday, IBM!
2011i.html#11 'Megalomania, Insanity' Fueled Bubble: Munger
2011i.html#8 'Megalomania, Insanity' Fueled Bubble: Munger
2011i.html#5 Robert Morris, man who helped develop Unix, dies at 78
2011i.html#2 'Megalomania, Insanity' Fueled Bubble: Munger
2011i.html#0 Cyberwar vs. Cyber-Espionage vs. Cybercrime
2011h.html#66 Senate Democrats Ask House to Boost SEC Funding
2011h.html#65 US Business Banking Cybercrime Wave: Is 'Commercially Reasonable' Reasonable?
2011h.html#64 SQL Injection Deemed No. 1 Software Flaw
2011h.html#60 Cyberwar vs. Cyber-Espionage vs. Cybercrime
2011h.html#59 SSL digital certificates
2011h.html#58 Pipeline and Network Security: Protecting a Series of Tubes
2011h.html#57 Law Interfering with Cybersecurity
2011h.html#55 CISO's Guide to Breach Notification
2011h.html#29 Obama: "We don't have enough engineers"
2011h.html#25 US Housing Crisis Is Now Worse Than Great Depression
2011h.html#24 US Housing Crisis Is Now Worse Than Great Depression
2011h.html#22 Is BitCoin a triple entry system?
2011h.html#5 Home prices may drop another 25%, Shiller predicts
2011h.html#4 1st round in Internet Account Fraud World Cup: Customer 0, Bank 1, Attacker 300,000
2011h.html#3 RSA Pawned - Black Queen runs amoc behind US lines of defence
2011g.html#68 The Costs of Bad Security
2011g.html#62 Is the magic and romance killed by Windows (and Linux)?
2011g.html#55 Mobius Says Financial Crisis ‘Around the Corner'
2011g.html#52 Enron: The Smartest Guys in the Room
2011g.html#48 Is the magic and romance killed by Windows (and Linux)?
2011g.html#47 Lords: Auditors guilty of 'dereliction of duty'
2011g.html#40 Fight Fraud with Device ID
2011g.html#39 BofA Breach: 'A Big, Scary Story'
2011g.html#30 Bank email archives thrown open in financial crash report
2011g.html#23 Fight Fraud with Device ID
2011g.html#22 An online bank scam worthy of a spy novel
2011g.html#18 Fight Fraud with Device ID
2011g.html#17 Hey all you Old Geeks (and younger ones too), with gas heading towards $6.00/gal, remote support, satellite offices and home office will become more cost effective
2011g.html#5 How they failed to catch Madoff
2011f.html#88 Court OKs Firing of Boeing Computer-Security Whistleblowers
2011f.html#86 Bank email archives thrown open in financial crash report
2011f.html#82 Bank email archives thrown open in financial crash report
2011f.html#66 Bank email archives thrown open in financial crash report
2011f.html#64 Are Americans serious about dealing with money laundering and the drug cartels?
2011f.html#62 Mixing Auth and Non-Auth Modules
2011f.html#52 Are Americans serious about dealing with money laundering and the drug cartels?
2011f.html#43 Massive Fraud, Common Crime, No Prosecutions
2011f.html#15 Identifying Latest zOS Fixes
2011f.html#14 How is SSL hopelessly broken? Let us count the ways
2011e.html#87 Scientists use maths to predict 'the end of religion' - Repost
2011e.html#82 What is your most memorable Mainframe security bug, breach or lesson learned?
2011e.html#74 The first personal computer (PC)
2011e.html#71 Fraudulent certificates issued for major websites
2011e.html#60 In your opinon, what is the highest risk of financial fraud for a corporation ?
2011e.html#56 In your opinon, what is the highest risk of financial fraud for a corporation ?
2011e.html#48 On Protectionism
2011e.html#0 Mainframe technology in 2011 and beyond; who is going to run these Mainframes?
2011d.html#70 The first personal computer (PC)
2011d.html#68 The first personal computer (PC)
2011b.html#88 NASA proves once again that, for it, the impossible is not even difficult
2011b.html#45 Productivity And Bubbles
2011b.html#36 Internal Fraud and Dollar Losses
2011b.html#27 The Zippo Lighter theory of the financial crisis (or, who do we want to blame?)
2011b.html#22 What do you think about fraud prevention in the governments?
2011b.html#21 New-home sales in 2010 fall to lowest in 47 years
2011.html#84 The Imaginot Line
2011.html#53 What do you think about fraud prevention in the governments?
2011.html#50 What do you think about fraud prevention in the governments?
2011.html#49 What do you think about fraud prevention in the governments?
2011.html#48 What do you think about fraud prevention in the governments?
2011.html#46 What do you think about fraud prevention in the governments?
2011.html#30 Data Breaches: Stabilize in 2010, But There's an Asterisk
2011.html#29 Looking for a real Fortran-66 compatible PC compiler (CP/M or DOSor Windows
2011.html#26 Julian Assange - Hero or Villain
2011.html#25 Julian Assange - Hero or Villain
2011.html#24 Julian Assange - Hero or Villain
2010q.html#71 Domain Name of Russia's Largest Online Payment Processor Hijacked
2010q.html#66 Ernst & Young sued for fraud over Lehman
2010q.html#58 Programmer Charged with thieft (maybe off topic)
2010q.html#56 Microsoft Wants 'Sick' PCs Banned From The Internet
2010q.html#53 Programmer Charged with thieft (maybe off topic)
2010q.html#44 Programmer Charged with thieft (maybe off topic)
2010q.html#43 Programmer Charged with thieft (maybe off topic)
2010q.html#36 Programmer Charged with thieft (maybe off topic)
2010q.html#31 Ernst & Young sued for fraud over Lehman
2010q.html#27 WikiLeaks' Wall Street Bombshell
2010q.html#25 Economic espionage discussed
2010q.html#24 Ernst & Young sued for fraud over Lehman
2010q.html#19 E-commerce and Internet Security: Why Walls Don't Work
2010q.html#17 WikiLeaks' Wall Street Bombshell
2010q.html#13 "Compound threats" to appear in 2011 ?
2010q.html#11 Card Fraud: 'Flash Attacks' and Wireless Transmissions
2010q.html#8 Plug Your Data Leaks from the inside
2010q.html#4 Plug Your Data Leaks from the inside
2010q.html#3a The Great Cyberheist
2010q.html#0 Card Fraud: 'Flash Attacks' and Wireless Transmissions
2010p.html#80 TCM's Moguls documentary series
2010p.html#76 The Difficulty of Proving Financial Crimes
2010p.html#47 The Great Cyberheist
2010p.html#40 The Great Cyberheist
2010p.html#31 Cyber-crime: bigger than the drugs trade, and growing
2010p.html#25 CARD AUTHENTICATION TECHNOLOGY - Embedded keypad on Card - Is this the future
2010p.html#10 OODA in highly stochastic environments
2010p.html#6 What banking is. (Essential for predicting the end of finance as we know it.)
2010p.html#5 Fun with ATM Skimmers, Part III
2010p.html#2 Fun with ATM Skimmers, Part III
2010o.html#77 The Credit Card Criminals Are Getting Crafty
2010o.html#76 E-commerce smackdown as PCI standards revised
2010o.html#67 CARD AUTHENTICATION TECHNOLOGY - Embedded keypad on Card - Is this the future
2010o.html#54 The Credit Card Criminals Are Getting Crafty
2010o.html#52 Payment Card Industry Pursues Profits Over Security
2010o.html#49 The Credit Card Criminals Are Getting Crafty
2010o.html#46 The Credit Card Criminals Are Getting Crafty
2010o.html#45 A Wolf In Sheep's Clothing - New Threat
2010o.html#44 A Wolf In Sheep's Clothing - New Threat
2010o.html#42 Facebook and Twitter fail basic security test
2010o.html#40 The Credit Card Criminals Are Getting Crafty
2010o.html#37 WHAT, WHY AND HOW - FRAUD, IMPACT OF AUDIT
2010o.html#36 Cookies Are Dead in the Fight Against Fraud
2010o.html#28 Survey Outlines Compliance Challenge Among Small Merchants
2010o.html#23 Spooky Myths that Trick Merchants When It Comes to Secure Payments Processes
2010o.html#20 Electronic Theft Costs Businesses More Than Physical Theft
2010o.html#19 Virtualization: Making Seductive Promises a Reality
2010o.html#18 Electronic Theft Costs Businesses More Than Physical Theft
2010o.html#17 ZeuS attacks mobiles in bank SMS bypass scam
2010o.html#14 Electronic Theft Costs Businesses More Than Physical Theft
2010o.html#9 On Scope Scrinkage in PCI DSS
2010o.html#8 PCI: Smaller Merchants Threatened
2010o.html#1 ZeuS attacks mobiles in bank SMS bypass scam
2010n.html#78 Mainframe hacking?
2010n.html#77 ZeuS attacks mobiles in bank SMS bypass scam
2010n.html#76 Mainframe hacking?
2010n.html#73 Mainframe hacking?
2010n.html#72 When Merchants Get Rid Of Cardholder Data
2010n.html#67 Outgunned: How Security Tech Is Failing Us
2010n.html#59 Question: Why Has Debit Grown So Quickly?
2010n.html#52 Who are these people who think cybersecurity experts are crying wolf?
2010n.html#49 ZeuS attacks mobiles in bnak SMS bypass scam
2010n.html#48 Is the United States the weakest link when it comes to credit card security?
2010n.html#47 ZeuS attacks mobiles in bank SMS bypass scam
2010n.html#46 Who are these people who think cybersecurity experts are crying wolf?
2010n.html#44 Who are these people who think cybersecurity experts are crying wolf?
2010n.html#28 Will new card innovation help interchange and improve retention?
2010n.html#23 Credit Card with a Computer Inside
2010n.html#19 A mighty fortress is our PKI, Part III
2010n.html#9 'Here you have' email worm spreads quickly
2010n.html#6 zSecurity blog post - "READ is not benign"
2010n.html#5 Cyber criminals seek 'full' sets of credentials that trade for only a few pounds
2010n.html#4 zSecurity blog post - "READ is not benign"
2010n.html#2 UAE Man-in-the-Middle Attack Against SSL
2010m.html#87 Nearly $1,000,000 stolen electronically from the University of Virginia
2010m.html#82 Nearly $1,000,000 stolen electronically from the University of Virginia
2010m.html#68 Idiotic programming style edicts
2010m.html#65 How Safe Are Online Financial Transactions?
2010m.html#64 How Safe Are Online Financial Transactions?
2010m.html#58 memes in infosec IV - turn off HTTP, a small step towards "only one mode"
2010m.html#48 A New U.S. Treasury Rule Would Add Millions to Prepaid Ranks
2010m.html#38 U.K. bank hit by massive fraud from ZeuS-based botnet
2010m.html#31 Are we spending too little on security? Or are we spending too much??
2010m.html#30 AT&T, Verizon to Target Visa, MasterCard With Phones
2010m.html#24 Little-Noted, Prepaid Rules Would Cover Non-Banks As Wells As Banks
2010m.html#23 A mighty fortress is our PKI, Part II
2010m.html#19 AT&T, Verizon to Target Visa, MasterCard With Phones
2010m.html#7 GSM eavesdropping
2010m.html#6 Five Theses on Security Protocols
2010l.html#79 Five Theses on Security Protocols
2010l.html#77 Five Theses on Security Protocols
2010l.html#70 A slight modification of my comments on PKI
2010k.html#27 taking down the machine - z9 series
2010k.html#5 The Attacker's Advantage
2010j.html#41 Monet, was Re: A "portable" hard disk
2010j.html#32 Personal use z/OS machines was Re: Multiprise 3k for personal Use?
2010j.html#18 Personal use z/OS machines was Re: Multiprise 3k for personal Use?
2010i.html#83 The Evolution of the Extended Enterprise: Security Stategies for Forward Thinking Organizations
2010i.html#62 blasts from the past -- old predictions come true
2010i.html#58 Cyber Self Defense: Reduce Your Attack Surface
2010i.html#53 Of interest to the Independent Contractors on the list
2010i.html#51 Visa fraud alert puts banks, payment processors on guard
2010i.html#47 "Fraud & Stupidity Look a Lot Alike"
2010i.html#45 Swipe this card; shopping could be cheaper
2010i.html#42 "Fraud & Stupidity Look a Lot Alike"
2010i.html#38 Idiotic programming style edicts
2010i.html#25 Retailers blamed for making people vulnerable to credit card fraud and ID theft
2010i.html#7 The Enablers for this "Real Estate Crisis"- Willful Blindness, Greed or more?
2010h.html#82 Costs Of Data Breaches Much Higher In U.S. Than In Other Countries, Study Says
2010h.html#69 Idiotic programming style edicts
2010h.html#58 S.E.C. Moves to Tighten Rules on Bonds Backed by Consumer Loans
2010h.html#54 Trust Facade
2010h.html#41 Profiling of fraudsters
2010h.html#37 (slightly OT - Linux) Did IBM bet on the wrong OS?
2010h.html#31 In the News: SEC storms the 'Castle'
2010h.html#26 In SSL We Trust? Not Lately
2010h.html#16 The Revolving Door and S.E.C. Enforcement
2010h.html#15 The Revolving Door and S.E.C. Enforcement
2010h.html#1 In SSL We Trust? Not Lately
2010g.html#65 Fraudsters Can Easily Buy SSL Certificates, Researcher Finds
2010g.html#14 Gov't coerced Certs thwart SSL/TLS
2010g.html#10 Gov't coerced Certs thwart SSL/TLS
2010f.html#75 Is Security a Curse for the Cloud Computing Industry
2010f.html#71 Law Enforcement Appliance Subverts SSL
2010f.html#56 Handling multicore CPUs; what the competition is thinking
2010f.html#44 Can't PIN be mandated in normal POS machines ? to avoid Losses / Frauds / NPA's ?
2010f.html#29 Cyberattacks raise e-banking security fears
2010f.html#6 Online Banking & Password Theft
2010e.html#41 PCI tokenization push promising but premature, experts say
2010e.html#3 "Unhackable" Infineon Chip Physically Cracked - PCWorld
2010d.html#83 Senior Java Developer vs. MVS Systems Programmer
2010d.html#47 Industry groups leap to Chip and PIN's defence
2010d.html#31 Michigan firm sues bank over theft of $560,000
2010d.html#30 Michigan firm sues bank over theft of $560,000
2010d.html#25 Cambridge researchers show Chip and PIN system vulnerable to fraud
2010d.html#24 Cambridge researchers show Chip and PIN system vulnerable to fraud
2010d.html#21 Credit card data security: Who's responsible?
2010d.html#17 Chip and PIN is Broken!
2010d.html#7 "Unhackable" Infineon Chip Physically Cracked - PCWorld
2010c.html#86 NY Town's Bank Account Hacked; Poughkeepsie Loses $378K in Fraudulent Transfers
2010c.html#63 who pioneered the WEB
2010c.html#61 Engineer shows how to crack a 'secure' TPM chip
2010c.html#60 Cybercrime Checks Into The Hotel Industry
2010c.html#37 Happy DEC-10 Day
2010c.html#34 Happy DEC-10 Day
2010c.html#33 Happy DEC-10 Day
2010c.html#32 Happy DEC-10 Day
2010b.html#89 Remember Ed Curry!
2010b.html#75 Windows plagued by 17-year-old privilege escalation bug
2010b.html#18 security and online banking
2010b.html#2 Korean bank Moves back to Mainframes (...no, not back)
2010.html#97 Korean bank Moves back to Mainframes (...no, not back)
2010.html#93 Korean bank Moves back to Mainframes (...no, not back)
2010.html#81 Happy DEC-10 Day
2010.html#73 Korean bank Moves back to Mainframes (...no, not back)
2009s.html#49 Six Months Later, MasterCard Softens a Controversial PCI Rule
2009s.html#48 Larrabee delayed: anyone know what's happening?
2009s.html#44 PCI and Network Encryption
2009s.html#39 Six Months Later, MasterCard Softens a Controversial PCI Rule
2009r.html#71 While watching Biography about Bill Gates on CNBC last Night
2009r.html#58 xmas card
2009r.html#55 Verizon report goes deep inside data breach investigations
2009r.html#48 Strong Authentication Not Strong Enough
2009r.html#41 While watching Biography about Bill Gates on CNBC last Night
2009r.html#29 Data Breaches Show PCI DSS Ineffective
2009r.html#27 New Gift Card Laws Also Benefit Terrorists
2009r.html#19 Scammers scrape RAM for bank card data
2009r.html#16 70 Years of ATM Innovation
2009r.html#11 Trade group seeks to stave off cybersecurity mandates
2009q.html#71 Trade Secrets and Confidential Information
2009q.html#58 Cyber breaches are a closely kept secret
2009q.html#56 Crypto dongles to secure online transactions ... addenda
2009q.html#55 Crypto dongles to secure online transactions ... addenda
2009p.html#75 What's old is new again
2009p.html#73 The computer virus turns 26 today
2009p.html#72 Crypto dongles to secure online transactions
2009p.html#68 US retailers face $100bn in ID fraud losses a year - study
2009p.html#65 Crypto dongles to secure online transactions
2009p.html#64 Failing The Sniff Test: Researchers Find New Way To Spot Fraud
2009p.html#45 ATM machines are increasingly attractive to hackers
2009p.html#44 Nearly 500 People Fall Victim to ATM Skimming Scam
2009p.html#29 Computer Experts Deconstruct FDIC Email Scam
2009p.html#27 FBI: National data-breach law would help fight cybercrime
2009p.html#22 FBI: National data-breach law would help fight cybercrime
2009p.html#17 U.K. lags in information security management practices
2009p.html#15 Rogue security software threat will grow in 2010, warns report
2009o.html#71 "Rat Your Boss" or "Rats to Riches," the New SEC
2009o.html#53 E-Banking on a Locked Down (Non-Microsoft) PC
2009o.html#50 WSJ.com The Fallacy of Identity Theft
2009n.html#72 Real-Time Hackers Foil Two-Factor Security
2009n.html#71 Sophisticated cybercrooks cracking bank security efforts
2009n.html#37 Firms failing to treat card data security seriously
2009n.html#11 Banks should share cyber crime information IT PRO
2009n.html#8 Malware lingers months on infected PCs
2009m.html#74 ATMs by the Numbers
2009m.html#67 European Banks Warned: Brace for Rise in Cash Machine Fraud
2009m.html#65 European Banks Warned: Brace for Rise in Cash Machine Fraud
2009m.html#62 August 7, 1944: today is the 65th Anniversary of the Birth of the Computer
2009m.html#52 Online banking: Which bank is the most secure?
2009m.html#42 PCI Council Releases Recommendations For Preventing Card-Skimming Attacks
2009m.html#28 PCI Council Releases Recommendations For Preventing Card-Skimming Attacks
2009m.html#21 The Art of Creating Strong Passwords
2009m.html#13 PCI Council Releases Recommendations For Preventing Card-Skimming Attacks
2009m.html#9 Cyber crooks increasingly target small business accounts
2009m.html#6 FBI arrests programmer for stolen software
2009m.html#3 Does this count as 'computer' folklore?
2009m.html#0 Lawsuit seeks to pry information from banks on account breaches
2009l.html#68 Hacker charges also an indictment on PCI, expert says
2009l.html#63 Does this count as 'computer' folklore?
2009l.html#61 Hacker charges also an indictment on PCI, expert says
2009l.html#54 another item related to ASCII vs. EBCDIC
2009l.html#53 Hacker charges also an indictment on PCI, expert says
2009l.html#50 Hacker charges also an indictment on PCI, expert says
2009l.html#37 Disksize history question
2009l.html#5 Internal fraud isn't new, but it's news
2009l.html#4 Card PINs traded at two for a dollar
2009l.html#2 Cyber attackers empty business accounts in minutes
2009l.html#0 Cyber attackers empty business accounts in minutes
2009k.html#77 Cyber attackers empty business accounts in minutes
2009k.html#38 More holes found in Web's SSL security protocol
2009k.html#28 Network Solutions breach exposed 500k card accounts
2009k.html#25 Don't Take Fraud Out of Context
2009k.html#21 Security certificate warnings don't work, researchers say
2009j.html#57 How can we stop Credit card FRAUD?
2009j.html#51 Replace the current antiquated credit card system
2009j.html#50 How can we stop Credit card FRAUD?
2009j.html#48 Replace the current antiquated credit card system
2009j.html#28 Malware steals ATM accounts and PIN codes; Pwns ATMS user Windows XP
2009j.html#26 Price Tag for End-to-End Encryption: $4.8 Billion, Mercator Says
2009j.html#23 Database Servers: Candy For Hackers
2009j.html#13 PCI SSC Seeks Input on Security Standards
2009j.html#11 Is anyone aware of a system that offers three layers of security and ID protection for online purchases or even over the counter POS purchases?
2009j.html#5 Database Servers: Candy For Hackers
2009i.html#68 Weak security enables credit card hacks
2009i.html#64 Weak security enables credit card hacks
2009i.html#53 Merchant Groups Ask for Broad Changes in Letter to PCI's Overseer
2009i.html#47 Cyber crime 'more profitable than drugs'
2009i.html#46 64 Cores -- IBM is showing a prototype already
2009i.html#38 What is better $2 or $2000, Microsoft publishes a research paper
2009i.html#34 Data-sniffing trojans burrow into Eastern European ATMs
2009i.html#22 My Vintage Dream PC
2009i.html#20 Online Banking's Innate Security Flaws
2009i.html#14 Online Banking's Innate Security Flaws
2009h.html#46 IBM security expert: X86 virtualization not ready for regulated, mission-critical apps
2009h.html#28 Computer virus strikes US Marshals, FBI affected
2009h.html#24 IBM security expert: X86 virtualization not ready for regulated, mission-critical apps
2009h.html#13 Opinion: The top 10 operating system stinkers
2009h.html#4 ATM/Debit Card Fraud On The Rise
2009g.html#57 LexisNexis says its data was used by fraudsters
2009g.html#28 Halifax faces legal challenge on chip-and-pin security
2009g.html#24 Top 10 Cybersecurity Threats for 2009, will they cause creation of highly-secure Corporate-wide Intranets?
2009g.html#10 Top 10 Cybersecurity Threats for 2009, will they cause creation of highly-secure Corporate-wide Intranets?
2009f.html#67 Just posted third article about toxic assets in a series on the current financial crisis
2009f.html#61 Halifax faces legal challenge on chip-and-pin security
2009f.html#60 Cobol hits 50 and keeps counting
2009f.html#48 Bankers as Partners In Crime Stopping
2009f.html#46 Who moved my payment?
2009f.html#42 More Data Breached In 2008 Than In Previous Four Years Combined
2009f.html#39 PIN Crackers Nab Holy Grail of Bank Card Security
2009f.html#36 PCI security rules may require reinforcements
2009f.html#16 Cybersecurity hearing highlights inadequacy of PCI DSS
2009f.html#14 SSL: Broken Even More
2009f.html#3 Cybersecurity hearing highlights inadequacy of PCI DSS
2009e.html#64 An interesting take on Verified by Visa Policy
2009e.html#21 ATMs At Risk
2009e.html#16 ATMs At Risk
2009e.html#6 ATMs At Risk
2009d.html#75 Whistleblowing and reporting fraud
2009d.html#73 Should Glass-Steagall be reinstated?
2009d.html#72 Why Are CC Numbers Still So Easy To Find?
2009d.html#71 Lack of bit field instructions in x86 instruction set because of patents ?
2009d.html#57 Lack of bit field instructions in x86 instruction set because of patents ?
2009d.html#38 Internet threat: Hackers swarm bank accounts
2009d.html#6 Heartland Data Breach Update: Now More Than 150 Institutions Impacted
2009c.html#50 SSLstrip hacking tool bypasses SSL to trick users, steal passwords
2009c.html#31 H5: Security Begins at the Application and Ends at the Mind
2009c.html#25 Crypto Craft Knowledge
2009b.html#68 Fraud Incidents Tied to Heartland Data Breach
2009b.html#64 SQL attacks dominated 2008, says IBM
2009b.html#63 Study: Data breaches continue to get more costly for businesses
2009b.html#62 Study: Data breaches continue to get more costly for businesses
2009b.html#55 Davos 2009 Cybercrime threat rising sharply
2009b.html#44 Cybercrime cost $1 trillion last year, study
2009b.html#32 Heartland Says Entire Industry Should Revamp Security
2009b.html#21 ICSF and VISA/MasterCard?amex reference list
2009b.html#17 Fraud -- how can you stay one step ahead?
2009b.html#10 Superworm seizes 9m PCs, 'stunned' researchers say
2009b.html#9 New Research Reveals 45% of Card Breach Victims Lose Confidence in Their Financial Accounts
2009b.html#5 Possibility of malicious CPUs
2009.html#66 What's missing in security: business
2009.html#60 The 25 Most Dangerous Programming Errors
2009.html#52 The Credit Crunch: Why it happened?
2009.html#49 The 25 Most Dangerous Programming Errors
2009.html#29 Data losses set to soar
2009.html#20 Data losses set to soar
2009.html#10 Swedish police warn of tampered credit card terminals
2009.html#7 Swedish police warn of tampered credit card terminals
2009.html#4 Is SUN going to become x86'ed ??
2008s.html#78 Boffins bust web authentication with game consoles
2008s.html#76 Boffins bust web authentication with game consoles
2008s.html#72 CA issues no-questions asked Mozilla cert
2008s.html#63 Garbage in, garbage out trampled by Moore's law
2008s.html#58 DNS flaw is 2008's biggest web blunder
2008s.html#36 What is the top security threat prediction of 2009?
2008s.html#9 Blind-sided, again. Why?
2008s.html#1 PCI's Bob Russo: Data loss hurts brand more than a fine
2008r.html#65 Did you think about Virtualization Security?
2008r.html#59 Stolen credit-card boom
2008r.html#53 21 million German bank account details on black market
2008r.html#52 Cheap Hack - Domain Name Market - Stolen Domains for Sale
2008r.html#49 Kaspersky calls for a more secure internet
2008r.html#42 Online Bill Payment Website Hijacked - Users were redirected to a page serving malware
2008r.html#0 ATM Skimmers: Watch Out for Electronic Theft Devices
2008q.html#66 Blinkenlights
2008q.html#32 I was wondering what types of frauds the audience think will increase?
2008q.html#25 Cybercrime Could Be As Destructive As Credit Crisis
2008q.html#12 Blinkenlights
2008p.html#74 2008 Data Breaches: 30 Million and Counting
2008p.html#70 Is there any technology that we are severely lacking in the Financial industry?
2008p.html#64 Do you feel secure with your bank's online banking service?
2008p.html#47 In Modeling Risk, the Human Factor Was Left Out
2008p.html#44 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#34 How can I tell if a keylogger got added to my PC while I was in Beijing?
2008p.html#23 Your views on the increase in phishing crimes such as the recent problem French president Sarkozy faces
2008p.html#20 Donald Knuth stops paying for errata
2008p.html#19 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#14 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#11 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#10 Strings story
2008o.html#83 Chip-and-pin card reader supply-chain subversion 'has netted millions from British shoppers'
2008o.html#81 How security audits, vulnerability assessments and penetration tests differ?
2008o.html#76 Blinkenlights
2008o.html#60 Biometric Credit cards
2008o.html#35 The human plague
2008o.html#34 The human plague
2008o.html#31 The human plague
2008o.html#25 What are the Black Swans for IT Security?
2008o.html#22 What risk of possible data leakage do you see for your organization?
2008o.html#18 Once the dust settles, do you think Milton Friedman's economic theories will be laid to rest
2008o.html#14 Blinkylights
2008o.html#12 The human plague
2008o.html#11 Browser Security UI: the horns of the dilemma
2008o.html#8 The end of the baby boomers, US bonds maturing, and then what?
2008o.html#7 Credit Card Security
2008o.html#4 Wachovia Bank web site
2008n.html#101 Blinkylights
2008n.html#100 Wachovia Bank web site
2008n.html#95 Blinkylights
2008n.html#94 Blinkylights
2008n.html#82 Fraud in financial institution
2008n.html#78 Isn't it the Federal Reserve role to oversee the banking system??
2008n.html#74 Why can't we analyze the risks involved in mortgage-backed securities?
2008n.html#71 Clickjacking -- the new browser wipe-out
2008n.html#69 Another quiet week in finance
2008n.html#54 In your experience which is a superior debit card scheme - PIN based debit or signature debit?
2008n.html#52 Technology and the current crisis
2008n.html#44 VMware Chief Says the OS Is History
2008n.html#40 Success has many fathers, but failure has the US taxpayer
2008n.html#38 In your experience which is a superior debit card scheme - PIN based debit or signature debit?
2008n.html#37 Success has many fathers, but failure has the US taxpayer
2008n.html#36 Builders V. Breakers
2008n.html#0 Blinkylights
2008m.html#95 Blinkylights
2008m.html#82 Data sharing among Industry players about frauds
2008m.html#71 TJ Maxx - why are they still in business?
2008m.html#56 With all the highly publicised data breeches and losses, are we all wasting our time?
2008m.html#55 With all the highly publicised data breeches and losses, are we all wasting our time?
2008m.html#27 Fraud due to stupid failure to test for negative
2008m.html#8 Fraud due to stupid failure to test for negative
2008m.html#5 Fraud due to stupid failure to test for negative
2008l.html#89 Fraud due to stupid failure to test for negative
2008l.html#71 md5
2008l.html#69 Verifying Verified By Visa - Registration breaks chain of trust
2008l.html#61 Osama bin Laden gets a cosmetic makevover in his British Vanity Passport
2008l.html#53 Quality of IBM school clock systems?
2008l.html#52 Payments Security in RFS
2008l.html#51 Monetary affairs on free reign, but the horse has Boulton'd
2008l.html#50 IBM manual web pages
2008l.html#49 Quality of IBM school clock systems?
2008l.html#46 z/OS BIND9 DNS Vulnerable to Cache Poisoning Attack Problem?
2008l.html#35 Quality of IBM school clock systems?
2008l.html#30 Verifying Verified By Visa - Registration breaks chain of trust
2008l.html#29 Verifying Verified By Visa - Registration breaks chain of trust
2008l.html#28 Verifying Verified By Visa - Registration breaks chain of trust
2008l.html#21 recent mentions of 40+ yr old technology
2008k.html#19 dollar coins
2008k.html#13 dollar coins
2008k.html#10 Why do Banks lend poorly in the sub-prime market? Because they are not in Banking!
2008j.html#84 dollar coins
2008j.html#71 lack of information accuracy
2008j.html#66 lack of information accuracy
2008j.html#64 lack of information accuracy
2008j.html#63 CLIs and GUIs
2008j.html#62 German court finds Bank responsible for malwared PC
2008j.html#61 German court finds Bank responsible for malwared PC
2008j.html#60 dollar coins
2008j.html#57 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008j.html#55 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008j.html#51 dollar coins
2008j.html#39 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008j.html#39 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008j.html#38 dollar coins
2008j.html#37 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008j.html#35 Data Breach Reports Up 69 Percent in 2008
2008j.html#34 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008i.html#101 We're losing the battle
2008i.html#88 squirrels
2008i.html#81 Selling Security using Prospect Theory. Or not
2008i.html#76 Security Awareness
2008i.html#71 The End of Privacy?
2008i.html#70 Next Generation Security
2008i.html#67 Do you have other examples of how people evade taking resp. for risk
2008i.html#64 Is the credit crunch a short term aberation
2008i.html#55 Is data classification the right approach to pursue a risk based information security program?
2008i.html#43 IT Security Statistics
2008i.html#42 "Security Breaches"
2008i.html#30 subprime write-down sweepstakes
2008i.html#21 Worst Security Threats?
2008i.html#1 Do you belive Information Security Risk Assessment has shortcoming like
2008h.html#90 subprime write-down sweepstakes
2008h.html#89 Credit Crisis Timeline
2008h.html#44 Two views of Microkernels (Re: Kernels
2008h.html#32 subprime write-down sweepstakes
2008h.html#20 handling the SPAM on this group
2008h.html#4 You won't guess who's the bad guy of ID theft
2008g.html#67 independent appraisers
2008g.html#66 independent appraisers
2008g.html#64 independent appraisers
2008g.html#59 Credit crisis could cost nearly $1 trillion, IMF predicts
2008g.html#36 Lehman sees banks, others writing down $400 bln
2008g.html#28 Hannaford case exposes holes in law, some say
2008g.html#25 CA ESD files Options
2008g.html#17 Hannaford breach illustrates dangerous compliance mentality
2008g.html#16 independent appraisers
2008g.html#13 independent appraisers
2008g.html#12 independent appraisers
2008g.html#10 Hannaford case exposes holes in law, some say
2008g.html#8 Hannaford case exposes holes in law, some say
2008g.html#8 Hannaford case exposes holes in law, some say
2008g.html#4 CDOs subverting Boyd's OODA-loop
2008g.html#2 Bush - place in history
2008g.html#0 Bush - place in history
2008f.html#96 Bush - place in history
2008f.html#94 Bush - place in history
2008f.html#89 Bush - place in history
2008f.html#88 Has Banking Industry Overlooked Its Biggest Breach Ever?
2008f.html#86 Banks failing to manage IT risk - study
2008f.html#73 Bush - place in history
2008f.html#63 Antivirus Inventor: Security Departments Are Wasting Their Time
2008f.html#54 How do OTP tokens work?
2008f.html#51 independent appraisers
2008f.html#49 How do OTP tokens work?
2008f.html#33 EPIC, Ending Piracy of Integrated Circuits
2008f.html#26 independent appraisers
2008f.html#25 independent appraisers
2008f.html#11 independent appraisers
2008f.html#9 EPIC, Ending Piracy of Integrated Circuits
2008f.html#2 EPIC, Ending Piracy of Integrated Circuits
2008e.html#77 independent appraisers
2008e.html#71 US aerospace and defense sector braces for potential brain drain as Cold War workers retire
2008e.html#69 independent appraisers
2008e.html#66 independent appraisers
2008e.html#65 Banks failing to manage IT risk - study
2008e.html#44 insider fraud
2008e.html#42 Banks failing to manage IT risk - study
2008e.html#35 PIN devices vulnerable to 'tapping' attacks, researchers warn
2008e.html#34 The hands-free way to steal a credit card
2008e.html#25 Spammers crack Gmail Captcha
2008e.html#3 The hands-free way to steal a credit card
2008d.html#88 The hands-free way to steal a credit card
2008d.html#84 The hands-free way to steal a credit card
2008d.html#34 New Research Confirms Identity Fraud Is On Decline
2008d.html#27 Kerberized authorization service
2008d.html#26 Toyota Sales for 2007 May Surpass GM
2008d.html#18 New Research Confirms Identity Fraud Is On Decline
2008d.html#10 Toyota Sales for 2007 May Surpass GM
2008d.html#6 How Safe Are Your Personal Records In The Hands Of Government Officials?
2008d.html#3 Govt demands password to personal computer
2008d.html#2 Spammers' bot cracks Microsoft's CAPTCHA
2008c.html#89 Toyota Sales for 2007 May Surpass GM
2008c.html#76 Neglected IT Tasks May Have Led to Bank Meltdown
2008c.html#59 Govt demands password to personal computer
2008c.html#47 Data Erasure Products
2008c.html#44 Toyota Sales for 2007 May Surpass GM
2008c.html#4 folklore indeed
2008b.html#82 Break the rules of governance and lose 4.9 billion
2008b.html#74 Too much change opens up financial fault lines
2008b.html#72 Govt demands password to personal computer
2008b.html#68 Govt demands password to personal computer
2008b.html#67 Govt demands password to personal computer
2008b.html#26 folklore indeed
2008b.html#19 Yahoo's CAPTCHA Security Reportedly Broken
2008b.html#12 Computer Science Education: Where Are the Software Engineers of Tomorrow?
2008.html#90 Computer Science Education: Where Are the Software Engineers of Tomorrow?
2008.html#71 As Expected, Ford Falls From 2nd Place in U.S. Sales
2008.html#70 As Expected, Ford Falls From 2nd Place in U.S. Sales
2008.html#36 1970s credit cards, was: 1975 movie "Three Days of the Condor" tech stuff
2008.html#35 U.S. Identity Theft at Record Level in 2007
2008.html#31 1975 movie "Three Days of the Condor" tech stuff
2008.html#11 Information security breaches quadrupled in 2007
2008.html#5 folklore indeed
2008.html#4 folklore indeed
2008.html#2 folklore indeed
2007v.html#97 folklore indeed
2007v.html#95 folklore indeed
2007v.html#90 folklore indeed
2007v.html#89 2007 Roundup: The march of the botnets
2007v.html#88 Data Breaches Soar In 2007
2007v.html#87 Data Breaches Soar In 2007
2007v.html#86 folklore indeed
2007v.html#78 folklore indeed
2007v.html#77 folklore indeed
2007v.html#74 folklore indeed
2007v.html#66 2007: year in review
2007v.html#35 Inside a Modern Malware Distribution System
2007v.html#25 Newsweek article--baby boomers and computers
2007v.html#8 Virtualization still hot, death of antivirus software imminent
2007v.html#6 Ironke
2007v.html#2 folklore indeed
2007u.html#82 Education ranking
2007u.html#74 folklore indeed
2007u.html#71 folklore indeed
2007u.html#70 folklore indeed
2007u.html#68 folklore indeed
2007u.html#63 folklore indeed
2007u.html#62 folklore indeed
2007u.html#58 folklore indeed
2007u.html#56 folklore indeed
2007u.html#56 folklore indeed
2007u.html#55 folklore indeed
2007u.html#54 folklore indeed
2007u.html#53 folklore indeed
2007u.html#50 folklore indeed
2007u.html#49 folklore indeed
2007u.html#48 folklore indeed
2007u.html#47 folklore indeed
2007u.html#45 Folklore references to CP67 at Lincoln Labs
2007u.html#11 Public Computers
2007u.html#10 Crypto Related Posts
2007t.html#47 Translation of IBM Basic Assembler to C?
2007t.html#27 'Man in the browser' is new threat to online banking
2007t.html#22 'Man in the browser' is new threat to online banking
2007t.html#20 UK Retail Giant Breached by Insider
2007t.html#7 Identity Theft Prevention tips
2007s.html#66 The new urgency to fix online privacy
2007s.html#34 File sharing may lead to identity theft
2007s.html#28 Translation of IBM Basic Assembler to C?
2007s.html#25 Translation of IBM Basic Assembler to C?
2007s.html#13 The new urgency to fix online privacy
2007s.html#12 Translation of IBM Basic Assembler to C?
2007s.html#11 Translation of IBM Basic Assembler to C?
2007s.html#1 Translation of IBM Basic Assembler to C?
2007r.html#72 Translation of IBM Basic Assembler to C?
2007r.html#66 The new urgency to fix online privacy
2007r.html#66 The new urgency to fix online privacy
2007r.html#63 Translation of IBM Basic Assembler to C?
2007r.html#61 The new urgency to fix online privacy
2007r.html#47 Translation of IBM Basic Assembler to C?
2007r.html#45 Translation of IBM Basic Assembler to C?
2007r.html#45 Translation of IBM Basic Assembler to C?
2007r.html#32 Is the media letting banks off the hook on payment card security
2007r.html#30 Is the media letting banks off the hook on payment card security
2007q.html#41 Newsweek article--baby boomers and computers
2007p.html#50 Newsweek article--baby boomers and computers
2007p.html#40 what does xp do when system is copying
2007o.html#30 EZPass: Yes, Big Brother IS Watching You!
2007o.html#29 EZPass: Yes, Big Brother IS Watching You!
2007o.html#27 EZPass: Yes, Big Brother IS Watching You!
2007o.html#16 Hypervisors May Replace Operating Systems As King Of The Data Center
2007o.html#7 Hypervisors May Replace Operating Systems As King Of The Data Center
2007n.html#80 Poll: oldest computer thing you still use
2007n.html#72 Poll: oldest computer thing you still use
2007n.html#71 Poll: oldest computer thing you still use
2007n.html#50 WindowsMonitor or CUSP?
2007m.html#65 nouns and adjectives
2007m.html#33 nouns and adjectives
2007l.html#41 My Dream PC -- Chip-Based
2007l.html#41 My Dream PC -- Chip-Based
2007l.html#40 My Dream PC -- Chip-Based
2007l.html#35 My Dream PC -- Chip-Based
2007l.html#18 Non-Standard Mainframe Language?
2007l.html#0 John W. Backus, 82, Fortran developer, dies
2007k.html#79 John W. Backus, 82, Fortran developer, dies
2007k.html#63 My Dream PC -- Chip-Based
2007k.html#56 My Dream PC -- Chip-Based
2007k.html#55 My Dream PC -- Chip-Based
2007k.html#54 John W. Backus, 82, Fortran developer, dies
2007k.html#52 John W. Backus, 82, Fortran developer, dies
2007k.html#51 IBM Unionization
2007k.html#50 John W. Backus, 82, Fortran developer, dies
2007j.html#60 John W. Backus, 82, Fortran developer, dies
2007j.html#15 John W. Backus, 82, Fortran developer, dies
2007j.html#3 John W. Backus, 82, Fortran developer, dies
2007j.html#0 John W. Backus, 82, Fortran developer, dies
2007i.html#73 public key password authentication
2007i.html#64 John W. Backus, 82, Fortran developer, dies
2007i.html#64 John W. Backus, 82, Fortran developer, dies
2007i.html#28 John W. Backus, 82, Fortran developer, dies
2007i.html#19 John W. Backus, 82, Fortran developer, dies
2007i.html#17 John W. Backus, 82, Fortran developer, dies
2007h.html#63 T.J. Maxx data theft worse than first reported
2007h.html#56 T.J. Maxx data theft worse than first reported
2007h.html#51 Securing financial transactions a high priority for 2007
2007h.html#48 Securing financial transactions a high priority for 2007
2007g.html#58 Can SSL sessions be compromised?
2007g.html#50 DNSSEC to be strangled at birth
2007g.html#30 T.J. Maxx data theft worse than first reported
2007g.html#20 T.J. Maxx data theft worse than first reported
2007g.html#8 Securing financial transactions a high priority for 2007
2007f.html#72 Securing financial transactions a high priority for 2007
2007f.html#68 Securing financial transactions a high priority for 2007
2007f.html#58 Securing financial transactions a high priority for 2007
2007e.html#62 Securing financial transactions a high priority for 2007
2007e.html#58 Securing financial transactions a high priority for 2007
2007e.html#29 Securing financial transactions a high priority for 2007
2007e.html#26 Securing financial transactions a high priority for 2007
2007e.html#24 Securing financial transactions a high priority for 2007
2007e.html#20 Securing financial transactions a high priority for 2007
2007e.html#12 Securing financial transactions a high priority for 2007
2007e.html#2 Securing financial transactions a high priority for 2007
2007d.html#70 Securing financial transactions a high priority for 2007
2007d.html#68 Securing financial transactions a high priority for 2007
2007d.html#26 Securing financial transactions a high priority for 2007
2007d.html#5 Securing financial transactions a high priority for 2007
2007c.html#53 Securing financial transactions a high priority for 2007
2007c.html#51 Securing financial transactions a high priority for 2007
2007c.html#46 Securing financial transactions a high priority for 2007
2007c.html#43 Securing financial transactions a high priority for 2007
2007c.html#38 Securing financial transactions a high priority for 2007
2007c.html#37 Securing financial transactions a high priority for 2007
2007c.html#36 Securing financial transactions a high priority for 2007
2007c.html#35 Securing financial transactions a high priority for 2007
2007c.html#33 Securing financial transactions a high priority for 2007
2007c.html#32 Securing financial transactions a high priority for 2007
2007c.html#31 Securing financial transactions a high priority for 2007
2007c.html#30 Securing financial transactions a high priority for 2007
2007c.html#28 Securing financial transactions a high priority for 2007
2007c.html#27 Securing financial transactions a high priority for 2007
2007c.html#26 Securing financial transactions a high priority for 2007
2007c.html#22 Securing financial transactions a high priority for 2007
2007c.html#18 Securing financial transactions a high priority for 2007
2007c.html#17 Securing financial transactions a high priority for 2007
2007c.html#11 Decoding the encryption puzzle
2007c.html#10 Securing financial transactions a high priority for 2007
2007c.html#9 Decoding the encryption puzzle
2007c.html#8 Securing financial transactions a high priority for 2007
2007c.html#6 Securing financial transactions a high priority for 2007
2007c.html#3 "New Universal Man-in-the-Middle Phishing Kit"
2007b.html#64 Securing financial transactions a high priority for 2007
2007b.html#63 Is Silicon Valley strangeled by SOX?
2007b.html#62 Securing financial transactions a high priority for 2007
2007b.html#60 Securing financial transactions a high priority for 2007
2007b.html#59 Peter Gutmann Rips Windows Vista Content Protection
2007b.html#24 Forbidding Special characters in passwords
2007b.html#20 How many 36-bit Unix ports in the old days?
2007b.html#13 special characters in passwords
2007b.html#10 Special characters in passwords was Re: RACF - Password rules
2007b.html#10 Special characters in passwords was Re: RACF - Password rules
2007b.html#8 Special characters in passwords was Re: RACF - Password rules
2007.html#27 Securing financial transactions a high priority for 2007
2007.html#6 Securing financial transactions a high priority for 2007
2007.html#5 Securing financial transactions a high priority for 2007
2006y.html#25 "The Elements of Programming Style"
2006y.html#8 Securing financial transactions a high priority for 2007
2006x.html#36 SSL security with server certificate compromised
2006x.html#22 'Innovation' and other crimes
2006x.html#16 Security Implications of Using the Data Encryption Standard (DES)
2006x.html#14 IBM ATM machines
2006w.html#5 Patent buster for a method that increases password security
2006v.html#50 DOS C prompt in "Vista"?
2006v.html#49 Patent buster for a method that increases password security
2006v.html#46 Patent buster for a method that increases password security
2006v.html#45 On sci.crypt: New attacks on the financial PIN processing
2006v.html#44 User Authentication
2006v.html#42 On sci.crypt: New attacks on the financial PIN processing
2006v.html#39 On sci.crypt: New attacks on the financial PIN processing
2006v.html#33 New attacks on the financial PIN processing
2006v.html#27 Federal Rules May Not Fully Secure Online Banking Sites
2006v.html#13 Who has a Core Competency in Security?
2006v.html#2 New attacks on the financial PIN processing
2006v.html#1 New attacks on the financial PIN processing
2006u.html#53 What's a mainframe?
2006u.html#48 New attacks on the financial PIN processing
2006u.html#47 New attacks on the financial PIN processing
2006u.html#40 New attacks on the financial PIN processing
2006u.html#36 remote support questions - curiousity
2006u.html#3 ssh - password control or key control?
2006t.html#40 Encryption and authentication
2006t.html#40 Encryption and authentication
2006t.html#38 Vulnerability Assessment of a EAL 4 system
2006t.html#38 Vulnerability Assessment of a EAL 4 system
2006t.html#25 Are there more stupid people in IT than there used to be?
2006s.html#28 Storage Philosophy Question
2006s.html#9 Why not 2048 or 4096 bit RSA key issuance?
2006s.html#5 Why not 2048 or 4096 bit RSA key issuance?
2006s.html#4 Why not 2048 or 4096 bit RSA key issuance?
2006r.html#34 Mozilla moves on security
2006r.html#29 Intel abandons USEnet news
2006r.html#28 Greatest Software Ever Written?
2006q.html#48 Smartcard reader with certificate inside the reader
2006q.html#7 Linux More Secure on System z?
2006q.html#5 Materiel and graft
2006p.html#41 Device Authentication - The answer to attacks lauched using stolen passwords?
2006p.html#38 Hackers steal AT&T customer data
2006p.html#32 OT - hand-held security
2006p.html#18 19,000 Accounts Compromised
2006p.html#9 New airline security measures in Europe
2006o.html#47 the personal data theft pandemic continues
2006o.html#40 the personal data theft pandemic continues
2006o.html#37 the personal data theft pandemic continues
2006o.html#35 the personal data theft pandemic continues
2006n.html#32 The System/360 Model 20 Wasn't As Bad As All That
2006m.html#24 OT - J B Hunt
2006m.html#15 OpenSSL Hacks
2006l.html#57 DEC's Hudson fab
2006l.html#37 Google Architecture
2006l.html#33 Google Architecture
2006l.html#32 Google Architecture
2006l.html#27 Google Architecture
2006k.html#33 Password Complexity
2006k.html#26 Value of an old IBM PS/2 CL57 SX Laptop
2006k.html#23 Value of an old IBM PS/2 CL57 SX Laptop
2006k.html#22 Encryption for Powerpoint?
2006k.html#18 Value of an old IBM PS/2 CL57 SX Laptop
2006k.html#17 Hey! Keep Your Hands Out Of My Abstraction Layer!
2006k.html#16 Value of an old IBM PS/2 CL57 SX Laptop
2006k.html#15 Passwords for bank sites - change or not?
2006k.html#5 Value of an old IBM PS/2 CL57 SX Laptop
2006k.html#5 Value of an old IBM PS/2 CL57 SX Laptop
2006k.html#4 Passwords for bank sites - change or not?
2006k.html#4 Passwords for bank sites - change or not?
2006i.html#3 Spoofing fingerprint scanners - NEWBIE()
2006h.html#40 Mainframe vs. xSeries
2006h.html#34 The Pankian Metaphor
2006h.html#33 The Pankian Metaphor
2006h.html#31 Intel vPro Technology
2006h.html#26 Security
2006h.html#15 Security
2006h.html#13 Security
2006h.html#4 News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
2006g.html#12 The Pankian Metaphor
2006f.html#36 X.509 and ssh
2006f.html#33 X.509 and ssh
2006f.html#32 X.509 and ssh
2006e.html#44 Does the Data Protection Act of 2005 Make Sense
2006e.html#30 Debit Cards HACKED now
2006e.html#26 Debit Cards HACKED now
2006e.html#24 Debit Cards HACKED now
2006e.html#23 Debit Cards HACKED now
2006e.html#22 Debit Cards HACKED now
2006e.html#21 Debit Cards HACKED now
2006e.html#11 Caller ID "spoofing"
2006e.html#10 Caller ID "spoofing"
2006e.html#2 When *not* to sign an e-mail message?
2006d.html#31 Caller ID "spoofing"
2006d.html#30 Caller ID "spoofing"
2006d.html#28 Caller ID "spoofing"
2006d.html#26 Caller ID "spoofing"
2006d.html#25 Caller ID "spoofing"
2006c.html#38 X.509 and ssh
2006c.html#35 X.509 and ssh
2006c.html#34 X.509 and ssh
2006c.html#34 X.509 and ssh
2006c.html#31 Worried about your online privacy?
2006c.html#13 X.509 and ssh
2006.html#33 The new High Assurance SSL Certificates
2006.html#14 thoughts on one time pads
2006.html#12a sox, auditing, finding improprieties
2005v.html#4 ABN Tape - Found
2005v.html#3 ABN Tape - Found
2005v.html#2 ABN Tape - Found
2005u.html#33 PGP Lame question
2005u.html#31 AMD to leave x86 behind?
2005u.html#26 RSA SecurID product
2005u.html#24 AMD to leave x86 behind?
2005u.html#13 AMD to leave x86 behind?
2005s.html#15 Data Encryption Standard Today
2005r.html#7 DDJ Article on "Secure" Dongle
2005p.html#43 Security of Secret Algorithm encruption
2005p.html#25 Hi-tech no panacea for ID theft woes
2005p.html#25 Hi-tech no panacea for ID theft woes
2005p.html#24 Hi-tech no panacea for ID theft woes
2005p.html#6 Innovative password security
2005p.html#2 Innovative password security
2005o.html#42 Catch22. If you cannot legally be forced to sign a document etc - Tax Declaration etc etc etc
2005o.html#3 The Chinese MD5 attack
2005o.html#2 X509 digital certificate for offline solution
2005o.html#1 The Chinese MD5 attack
2005n.html#28 solving the wrong problem
2005n.html#23 Online ID Thieves Exploit Lax ATM Security
2005n.html#5 Wildcard SSL Certificates
2005m.html#6 Creating certs for others (without their private keys)
2005l.html#36 More Phishing scams, still no SSL being used
2005l.html#24 The Worth of Verisign's Brand
2005l.html#23 The Worth of Verisign's Brand
2005l.html#19 Bank of America - On Line Banking *NOT* Secure?
2005l.html#18 The Worth of Verisign's Brand
2005l.html#17 The Worth of Verisign's Brand
2005l.html#13 The Worth of Verisign's Brand
2005k.html#56 Encryption Everywhere? (Was: Re: Ho boy! Another big one!)
2005k.html#3 Public disclosure of discovered vulnerabilities
2005j.html#53 Banks
2005j.html#52 Banks
2005j.html#23 Public disclosure of discovered vulnerabilities
2005j.html#22 Public disclosure of discovered vulnerabilities
2005j.html#3 Request for comments - anti-phishing approach
2005i.html#36 Improving Authentication on the Internet
2005i.html#34 The Worth of Verisign's Brand
2005i.html#33 Improving Authentication on the Internet
2005i.html#19 Improving Authentication on the Internet
2005i.html#11 Revoking the Root
2005i.html#10 Revoking the Root
2005i.html#1 Brit banks introduce delays on interbank xfers due to phishing boom
2005i.html#0 More Phishing scams, still no SSL being used
2005g.html#57 Security via hardware?
2005g.html#57 Security via hardware?
2005g.html#46 Maximum RAM and ROM for smartcards
2005g.html#42 TCP channel half closed
2005g.html#41 Maximum RAM and ROM for smartcards
2005g.html#37 MVS secure configuration standard
2005g.html#33 Good passwords and security priorities
2005f.html#25 Where should the type information be: in tags and descriptors
2005f.html#25 Where should the type information be: in tags and descriptors
2005f.html#9 TLS-certificates and interoperability-issues sendmail/Exchange/postfix
2005e.html#41 xml-security vs. native security
2005e.html#31 Public/Private key pair protection on Windows
2005d.html#0 [Lit.] Buffer overruns
2005c.html#34 [Lit.] Buffer overruns
2005c.html#32 [Lit.] Buffer overruns
2005c.html#30 [Lit.] Buffer overruns
2005c.html#29 [Lit.] Buffer overruns
2005c.html#28 [Lit.] Buffer overruns
2005b.html#66 [Lit.] Buffer overruns
2005b.html#43 [Lit.] Buffer overruns
2005.html#14 Using smart cards for signing and authorization in applets
2004p.html#22 need a firewall
2004p.html#21 need a firewall
2004m.html#34 tracking 64bit storage
2004m.html#34 tracking 64bit storage
2004m.html#26 Shipwrecks
2004m.html#26 Shipwrecks
2004m.html#25 Shipwrecks
2004m.html#25 Shipwrecks
2004l.html#63 Actuarial facts
2004l.html#21 "Perfect" or "Provable" security both crypto and non-crypto?
2004k.html#22 Public key authentication defeats passwd age warning
2004k.html#7 A quote from Crypto-Gram
2004j.html#58 Vintage computers are better than modern crap !
2004j.html#56 RFCs that reference MD5
2004j.html#39 Methods of payment
2004j.html#38 Vintage computers are better than modern crap !
2004j.html#37 Vintage computers are better than modern crap !
2004j.html#35 A quote from Crypto-Gram
2004j.html#34 Vintage computers are better than modern crap !
2004j.html#32 Vintage computers are better than modern crap !
2004j.html#29 Vintage computers are better than modern crap !
2004j.html#28 Vintage computers are better than modern crap !
2004j.html#15 US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
2004j.html#14 US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
2004i.html#5 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#5 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#4 Adventure game (was:PL/? History (was Hercules))
2004h.html#2 Adventure game (was:PL/? History (was Hercules))
2004g.html#45 command line switches [Re: [REALLY OT!] Overuse of symbolic constants]
2004g.html#41 [URL] (about) passwords
2004f.html#31 MITM attacks
2004f.html#20 Why does Windows allow Worms?
2004b.html#50 The SOB that helped IT jobs move to India is dead!
2004b.html#48 Automating secure transactions
2004b.html#48 Automating secure transactions
2004b.html#39 SSL certificates
2004b.html#39 SSL certificates
2004b.html#25 Who is the most likely to use PK?
2004b.html#25 Who is the most likely to use PK?
2004.html#30 Threat of running a web server?
2003p.html#6 Does OTP need authentication?
2003o.html#50 Pub/priv key security
2003o.html#37 Security of Oyster Cards
2003o.html#35 Humans
2003o.html#29 Biometric cards will not stop identity fraud
2003o.html#22 securID weakness
2003o.html#19 More -Fake- Earthlink Inquiries
2003o.html#9 Bank security question (newbie question)
2003o.html#8 Bank security question (newbie question)
2003o.html#6 perfomance vs. key size
2003o.html#5 perfomance vs. key size
2003o.html#4 Bank security question (newbie question)
2003o.html#3 Bank security question (newbie question)
2003n.html#20 which CPU for educational purposes?
2003n.html#17 which CPU for educational purposes?
2003n.html#14 Poor people's OS?
2003n.html#10 Cracking SSL
2003n.html#3 public key vs passwd authentication?
2003n.html#2 public key vs passwd authentication?
2003n.html#1 public key vs passwd authentication?
2003n.html#0 public key vs passwd authentication?
2003m.html#51 public key vs passwd authentication?
2003l.html#3 S/360 Engineering Changes
2003l.html#2 S/360 Engineering Changes
2003j.html#17 pbx security from 20 years ago
2003j.html#15 A Dark Day
2003j.html#8 A Dark Day
2003j.html#4 A Dark Day
2003i.html#59 grey-haired assembler programmers (Ritchie's C)
2003h.html#26 HELP, Vulnerability in Debit PIN Encryption security, possibly
2003h.html#25 HELP, Vulnerability in Debit PIN Encryption security, possibly
2003h.html#24 HELP, Vulnerability in Debit PIN Encryption security, possibly
2003g.html#17 Can someone clarify, X509 spoofing?
2003g.html#16 Can someone clarify, X509 spoofing?
2003e.html#78 Microsoft strikes again - from comp.risks
2003e.html#41 Why we don't use homebrew crypto
2003e.html#41 Why we don't use homebrew crypto
2003d.html#30 SSL questions
2003d.html#30 SSL questions
2003b.html#55 Microsoft worm affecting Automatic Teller Machines
2003b.html#55 Microsoft worm affecting Automatic Teller Machines
2003b.html#55 Microsoft worm affecting Automatic Teller Machines
2003b.html#55 Microsoft worm affecting Automatic Teller Machines
2003b.html#53 Microsoft worm affecting Automatic Teller Machines
2003b.html#53 Microsoft worm affecting Automatic Teller Machines
2002p.html#9 Cirtificate Authorities 'CAs', how curruptable are they to
2002n.html#14 So how does it work... (public/private key)
2002n.html#14 So how does it work... (public/private key)
2002n.html#2 SRP authentication for web app
2002n.html#2 SRP authentication for web app
2002m.html#55 Beware, Intel to embed digital certificates in Banias
2002m.html#55 Beware, Intel to embed digital certificates in Banias
2002m.html#36 (OT) acceptance of technology, was: Convenient and secure
2002m.html#36 (OT) acceptance of technology, was: Convenient and secure
2002m.html#27 Root certificate definition
2002m.html#27 Root certificate definition
2002m.html#19 A new e-commerce security proposal
2002m.html#19 A new e-commerce security proposal
2002m.html#17 A new e-commerce security proposal
2002m.html#17 A new e-commerce security proposal
2002m.html#6 Dumb Question - Hardend Site ?
2002m.html#6 Dumb Question - Hardend Site ?
2002l.html#45 Thirty Years Later: Lessons from the Multics Security Evaluation
2002l.html#35 Cryptography
2002l.html#35 Cryptography
2002l.html#20 Backdoor in AES ?
2002l.html#11 IEEE article on intelligence and security
2002l.html#11 IEEE article on intelligence and security
2002k.html#36 ... certification addenda
2002k.html#36 ... certification addenda
2002k.html#11 Serious vulnerablity in several common SSL implementations?
2002k.html#11 Serious vulnerablity in several common SSL implementations?
2002j.html#63 SSL integrity guarantees in abscense of client certificates
2002j.html#60 How to map a user account to a digital cert?
2002j.html#38 MITM solved by AES/CFB - am I missing something?!
2002j.html#14 Symmetric-Key Credit Card Protocol on Web Site
2002i.html#74 A Lesson In Security
2002i.html#74 A Lesson In Security
2002i.html#72 A Lesson In Security
2002i.html#62 subjective Q. - what's the most secure OS?
2002h.html#6 Biometric authentication for intranet websites?
2002h.html#6 Biometric authentication for intranet websites?
2002f.html#34 Security and e-commerce
2002f.html#34 Security and e-commerce
2002f.html#31 Security and e-commerce
2002f.html#31 Security and e-commerce
2002f.html#27 Security Issues of using Internet Banking
2002f.html#27 Security Issues of using Internet Banking
2002f.html#10 Least folklorish period in computing (was Re: IBM Mainframe at home)
2002e.html#58 O'Reilly C Book
2002d.html#11 Security Proportional to Risk (was: IBM Mainframe at home)
2002d.html#8 Security Proportional to Risk (was: IBM Mainframe at home)
2002c.html#23 Opinion on smartcard security requested
2002c.html#22 Opinion on smartcard security requested
2002c.html#15 Opinion on smartcard security requested
2002c.html#10 Opinion on smartcard security requested
2002c.html#7 Opinion on smartcard security requested
2002.html#44 Calculating a Gigalapse
2002.html#32 Buffer overflow
2002.html#25 ICMP Time Exceeded
2002.html#24 Buffer overflow
2002.html#23 Buffer overflow
2002.html#20 Younger recruits versus experienced veterans ( was Re: The demise of compaq
2002.html#19 Buffer overflow
2001n.html#93 Buffer overflow
2001n.html#91 Buffer overflow
2001n.html#90 Buffer overflow
2001n.html#30 FreeBSD more secure than Linux
2001m.html#27 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
2001l.html#49 Virus propagation risks
2001l.html#10 E-commerce security????
2001k.html#58 I-net banking security
2001k.html#55 I-net banking security
2001k.html#53 Why is UNIX semi-immune to viral infection?
2001k.html#43 Why is UNIX semi-immune to viral infection?
2001k.html#34 A thought on passwords
2001k.html#34 A thought on passwords
2001k.html#1 Are client certificates really secure?
2001k.html#0 Are client certificates really secure?
2001j.html#54 Does "Strong Security" Mean Anything?
2001j.html#52 Are client certificates really secure?
2001j.html#44 Does "Strong Security" Mean Anything?
2001j.html#43 Disaster Stories Needed
2001j.html#9 E-commerce security????
2001j.html#5 E-commerce security????
2001j.html#2 E-commerce security????
2001j.html#0 E-commerce security????
2001i.html#57 E-commerce security????
2001i.html#56 E-commerce security????
2001i.html#55 Computer security: The Future
2001i.html#54 Computer security: The Future
2001i.html#54 Computer security: The Future
2001i.html#26 No Trusted Viewer possible?
2001i.html#25 Net banking, is it safe???
2001i.html#16 Net banking, is it safe???
2001i.html#9 Net banking, is it safe???
2001i.html#9 Net banking, is it safe???
2001h.html#70 Net banking, is it safe???
2001h.html#68 Net banking, is it safe???
2001h.html#67 Would this type of credit card help online shopper to feel more secure?
2001h.html#64 Net banking, is it safe???
2001h.html#61 Net banking, is it safe???
2001h.html#61 Net banking, is it safe???
2001h.html#7 PKI/Digital signature doesn't work
2001g.html#63 PKI/Digital signature doesn't work
2001g.html#62 PKI/Digital signature doesn't work
2001g.html#38 distributed authentication
2001f.html#40 Remove the name from credit cards!
2001f.html#35 Security Concerns in the Financial Services Industry
2001f.html#33 IBM's "VM for the PC" c.1984??
2001f.html#31 Remove the name from credit cards!
2001f.html#25 Question about credit card number
2001f.html#24 Question about credit card number
2001f.html#15 Medical data confidentiality on network comms
2001e.html#82 The Mind of War: John Boyd and American Security
2001e.html#77 Apology to Cloakware (open letter)
2001e.html#48 Where are IBM z390 SPECint2000 results?
2001e.html#39 Can I create my own SSL key?
2001e.html#37 Can I create my own SSL key?
2001d.html#62 OT Re: A beautiful morning in AFM
2001d.html#58 Very CISC Instuctions (Was: why the machine word size ...)
2001d.html#56 Pentium 4 Prefetch engine?
2001d.html#41 solicit advice on purchase of digital certificate
2001d.html#19 [Newbie] Authentication vs. Authorisation?
2001d.html#1 SSL question
2001c.html#73 PKI and Non-repudiation practicalities
2001c.html#61 Risk management vs security policy
2001c.html#59 PKI and Non-repudiation practicalities
2001c.html#58 PKI and Non-repudiation practicalities
2001c.html#54 PKI and Non-repudiation practicalities
2001c.html#51 PKI and Non-repudiation practicalities
2001c.html#50 PKI and Non-repudiation practicalities
2001c.html#47 PKI and Non-repudiation practicalities
2001c.html#46 PKI and Non-repudiation practicalities
2001c.html#45 PKI and Non-repudiation practicalities
2001c.html#44 PKI and Non-repudiation practicalities
2001c.html#42 PKI and Non-repudiation practicalities
2001c.html#41 PKI and Non-repudiation practicalities
2001c.html#38 How Commercial-Off-The-Shelf Systems make society vulnerable
2001c.html#32 How Commercial-Off-The-Shelf Systems make society vulnerable
2001c.html#30 PKI and Non-repudiation practicalities
2001c.html#15 OS/360 (was LINUS for S/390)
2001b.html#58 Checkpoint better than PIX or vice versa???
2000g.html#41 Egghead cracked, MS IIS again
2000g.html#35 does CA need the proof of acceptance of key binding?
2000g.html#33 does CA need the proof of acceptance of key binding?
2000f.html#72 SET; was Re: Why trust root CAs?
2000f.html#69 TSS ancient history, was X86 ultimate CISC? designs)
2000f.html#64 Cryptogram Newsletter is off the wall?
2000f.html#50 Al Gore and the Internet (Part 2 of 2)
2000f.html#22 Why trust root CAs?
2000f.html#14 Why trust root CAs?
2000f.html#4 Why trust root CAs?
2000f.html#1 Why trust root CAs?
2000e.html#45 IBM's Workplace OS (Was: .. Pink)
2000e.html#44 Why trust root CAs?
2000c.html#40 Domainatrix - the final word
2000b.html#22 ooh, a real flamewar :)
2000b.html#17 ooh, a real flamewar :)
2000.html#60 RealNames hacked. Firewall issues
2000.html#57 RealNames hacked. Firewall issues
2000.html#46 question about PKI
2000.html#42 "Trusted" CA - Oxymoron?
2000.html#36 "Trusted" CA - Oxymoron?
2000.html#32 Homework: Negative side of MVS?
2000.html#28 Homework: Negative side of MVS?
aadsm28.htm#81 not crypto, but fraud detection
aadsm28.htm#80 not crypto, but fraud detection
aadsm28.htm#77 How safe do you feel when using a debit or credit card?
aadsm28.htm#75 Fun with Data Theft/Breach Numbers
aadsm28.htm#74 Visa and MasterCard mandated PCI compliance as of Jan 1, 2008. I would like to get a feel or opinion on this subject
aadsm28.htm#71 Paypal -- Practical Approaches to Phishing -- open white paper
aadsm28.htm#66 Would the Basel Committee's announced enhancement of Basel II Framework and other steps have prevented the current global financial crisis had they been implemented years ago?
aadsm28.htm#64 Seeking expert on credit card fraud prevention - particularly CNP/online transactions
aadsm28.htm#62 Who do we have to blame for the mortgage crisis in America?
aadsm28.htm#61 Is Basel 2 out...Basel 3 in?
aadsm28.htm#60 Seeking expert on credit card fraud prevention - particularly CNP/online transactions
aadsm28.htm#6 Death of antivirus software imminent
aadsm28.htm#58 Who do we have to blame for the mortgage crisis in America?
aadsm28.htm#57 Who do we have to blame for the mortgage crisis in America?
aadsm28.htm#54 Liability for breaches: do we need new laws?
aadsm28.htm#53 Pogo reports: big(gest) bank breach was covered up?
aadsm28.htm#52 Pogo reports: big(gest) bank breach was covered up?
aadsm28.htm#51 Liability for breaches: do we need new laws?
aadsm28.htm#50 Liability for breaches: do we need new laws?
aadsm28.htm#5 Why Security Modelling doesn't work -- the OODA-loop of today's battle
aadsm28.htm#46 The bond that fell to Earth
aadsm28.htm#41 Trojan with Everything, To Go!
aadsm28.htm#40 Attack on Brit retail payments -- some takeways
aadsm28.htm#38 The Trouble with Threat Modelling
aadsm28.htm#37 Attack on Brit retail payments -- some takeways
aadsm28.htm#33 on Revocation of Signing Certs and Public Key Signing itself
aadsm28.htm#3 Why Security Modelling doesn't work -- the OODA-loop of today's battle
aadsm28.htm#29 Chip&PIN cards: 1 in 5 cloned?
aadsm28.htm#28 middle banking in a english muddle
aadsm28.htm#27 Break the rules of governance and lose 4.9 billion
aadsm28.htm#25 middle banking in a english muddle
aadsm28.htm#21 Dutch Transport Card Broken
aadsm28.htm#2 Death of antivirus software imminent
aadsm28.htm#19 Lack of fraud reporting paths considered harmful
aadsm28.htm#18 Lack of fraud reporting paths considered harmful
aadsm28.htm#17 Lack of fraud reporting paths considered harmful
aadsm28.htm#15 Dutch Transport Card Broken
aadsm28.htm#14 Break the rules of governance and lose 4.9 billion
aadsm28.htm#13 Break the rules of governance and lose 4.9 billion
aadsm27.htm#8 Leadership, the very definition of fraud, and the court of security ideas
aadsm27.htm#7 Solution to phishing -- an idea who's time has come?
aadsm27.htm#64 How to crack RSA
aadsm27.htm#60 Retailers try to push data responsibilities back to banks
aadsm27.htm#59 Threatwatch - more data on cost of your identity
aadsm27.htm#53 Doom and Gloom spreads, security revisionism suggests "H6.5: Be an adept!"
aadsm27.htm#5 Leadership, the very definition of fraud, and the court of security ideas
aadsm27.htm#46 Threatwatch: how much to MITM, how quickly, how much lost
aadsm27.htm#45 Threatwatch: how much to MITM, how quickly, how much lost
aadsm27.htm#44 Threatwatch: how much to MITM, how quickly, how much lost
aadsm27.htm#43 a fraud is a sale, Re: The bank fraud blame game
aadsm27.htm#40 a fraud is a sale, Re: The bank fraud blame game
aadsm27.htm#39 a fraud is a sale, Re: The bank fraud blame game
aadsm27.htm#38 The bank fraud blame game
aadsm27.htm#35 The bank fraud blame game
aadsm27.htm#33 The bank fraud blame game
aadsm27.htm#32 The bank fraud blame game
aadsm27.htm#31 The bank fraud blame game
aadsm27.htm#3 Solution to phishing -- an idea who's time has come?
aadsm27.htm#2 Threatwatch: Still searching for the economic MITM
aadsm27.htm#13 Is this Risk Management's Waterloo?
aadsm27.htm#12 0wned .gov machines (was Re: Russian cyberwar against Estonia?)
aadsm27.htm#11 Is this Risk Management's Waterloo?
aadsm26.htm#8 What is the point of encrypting information that is publicly visible?
aadsm26.htm#70 WSJ: Soft evidence on a crypto-related breach
aadsm26.htm#7 Citibank e-mail looks phishy
aadsm26.htm#68 H6.1: Designing (Security) Without Requirements is like Building a Road Without a Route Map to a Destination You've Never Seen
aadsm26.htm#66 More Tipping Point evidence - POS vendors sued
aadsm26.htm#60 crypto component services - is there a market?
aadsm26.htm#6 Citibank e-mail looks phishy
aadsm26.htm#59 On cleaning up the security mess: escaping the self-perpetuating trap of Fraud?
aadsm26.htm#57 Our security sucks. Why can't we change? What's wrong with us?
aadsm26.htm#5 ATMs hacked using MP3 player
aadsm26.htm#47 SSL MITM-attacks make the news
aadsm26.htm#45 Cost of an identity
aadsm26.htm#41 PKI: The terrorists' secret weapon (part II)
aadsm26.htm#40 PKI: The terrorists' secret weapon
aadsm26.htm#4 Citibank e-mail looks phishy
aadsm26.htm#38 Usable Security 2007
aadsm26.htm#37 Threatwatch: $400 to 'own' your account
aadsm26.htm#35 Failure of PKI in messaging
aadsm26.htm#31 man in the middle, SSL ... addenda 2
aadsm26.htm#30 man in the middle, SSL
aadsm26.htm#3 Citibank e-mail looks phishy
aadsm26.htm#27 man in the middle, SSL ... addenda
aadsm26.htm#25 EV - what was the reason, again?
aadsm26.htm#23 It's a Presidential Mandate, Feds use it. How come you are not using FDE?
aadsm26.htm#22 Tamperproof, yet playing Tetris
aadsm26.htm#21 FC07 Preliminary Programme - Leaving Room for the Bad Guys
aadsm26.htm#17 Changing the Mantra -- RFC 4732 on rethinking DOS
aadsm26.htm#14 Who has a Core Competency in Security?
aadsm26.htm#12 Who has a Core Competency in Security?
aadsm26.htm#11 What is the point of encrypting information that is publicly visible?
aadsm26.htm#0 Flaw in RFID-enabled passports (part 2?)
aadsm25.htm#9 DDA cards may address the UK Chip&Pin woes
aadsm25.htm#46 Flaw exploited in RFID-enabled passports
aadsm25.htm#45 hashes on restricted domains: random functions or permutations?
aadsm25.htm#43 Audit Follies - Atlantic differences, branding UnTrust, thunbs on Sarbanes-Oxley, alternates
aadsm25.htm#4 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#39 How the Classical Scholars dropped security from the canon of Computer Science
aadsm25.htm#25 RSA SecurID SID800 Token vulnerable by design
aadsm25.htm#24 DDA cards may address the UK Chip&Pin woes
aadsm25.htm#21 Identity v. anonymity -- that is not the question
aadsm25.htm#20 Identity v. anonymity -- that is not the question
aadsm25.htm#18 Fraudwatch - Chip&PIN one-sided story, banks and deception and liability shifts
aadsm25.htm#17 Hamiltonian path as protection against DOS
aadsm25.htm#16 Fraudwatch - Chip&PIN one-sided story, banks and deception and liability shifts
aadsm25.htm#13 Sarbanes-Oxley is what you get when you don't do FC
aadsm25.htm#11 And another cloning tale
aadsm25.htm#10 Crypto to defend chip IP: snake oil or good idea?
aadsm24.htm#9 Naked Payments IV - let's all go naked
aadsm24.htm#8 Microsoft - will they bungle the security game?
aadsm24.htm#7 Naked Payments IV - let's all go naked
aadsm24.htm#6 Securely handling credit card transactions earns Blackboard kudos
aadsm24.htm#52 Crypto to defend chip IP: snake oil or good idea?
aadsm24.htm#48 more on FBI plans new Net-tapping push
aadsm24.htm#47 More Brittle Security -- Agriculture
aadsm24.htm#46 More Brittle Security -- Agriculture
aadsm24.htm#43 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#41 Naked Payments IV - let's all go naked
aadsm24.htm#40 Interesting bit of a quote
aadsm24.htm#39 Interesting bit of a quote
aadsm24.htm#38 Interesting bit of a quote
aadsm24.htm#37 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#36 Interesting bit of a quote
aadsm24.htm#35 Interesting bit of a quote
aadsm24.htm#34 Phishers Defeat 2-Factor Auth
aadsm24.htm#33 Threatwatch - 2-factor tokens attacked by phishers
aadsm24.htm#32 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#30 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#3 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm24.htm#27 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#26 Naked Payments IV - let's all go naked
aadsm24.htm#25 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm24.htm#22 Naked Payments IV - let's all go naked
aadsm24.htm#21 Use of TPM chip for RNG?
aadsm24.htm#2 UK Banks Expected To Move To DDA EMV Cards
aadsm24.htm#14 Naked Payments IV - let's all go naked
aadsm24.htm#12 Naked Payments IV - let's all go naked
aadsm24.htm#10 Naked Payments IV - let's all go naked
aadsm24.htm#1 UK Detects Chip-And-PIN Security Flaw
aadsm24.htm#0 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm23.htm#9 PGP "master keys"
aadsm23.htm#56 UK Detects Chip-And-PIN Security Flaw
aadsm23.htm#55 UK Detects Chip-And-PIN Security Flaw
aadsm23.htm#54 Status of SRP
aadsm23.htm#53 Status of SRP
aadsm23.htm#49 Status of SRP
aadsm23.htm#44 ThreatWatch - markets in loss, Visa's take, 419 "chairmen"
aadsm23.htm#34 Chip-and-Pin terminals were replaced by "repairworkers"?
aadsm23.htm#33 Chip-and-Pin terminals were replaced by "repairworkers"?
aadsm23.htm#32 Chip-and-Pin terminals were replaced by "repairworkers"?
aadsm23.htm#31 JIBC April 2006 - "Security Revisionism"
aadsm23.htm#30 Petrol firm suspends chip-and-pin
aadsm23.htm#28 JIBC April 2006 - "Security Revisionism"
aadsm23.htm#27 Chip-and-Pin terminals were replaced by "repairworkers"?
aadsm23.htm#26 Petrol firm suspends chip-and-pin
aadsm23.htm#25 Petrol firm suspends chip-and-pin
aadsm23.htm#21 Reliable Connections Are Not
aadsm23.htm#20 Petrol firm suspends chip-and-pin
aadsm23.htm#2 News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
aadsm23.htm#19 Petrol firm suspends chip-and-pin
aadsm23.htm#18 Security Soap Opera - (Central) banks don't (want to) know, MS prefers Brand X, airlines selling your identity, first transaction trojan
aadsm23.htm#17 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm23.htm#16 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm23.htm#13 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm23.htm#10 PGP "master keys"
aadsm23.htm#1 RSA Adaptive Authentication
aadsm23.htm#0 Separation of Roles - an example
aadsm22.htm#7 long-term GPG signing key
aadsm22.htm#6 long-term GPG signing key
aadsm22.htm#5 long-term GPG signing key
aadsm22.htm#48 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm22.htm#47 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm22.htm#46 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm22.htm#45 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm22.htm#44 Creativity and security
aadsm22.htm#40 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#39 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#38 Creativity and security
aadsm22.htm#36 Unforgeable Blinded Credentials
aadsm22.htm#34 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#33 Meccano Trojans coming to a desktop near you
aadsm22.htm#31 Creativity and security
aadsm22.htm#30 Creativity and security
aadsm22.htm#29 Meccano Trojans coming to a desktop near you
aadsm22.htm#28 Meccano Trojans coming to a desktop near you
aadsm22.htm#27 Meccano Trojans coming to a desktop near you
aadsm22.htm#26 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#25 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#23 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#22 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#21 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#20 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#2 GP4.3 - Growth and Fraud - Case #3 - Phishing
aadsm22.htm#19 "doing the CA statement shuffle" and other dances
aadsm22.htm#18 "doing the CA statement shuffle" and other dances
aadsm22.htm#16 serious threat models
aadsm22.htm#13 Face and fingerprints swiped in Dutch biometric passport crack (another card skim vulnerability)
aadsm22.htm#12 thoughts on one time pads
aadsm22.htm#11 thoughts on one time pads
aadsm22.htm#10 thoughts on one time pads
aadsm22.htm#1 GP4.3 - Growth and Fraud - Case #3 - Phishing
aadsm21.htm#5 Is there any future for smartcards?
aadsm21.htm#42 Phishers now targetting SSL
aadsm21.htm#36 browser vendors and CAs agreeing on high-assurance certificates
aadsm21.htm#34 X.509 / PKI, PGP, and IBE Secure Email Technologies
aadsm21.htm#16 PKI too confusing to prevent phishing, part 28
aadsm21.htm#15 Contactless payments and the security challenges
aadsm21.htm#14 Online fraud 'ahead' of credit-card companies-experts
aadsm21.htm#0 ID theft ring proves difficult to stop
aadsm20.htm#30 How much for a DoD X.509 certificate?
aadsm20.htm#3 City National Bank is the latest major US company to admit it has lost customer data
aadsm20.htm#29 How much for a DoD X.509 certificate?
aadsm20.htm#24 [Clips] Escaping Password Purgatory
aadsm20.htm#2 US consumers want companies fined for security breaches
aadsm20.htm#1 Keeping an eye on ATM fraud
aadsm19.htm#7 JIE - Contracts in Cyberspace
aadsm19.htm#5 Do You Need a Digital ID?
aadsm19.htm#45 payment system fraud, etc
aadsm19.htm#44 massive data theft at MasterCard processor
aadsm19.htm#41 massive data theft at MasterCard processor
aadsm19.htm#39 massive data theft at MasterCard processor
aadsm19.htm#38 massive data theft at MasterCard processor
aadsm19.htm#34 encrypted tapes (was Re: Papers about "Algorithm hiding" ?)
aadsm19.htm#28 "SSL stops credit card sniffing" is a correlation/causality myth
aadsm19.htm#26 Trojan horse attack involving many major Israeli companies, executives
aadsm19.htm#23 Citibank discloses private information to improve security
aadsm19.htm#22 Citibank discloses private information to improve security
aadsm19.htm#19 "SSL stops credit card sniffing" is a correlation/causality myth
aadsm19.htm#18 Citibank discloses private information to improve security
aadsm19.htm#17 What happened with the session fixation bug?
aadsm18.htm#9 E-commerce attack imminent; Sudden increase in port scanning for SSL doesn't look good
aadsm18.htm#8 E-commerce attack imminent; Sudden increase in port scanning for SSL doesn't look good
aadsm18.htm#55 MD5 collision in X509 certificates
aadsm18.htm#54 MD5 collision in X509 certificates
aadsm18.htm#53 ATM machine security
aadsm18.htm#49 one more time now, Leading Cause of Data Security breaches Are Due to Insiders, Not Outsiders
aadsm18.htm#46 Banks Test ID Device for Online Security
aadsm18.htm#45 Banks Test ID Device for Online Security
aadsm18.htm#37 Fake Companies, real money; elaborate con wrings cash out of stolen credit cards
aadsm18.htm#36 Phishing losses total $500 million - Nacha
aadsm18.htm#35 Credit card leaks continue at a furious pace
aadsm18.htm#20 RPOW - Reusable Proofs of Work
aadsm18.htm#2 dual-use digital signature vulnerability
aadsm18.htm#19 RPOW - Reusable Proofs of Work
aadsm18.htm#18 Any TLS server key compromises?
aadsm18.htm#17 should you trust CAs? (Re: dual-use digital signature vulnerability)
aadsm18.htm#12 dual-use digital signature vulnerability
aadsm18.htm#11 E-commerce attack imminent; Sudden increase in port scanning for SSL doesn't look good
aadsm18.htm#10 E-commerce attack imminent; Sudden increase in port scanning for SSL doesn't look good
aadsm18.htm#1 dual-use digital signature vulnerability
aadsm17.htm#60 Using crypto against Phishing, Spoofing and Spamming
aadsm17.htm#59 dual-use digital signature vulnerability
aadsm17.htm#58 Using crypto against Phishing, Spoofing and Spamming
aadsm17.htm#57 dual-use digital signature vulnerability
aadsm17.htm#56 Question on the state of the security industry
aadsm17.htm#55 Using crypto against Phishing, Spoofing and Spamming
aadsm17.htm#51 authentication and authorization
aadsm17.htm#50 authentication and authorization (was: Question on the state of the security industry)
aadsm17.htm#49 Use cash machines as little as possible
aadsm17.htm#47 authentication and authorization ... addenda
aadsm17.htm#46 authentication and authorization (was: Question on the state of the security industry)
aadsm17.htm#44 Is finding security holes a good idea?
aadsm17.htm#43 Is finding security holes a good idea?
aadsm17.htm#42 Article on passwords in Wired News
aadsm17.htm#38 Study: ID theft usually an inside job
aadsm17.htm#35 Online credit card fraud rocks Indonesia
aadsm17.htm#32 visa cards violated, BofA reissuing after hack attack
aadsm17.htm#22 secret hackers to aid war on internet fraud
aadsm17.htm#13 A combined EMV and ID card
aadsm17.htm#11 are debit cards safe?
aadsm17.htm#10 fraud and phishing attacks soar
aadsm16.htm#7 The Digital Insider: Backdoor Trojans ... fyi
aadsm16.htm#6 ATM Fraud, Banking Your Money
aadsm16.htm#2 Electronic Safety and Soundness: Securing Finance in a New Age
aadsm16.htm#0 Identity Fraud costs Austrilia AU$1 billion a year
aadsm15.htm#5 Is cryptography where security took the wrong branch?
aadsm15.htm#29 SSL, client certs, and MITM (was WYTM?)
aadsm15.htm#23 NCipher Takes Hardware Security To Network Level
aadsm15.htm#22 Trusting the Tools - was Re: Open Source
aadsm14.htm#9 "Marginot Web" (SSL, payments, etc)
aadsm14.htm#57 Kinko's spy case: Risks of renting PC's
aadsm14.htm#53 IT Managers Critical Front in War on Identity Theft
aadsm14.htm#51 Feds, industry warn of spike in ID theft scams
aadsm14.htm#5 Who's afraid of Mallory Wolf?
aadsm14.htm#39 An attack on paypal
aadsm14.htm#35 The real problem that https has conspicuously failed to fix
aadsm14.htm#34 virus attack on banks (was attack on paypal)
aadsm14.htm#33 An attack on paypal
aadsm14.htm#32 An attack on paypal
aadsm14.htm#3 Armoring websites
aadsm14.htm#22 Identity Theft Losses Expected to Hit $2 Trillion by 2005
aadsm14.htm#2 Who's afraid of Mallory Wolf? (addenda)
aadsm14.htm#12 Tackling security threats from within
aadsm12.htm#58 Time to ID Identity-Theft Solutions
aadsm12.htm#57 eBay Customers Targetted by Credit Card Scam
aadsm12.htm#47 Online Fraud Growing in Scale, Sophistication
aadsm12.htm#46 Fraudit helps registrars battle global online fraud
aadsm12.htm#40 In Brief: Anti-'Skimming' Guidelines Coming
aadsm12.htm#36 two other financial electronic security related URLs
aadsm12.htm#35 Electronic Security: Risk Mitigation in Financial Transactions
aadsm12.htm#31 The Bank-model Was: Employee Certificates - Security Issues
aadsm12.htm#12 TOC for world bank e-security paper
aadsm12.htm#11 Some security, fraud, attack, threat, references
aadsm11.htm#45 Web site exposes credit card fraud
aadsm11.htm#44 Web site exposes credit card fraud
aadsm10.htm#tamper Limitations of limitations on RE/tampering (was: Re: biometrics)
aadsm10.htm#smallpay2 Small/Secure Payment Business Models
aadsm10.htm#risks credit card & gift card fraud (from today's comp.risks)
aadsm10.htm#hackhome Hackers Targeting Home Computers
aadsm10.htm#cfppki18 CFP: PKI research workshop
aadsm10.htm#cfppki15 CFP: PKI research workshop
aadsm10.htm#cfppki14 CFP: PKI research workshop
aadsm10.htm#cfppki13 CFP: PKI research workshop
aadsm10.htm#biometrics biometrics
aadsm9.htm#carnivore Shades of FV's Nathaniel Borenstein: Carnivore's "Magic Lantern"
aadsm8.htm#rhose17 when a fraud is a sale, Re: Rubber hose attack]
aadsm8.htm#3dvulner3 3D Secure Vulnerabilities?
aadsm8.htm#3dvulner2 3D Secure Vulnerabilities?
aadsm8.htm#3dvulner 3D Secure Vulnerabilities?
aadsm7.htm#rubberhose Rubber hose attack
aadsm7.htm#rhose5 when a fraud is a sale, Re: Rubber hose attack
aadsm7.htm#auth Who or what to authenticate?
aadsm7.htm#3dsecure 3D Secure Vulnerabilities?
aadsm6.htm#websecure merchant web server security
aadsm6.htm#terror9 Did Encryption Empower These Terrorists?
aadsm6.htm#terror8 Did Encryption Empower These Terrorists?
aadsm6.htm#terror7 Did Encryption Empower These Terrorists?
aadsm6.htm#terror6 Did Encryption Empower These Terrorists?
aadsm6.htm#terror5 Did Encryption Empower These Terrorists?
aadsm6.htm#terror4 Did Encryption Empower These Terrorists?
aadsm6.htm#terror3 Did Encryption Empower These Terrorists?
aadsm6.htm#terror14 Did Encryption Empower These Terrorists?
aadsm6.htm#terror13 Did Encryption Empower These Terrorists?
aadsm6.htm#terror10 Did Encryption Empower These Terrorists?
aadsm6.htm#terror Did Encryption Empower These Terrorists?
aepay12.htm#8 Know your security onions (or security proportional to risk)
aepay12.htm#7 Bugwatch: Know your security onions
aepay12.htm#6 Know Your Enemy Automated Credit Card Fraud (automated, forwarded)
aepay12.htm#35 Citibank customers hit with e-mail scam
aepay12.htm#32 Internet Fraud & Attacks on the rise
aepay12.htm#30 ID Theft Often Goes Unrecognized
aepay12.htm#26 Bank One Calls Attention to ID Theft
aepay12.htm#24 More on the ID theft saga
aepay12.htm#23 Police smash UK's biggest credit card fraud ring
aepay12.htm#21 FTC Says ID Theft Greater Problem Than Originally Thought
aepay12.htm#19 Tech firms band together on ID theft
aepay12.htm#14 Technology and Crime, Criminal Intelligence Service Canada - 2003
aepay12.htm#13 Hacker's compromise Navy purchase card
aepay12.htm#12 Identity theft rockets 80 per cent
aepay12.htm#11 Net Worm Heightens Security Concerns
aepay11.htm#9 Bank of America ATMs Disrupted by Virus
aepay11.htm#8 Internet Consumer Fraud Continues to Rise
aepay11.htm#7 FTC says incidence of ID theft jumped in 2002
aepay11.htm#65 E-merchants Turn Fraud-busters (somewhat related)
aepay11.htm#64 EFTA to Adaopt ATM Ant-Fraud Measures
aepay11.htm#63 E-merchants Turn Fraud-busters
aepay11.htm#57 US warns banks about virus
aepay11.htm#47 Actual Losses To Identity Fraud Top $1 Billion
aepay11.htm#41 Be Prepared: Gartner Outlines Top Security Risks
aepay11.htm#40 ID theft costs banks $1 billion a year
aepay11.htm#33 Spam's Being Used For Identity Theft And Blackmail, Symantec Says
aepay11.htm#32 Don't-Ask-Don't-Tell E-commerce
aepay11.htm#3 Ministers to Act on Rise in Identity Theft
aepay11.htm#22 FBI Probing Theft of 8 Million Credit Card Numbers
aepay11.htm#18 Hacker accesses 2.2 million credit cards
aepay11.htm#17 Criminals using high-tech methods for old-style crimes
aepay11.htm#12 Star study: Identity Theft In The United States: An Update
aepay10.htm#83 SSL certs & baby steps
aepay10.htm#82 SSL certs & baby steps (addenda)
aepay10.htm#81 SSL certs & baby steps
aepay10.htm#65 eBay Customers Targetted by Credit Card Scam
aepay10.htm#64 eBay Customers Targetted by Credit Card Scam
aepay10.htm#45 Credit card theft feared in Windows flaw
aepay10.htm#44 Credit Card Skimming Rising In The US
aepay10.htm#41 ATM Scams - Whose Liability Is It, Anyway?
aepay10.htm#4 Credit Card Scam
aepay10.htm#16 Worker Accused of Selling Colleagues' ID's Online (credit card scam)
aepay9.htm#skim High-tech Thieves Snatch Data From ATMs (including PINs)
aepay9.htm#risks credit card & gift card fraud (from today's comp.risks)
aepay8.htm#x959paper Credit Card Fraud and E-Commerce: A Case Study
aepay8.htm#vulner ccount number & shared-secret vulnerabilities
aepay8.htm#visapass VISA: All Your Password Are Belong to Us
aepay8.htm#ccfraud2 Statistics for General and Online Card Fraud
aepay8.htm#ccfraud Almost Half UK E-Shopper's Fear Card Fraud (CC fraud increased by 50% in 2k)
aepay7.htm#netsecure some recent threads on netbanking & e-commerce security
aepay7.htm#netbank2 net banking, is it safe?? ... security proportional to risk
aepay7.htm#netbank net banking, is it safe?? ... power to the consumer
aepay7.htm#idtheft2 Reports of Identity Theft Still Rising Fast
aepay7.htm#idtheft Another Thing to Feer: ID Theft
aepay7.htm#fakeid Fake IDs swamp police
aepay7.htm#3dsecure4 3D Secure Vulnerabilities? Photo ID's and Payment Infrastructure
aepay7.htm#3dsecure2 3D Secure Vulnerabilities? Photo ID's and Payment Infrastructure
aepay7.htm#3dsecure 3D Secure Vulnerabilities? Photo ID's and Payment Infrastructure
aepay6.htm#ccfraud3 "out of control credit card fraud"
aepay6.htm#ccfraud2 "out of control credit card fraud"
99.html#240 Attacks on a PKI
99.html#238 Attacks on a PKI
99.html#235 Attacks on a PKI
99.html#228 Attacks on a PKI
99.html#189 Internet Credit Card Security
99.html#172 checks (was S/390 on PowerPC?)
99.html#171 checks (was S/390 on PowerPC?)
99.html#170 checks (was S/390 on PowerPC?)
99.html#168 checks (was S/390 on PowerPC?)
99.html#167 checks (was S/390 on PowerPC?)
99.html#163 IBM Assembler 101
99.html#156 checks (was S/390 on PowerPC?)
99.html#136 checks (was S/390 on PowerPC?)
99.html#85 Perfect Code
98.html#41 AADS, X9.59, & privacy
aepay6.htm#ccfraud latest credit scam puts plastic in peril ... is your credit card being cloned?
aepay6.htm#erictalk Announce: Eric Hughes giving Stanford EE380 talk this
aepay6.htm#harvest harvesting of credit card numbers
aepay6.htm#vouc implementations of "XML Voucher: Generic Voucher Language"?
aepay6.htm#docstore ANSI X9 Electronic Standards "store"
aepay6.htm#x959b X9.59 Electronic Payment standard issue
aepay6.htm#fraud Online Card Fraud Thirty Times That Offline
aepay5.htm#crackegg hackers crack egghead.com
aepay5.htm#pkiillfit Some PKI references from yesterday's SlashDot
aepay4.htm#visaset2 Visa Delicately Gives Hook to SET Standard
aepay4.htm#dnsinteg1 Domain Name integrity problem
aepay4.htm#privis privacy issues
aepay3.htm#smrtcrd Smart Cards with Chips encouraged ... fyi
aepay3.htm#x959risk4 Risk Management in AA / draft X9.59
aepay3.htm#x959risk3 Risk Management in AA / draft X9.59
aepay3.htm#x959risk2 Risk Management in AA / draft X9.59
aepay3.htm#x959risk1 Risk Management in AA / draft X9.59
aepay3.htm#aadsrel1 AADS related information
aepay3.htm#aadsrel1 AADS related information
aepay3.htm#aadsrel1 AADS related information
aepay3.htm#aadsrel1 AADS related information
aepay3.htm#aadsrel1 AADS related information
aepay3.htm#riskm The Thread Between Risk Management and Information Security
aepay2.htm#aadspriv Account Authority Digital Signatures ... in support of x9.59
aepay2.htm#aadsx959 Account Authority Digital Signatures ... in support of x9.59
aepay2.htm#cadis disaster recovery cross-posting
aepay2.htm#fed Federal CP model and financial transactions
ansiepay.htm#ifraud Internet Fraud
ansiepay.htm#scaads X9.59 related press release at smartcard forum
ansiepay.htm#theory Security breach raises questions about Internet shopping
ansiepay.htm#breach Security breach raises questions about Internet shopping
ansiepay.htm#cardsteal Stealing cards easy as Web browsing
ansiepay.htm#x959pkni Ellison/Schneier article on Risks of PKI ... fyi
ansiepay.htm#privacy more on privacy
aadsm5.htm#pkimort2 problem with the death of X.509 PKI
aadsm5.htm#pkimort PKI: Evolve or Die
aadsm5.htm#liex509 Lie in X.BlaBla
aadsm5.htm#encryp Encryption article
aadsm5.htm#shock2 revised Shocking Truth about Digital Signatures
aadsm5.htm#shock revised Shocking Truth about Digital Signatures
aadsm5.htm#epaym "e-payments" email discussion list is now "Internet-payments"
aadsm4.htm#9 Thin PKI won - You lost
aadsm4.htm#4 Public Key Infrastructure: An Artifact
aadsm4.htm#2 Public Key Infrastructure: An Artifact
aadsm3.htm#kiss9 KISS for PKIX .... password/digital signature
aadsm3.htm#kiss8 KISS for PKIX
aadsm3.htm#kiss2 Common misconceptions, was Re: KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp-00.txt))
aadsm3.htm#cstech13 cardtech/securetech & CA PKI
aadsm3.htm#cstech12 cardtech/securetech & CA PKI
aadsm3.htm#cstech10 cardtech/securetech & CA PKI
aadsm3.htm#cstech9 cardtech/securetech & CA PKI
aadsm3.htm#cstech8 cardtech/securetech & CA PKI
aadsm3.htm#cstech7 cardtech/securetech & CA PKI
aadsm3.htm#cstech6 cardtech/securetech & CA PKI
aadsm3.htm#cstech5 cardtech/securetech & CA PKI
aadsm3.htm#cstech4 cardtech/securetech & CA PKI
aadsm3.htm#cstech3 cardtech/securetech & CA PKI
aadsm2.htm#keylength On leaving the 56-bit key length limitation
aadsm2.htm#strawm3 AADS Strawman
aadsm2.htm#straw AADS Strawman
aadsm2.htm#stall EU digital signature initiative stalled
aadsm2.htm#privacy Identification and Privacy are not Antinomies
aadsm2.htm#account A different architecture? (was Re: certificate path
aadsm2.htm#integrity Scale (and the SRV record)
aadsm2.htm#risk another characteristic of online validation
aadsmail.htm#vbank Statistical Attack Against Virtual Banks (fwd)
aadsmail.htm#liability AADS & X9.59 performance and algorithm key sizes
aadsmail.htm#mfraud AADS, X9.59, security, flaws, privacy
aadsmail.htm#fraud Human Nature ... a little cross-posting
aadsmail.htm#parsim parsimonious
aadsmail.htm#complex AADS/CADS complexity issue
aadsmail.htm#variations variations on your account-authority model (small clarification)

top , - by subject , - technology , - networking , - public key , - Boyd
three factor authentcation - Assurance - some mention of EU FINREAD - Risk, Fraud, Exploits, Threats, Vulnerabilities - Account Number Harvesting - postings mentioning MITM attacks - Buffer overflows, overruns, exploits - Secrets and Account numbers - Counterfeit YES CARDS - Naked Transaction Metaphor
home


Buffer overflows, overruns, exploits

2024d.html#35 Null terminated strings, Disconnect Between Coursework And Real-World Computers
2022h.html#71 The CHRISTMA EXEC network worm - 35 years and counting!
2022h.html#40 Mainframe Development Language
2022h.html#28 NSA to developers: Think about switching from C and C++ to a memory safe programming language
2022f.html#13 COBOL and tricks
2022.html#100 IBM PLI
2021j.html#35 Programming Languages in IBM
2021g.html#57 Rust in the Linux kernel
2021c.html#95 What's Fortran?!?!
2020.html#19 What is a mainframe?
2019d.html#113 Internet and Business Critical Dataprocessing
2019d.html#25 Rust in peace: Memory bugs in C and C++ code cause security issues so Microsoft is considering alternatives once again
2019d.html#22 Rust in peace: Memory bugs in C and C++ code cause security issues so Microsoft is considering alternatives once again
2019d.html#18 Rust in peace: Memory bugs in C and C++ code cause security issues so Microsoft is considering alternatives once again
2018c.html#61 Famous paper on security and source code from the '60s or '70s
2018c.html#56 Famous paper on security and source code from the '60s or '70s
2018c.html#55 Famous paper on security and source code from the '60s or '70s
2018b.html#61 Accelerate Your OODA-Loop with Threat Intelligence and Orchestration
2018b.html#56 Computer science hot major in college (article)
2017g.html#7 Mainframe Networking problems
2017e.html#80 [CM] What was your first home computer?
2017e.html#34 [CM] What was your first home computer?
2017e.html#28 [CM] What was your first home computer?
2017e.html#18 [CM] What was your first home computer?
2017e.html#17 [CM] What was your first home computer?
2017e.html#16 [CM] What was your first home computer?
2017b.html#58 The ICL 2900
2017b.html#53 COBOL and POSIX pipes
2017.html#80 Languages
2016e.html#19 Is it a lost cause?
2016e.html#1 Rust project still needs a lot of polish
2016d.html#79 Is it a lost cause?
2016d.html#69 Open DoD's Doors To Cyber Talent, Carter Asks Congress
2016d.html#20 Computer theft 1971
2016c.html#43 All is Lost At IBM
2016b.html#106 Computers anyone?
2015g.html#79 Term "Open Systems" (as Sometimes Currently Used) is Dead -- Who's with Me?
2015g.html#54 Mainframes open to internet attacks?
2015e.html#90 These hackers warned the Internet would become a security disaster. Nobody listened
2015d.html#22 Commentary--time to build a more secure Internet
2015c.html#87 On a lighter note, even the Holograms are demonstrating
2015c.html#81 On a lighter note, even the Holograms are demonstrating
2015.html#78 Is there an Inventory of the Inalled Mainframe Systems Worldwide
2014j.html#47 Ada's fate
2014f.html#13 Before the Internet: The golden age of online services
2014f.html#12 Before the Internet: The golden age of online services
2014f.html#11 Before the Internet: The golden age of online services
2014f.html#10 It's all K&R's fault
2014f.html#5 Before the Internet: The golden age of online services
2014e.html#65 How the IETF plans to protect the web from NSA snooping
2014e.html#58 NSA and Heartbleed
2014e.html#57 NSA and Heartbleed
2014e.html#56 "NSA foils much internet encryption"
2014c.html#93 Curious observation: lack of a simple optimization in a C program
2014b.html#39 Resistance to Java
2013m.html#36 Quote on Slashdot.org
2013k.html#68 Steve B sees what investors think
2013i.html#43 Theology question: Parameter formats
2013i.html#42 Theology question: Parameter formats
2013c.html#79 Still not convinced about the superiority of mainframe security vs distributed?
2013c.html#75 Still not convinced about the superiority of mainframe security vs distributed?
2013.html#32 Java Security?
2013.html#31 Java Security?
2013.html#29 Java Security?
2013.html#28 Java Security?
2012l.html#67 Strings (hijacked from: The IBM zEnterprise EC12 announcment)
2012j.html#97 Gordon Crovitz: Who Really Invented the Internet?
2012g.html#2 What are the implication of the ongoing cyber attacks on critical infrastructure
2012f.html#76 Time to competency for new software language?
2012e.html#73 Word Length
2012e.html#47 Word Length
2012e.html#44 Word Length
2011p.html#141 With cloud computing back to old problems as DDos attacks
2011o.html#59 The lost art of real programming
2011o.html#57 The lost art of real programming
2011m.html#27 "Best" versus "worst" programming language you've used?
2011k.html#6 50th anniversary of BASIC, COBOL?
2011j.html#32 The Most Expensive One-Byte Mistake
2011j.html#31 The Most Expensive One-Byte Mistake
2011j.html#30 The Most Expensive One-Byte Mistake
2011g.html#15 Is the magic and romance killed by Windows (and Linux)?
2011g.html#14 Is the magic and romance killed by Windows (and Linux)?
2011f.html#15 Identifying Latest zOS Fixes
2011d.html#8 Security flaws in software development
2011c.html#50 IBM and the Computer Revolution
2010n.html#30 z/OS, TCP/IP, and OSA
2010j.html#63 Information on obscure text editors wanted
2010j.html#49 Article says mainframe most cost-efficient platform
2010c.html#65 who pioneered the WEB
2010.html#1 DEC-10 SOS Editor Intra-Line Editing
2009s.html#36 Larrabee delayed: anyone know what's happening?
2009o.html#81 big iron mainframe vs. x86 servers
2009n.html#38 Cybersecurity Today: The Wild, Wild West
2009j.html#28 Malware steals ATM accounts and PIN codes; Pwns ATMS user Windows XP
2009h.html#46 IBM security expert: X86 virtualization not ready for regulated, mission-critical apps
2009g.html#38 Top 10 Cybersecurity Threats for 2009, will they cause creation of highly-secure Corporate-wide Intranets?
2009g.html#19 Top 10 Cybersecurity Threats for 2009, will they cause creation of highly-secure Corporate-wide Intranets?
2009g.html#18 Top 10 Cybersecurity Threats for 2009, will they cause creation of highly-secure Corporate-wide Intranets?
2009e.html#11 Lack of bit field instructions in x86 instruction set because of ?patents ?
2009d.html#17 Null References, the Billion Dollar Mistake
2009.html#56 Data losses set to soar
2009.html#49 The 25 Most Dangerous Programming Errors
2009.html#45 Security experts identify 25 coding errors
2008m.html#84 question for C experts - strcpy vs memcpy
2008j.html#77 CLIs and GUIs
2008g.html#29 CA ESD files Options
2008g.html#25 CA ESD files Options
2008f.html#64 Panic in Multicore Land
2008e.html#49 Any benefit to programming a RISC processor by hand?
2008e.html#22 Linux zSeries questions
2008d.html#58 Linux zSeries questions
2008b.html#22 folklore indeed
2008.html#46 Computer Science Education: Where Are the Software Engineers of Tomorrow?
2007t.html#21 How the pages tables of each segment is located
2007t.html#9 How the pages tables of each segment is located
2007r.html#57 Translation of IBM Basic Assembler to C?
2007r.html#47 Translation of IBM Basic Assembler to C?
2007q.html#31 what does xp do when system is copying
2007p.html#71 Translation of IBM Basic Assembler to C?
2007o.html#50 64 gig memory
2007l.html#55 Scholars needed to build a computer history bibliography
2007l.html#21 Non-Standard Mainframe Language?
2007l.html#18 Non-Standard Mainframe Language?
2007l.html#11 John W. Backus, 82, Fortran developer, dies
2007h.html#60 Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
2007h.html#41 Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
2007h.html#14 conformance
2007g.html#49 The Perfect Computer - 36 bits?
2007b.html#12 Special characters in passwords was Re: RACF - Password rules
2006y.html#15 "The Elements of Programming Style"
2006x.html#35 "The Elements of Programming Style"
2006x.html#30 "The Elements of Programming Style"
2006x.html#29 "The Elements of Programming Style"
2006x.html#20 "The Elements of Programming Style"
2006u.html#36 remote support questions - curiousity
2006s.html#64 Is the teaching of non-reentrant HLASM coding practices ever defensible?
2006q.html#7 Linux More Secure on System z?
2006p.html#51 what's the difference between LF(Line Fee) and NL (New line) ?
2006d.html#9 IBM 610 workstation computer
2006d.html#8 IBM 610 workstation computer
2006c.html#28 Mount DASD as read-only
2006c.html#27 Mount DASD as read-only
2005r.html#37 X68-64 buffer overflow exploits and the borrowed code chunks exploitation technique
2005r.html#36 X68-64 buffer overflow exploits and the borrowed code chunks exploitation technique
2005r.html#35 X68-64 buffer overflow exploits and the borrowed code chunks exploitation techniqu
2005p.html#12 Is there any RFC for telnet proxy?
2005o.html#10 Virtual memory and memory protection
2005k.html#24 Ancient history
2005j.html#64 More on garbage
2005j.html#61 Ancient history
2005j.html#60 Ancient history
2005j.html#57 Ancient history
2005j.html#49 Public disclosure of discovered vulnerabilities
2005j.html#48 Public disclosure of discovered vulnerabilities
2005j.html#46 Public disclosure of discovered vulnerabilities
2005j.html#42 Public disclosure of discovered vulnerabilities
2005j.html#23 Public disclosure of discovered vulnerabilities
2005j.html#22 Public disclosure of discovered vulnerabilities
2005g.html#57 Security via hardware?
2005f.html#39 [Lit.] Buffer overruns
2005f.html#25 Where should the type information be: in tags and descriptors
2005d.html#69 [Lit.] Buffer overruns
2005d.html#67 [Lit.] Buffer overruns
2005d.html#65 [Lit.] Buffer overruns
2005d.html#55 [Lit.] Buffer overruns
2005d.html#54 [Lit.] Buffer overruns
2005d.html#53 [Lit.] Buffer overruns
2005c.html#55 [Lit.] Buffer overruns
2005c.html#52 [Lit.] Buffer overruns
2005c.html#48 [Lit.] Buffer overruns
2005c.html#47 [Lit.] Buffer overruns
2005c.html#44 [Lit.] Buffer overruns
2005c.html#40 [Lit.] Buffer overruns
2005c.html#37 [Lit.] Buffer overruns
2005c.html#34 [Lit.] Buffer overruns
2005c.html#33 [Lit.] Buffer overruns
2005c.html#32 [Lit.] Buffer overruns
2005c.html#30 [Lit.] Buffer overruns
2005c.html#29 [Lit.] Buffer overruns
2005c.html#28 [Lit.] Buffer overruns
2005c.html#14 [Lit.] Buffer overruns
2005c.html#13 [Lit.] Buffer overruns
2005c.html#5 [Lit.] Buffer overruns
2005b.html#66 [Lit.] Buffer overruns
2005b.html#64 [Lit.] Buffer overruns
2005b.html#63 [Lit.] Buffer overruns
2005b.html#61 [Lit.] Buffer overruns
2005b.html#60 [Lit.] Buffer overruns
2005b.html#52 [Lit.] Buffer overruns
2005b.html#48 [Lit.] Buffer overruns
2005b.html#46 [Lit.] Buffer overruns
2005b.html#45 [Lit.] Buffer overruns
2005b.html#43 [Lit.] Buffer overruns
2005b.html#42 [Lit.] Buffer overruns
2005b.html#39 [Lit.] Buffer overruns
2005b.html#37 [Lit.] Buffer overruns
2005b.html#35 [Lit.] Buffer overruns
2005b.html#34 [Lit.] Buffer overruns
2005b.html#33 [Lit.] Buffer overruns
2005b.html#31 [Lit.] Buffer overruns
2005b.html#30 [Lit.] Buffer overruns
2005b.html#21 [Lit.] Buffer overruns
2005b.html#20 [Lit.] Buffer overruns
2005b.html#17 [Lit.] Buffer overruns
2005.html#51 something like a CTC on a PC
2005.html#32 8086 memory space [was: The Soul of Barb's New Machine]
2005.html#8 [Lit.] Buffer overruns
2005.html#3 [Lit.] Buffer overruns
2005.html#1 [Lit.] Buffer overruns
2005.html#0 [Lit.] Buffer overruns
2004q.html#84 [Lit.] Buffer overruns
2004q.html#83 [Lit.] Buffer overruns
2004q.html#82 [Lit.] Buffer overruns
2004q.html#81 [Lit.] Buffer overruns
2004q.html#80 [Lit.] Buffer overruns
2004q.html#78 [Lit.] Buffer overruns
2004q.html#74 [Lit.] Buffer overruns
2004q.html#51 [Lit.] Buffer overruns
2004q.html#50 [Lit.] Buffer overruns
2004q.html#48 [Lit.] Buffer overruns
2004q.html#47 [Lit.] Buffer overruns
2004q.html#43 [Lit.] Buffer overruns
2004q.html#35 [Lit.] Buffer overruns
2004q.html#31 Integer types for 128-bit addressing
2004q.html#28 [Lit.] Buffer overruns
2004q.html#26 [Lit.] Buffer overruns
2004q.html#17 [Lit.] Buffer overruns
2004q.html#15 [Lit.] Buffer overruns
2004q.html#14 [Lit.] Buffer overruns
2004q.html#13 [Lit.] Buffer overruns
2004q.html#12 [Lit.] Buffer overruns
2004q.html#11 [Lit.] Buffer overruns
2004q.html#10 [Lit.] Buffer overrun
2004q.html#9 [Lit.] Buffer overruns
2004q.html#8 [Lit.] Buffer overruns
2004q.html#7 [Lit.] Buffer overruns
2004q.html#5 [Lit.] Buffer overruns
2004q.html#4 [Lit.] Buffer overruns
2004q.html#3 [Lit.] Buffer overruns
2004q.html#2 [Lit.] Buffer overruns
2004p.html#46 US-CERT Technical Cyber Security Alert TA04-336A -- another buffer overflow
2004p.html#21 need a firewall
2004m.html#60 Shipwrecks
2004m.html#34 tracking 64bit storage
2004m.html#28 Shipwrecks
2004m.html#27 Shipwrecks
2004m.html#26 Shipwrecks
2004m.html#25 Shipwrecks
2004l.html#41 "Perfect" or "Provable" security both crypto and non-crypto?
2004l.html#40 "Perfect" or "Provable" security both crypto and non-crypto?
2004l.html#21 "Perfect" or "Provable" security both crypto and non-crypto?
2004k.html#13 FAST TCP makes dialup faster than broadband?
2004k.html#6 Losing colonies
2004k.html#5 Losing colonies
2004k.html#2 Linguistic Determinism
2004j.html#58 Vintage computers are better than modern crap !
2004j.html#47 Vintage computers are better than modern crap !
2004j.html#46 Vintage computers are better than modern crap !
2004j.html#38 Vintage computers are better than modern crap !
2004j.html#37 Vintage computers are better than modern crap !
2004j.html#29 Vintage computers are better than modern crap !
2004j.html#28 Vintage computers are better than modern crap !
2004h.html#2 Adventure game (was:PL/? History (was Hercules))
2004f.html#20 Why does Windows allow Worms?
2004e.html#43 security taxonomy and CVE
2004e.html#41 Infiniband - practicalities for small clusters
2004.html#30 Threat of running a web server?
2003o.html#50 Pub/priv key security
2003o.html#25 Any experience with "The Last One"?
2003o.html#20 IS CP/M an OS?
2003o.html#6 perfomance vs. key size
2003o.html#5 perfomance vs. key size
2003n.html#14 Poor people's OS?
2003l.html#2 S/360 Engineering Changes
2003k.html#64 C & reliability: Was "The Incredible Shrinking Legacy"
2003j.html#20 A Dark Day
2003j.html#8 A Dark Day
2003j.html#4 A Dark Day
2003i.html#59 grey-haired assembler programmers (Ritchie's C)
2003h.html#47 Segments, capabilities, buffer overrun attacks
2003h.html#41 Segments, capabilities, buffer overrun attacks
2003g.html#62 IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
2002p.html#6 unix permissions
2002m.html#58 The next big things that weren't
2002m.html#10 Backdoor in AES ?
2002m.html#8 Backdoor in AES ?
2002l.html#45 Thirty Years Later: Lessons from the Multics Security Evaluation
2002l.html#42 Thirty Years Later: Lessons from the Multics Security Evaluation
2002i.html#62 subjective Q. - what's the most secure OS?
2002h.html#74 Where did text file line ending characters begin?
2002e.html#58 O'Reilly C Book
2002.html#39 Buffer overflow
2002.html#38 Buffer overflow
2002.html#37 Buffer overflow
2002.html#35 Buffer overflow
2002.html#34 Buffer overflow
2002.html#33 Buffer overflow
2002.html#32 Buffer overflow
2002.html#29 Buffer overflow
2002.html#28 Buffer overflow
2002.html#27 Buffer overflow
2002.html#26 Buffer overflow
2002.html#24 Buffer overflow
2002.html#23 Buffer overflow
2002.html#20 Younger recruits versus experienced veterans ( was Re: The demise of compa
2002.html#19 Buffer overflow
2002.html#4 Buffer overflow
2001n.html#93 Buffer overflow
2001n.html#91 Buffer overflow
2001n.html#90 Buffer overflow
2001n.html#84 Buffer overflow
2001n.html#76 Buffer overflow
2001n.html#72 Buffer overflow
2001n.html#71 Q: Buffer overflow
2001n.html#30 FreeBSD more secure than Linux
2001m.html#27 Internet like city w/o traffic rules, traffic signs, traffic lights and traffic enforcement
2001l.html#49 Virus propagation risks
2001k.html#43 Why is UNIX semi-immune to viral infection?
2001i.html#54 Computer security: The Future
2001d.html#58 Very CISC Instuctions (Was: why the machine word size ...)
2001c.html#38 How Commercial-Off-The-Shelf Systems make society vulnerable
2001c.html#32 How Commercial-Off-The-Shelf Systems make society vulnerable
2001b.html#58 Checkpoint better than PIX or vice versa???
2001b.html#47 what is interrupt mask register?
2000g.html#50 Egghead cracked, MS IIS again
2000c.html#40 Domainatrix - the final word
2000b.html#22 ooh, a real flamewar :)
2000b.html#17 ooh, a real flamewar :)
2000.html#30 Computer of the century
2000.html#25 Computer of the century
aadsm27.htm#53 Doom and Gloom spreads, security revisionism suggests "H6.5: Be an adept!"
aadsm27.htm#50 If your CSO lacks an MBA, fire one of you
aadsm27.htm#48 If your CSO lacks an MBA, fire one of you
aadsm25.htm#41 Why security training is really important (and it ain't anything to do with security!)
aadsm25.htm#40 Why security training is really important (and it ain't anything to do with security!)
aadsm23.htm#3 News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
aadsm21.htm#10 Clearing sensitive in-memory data in perl
aadsm21.htm#9 Clearing sensitive in-memory data in perl
aadsm21.htm#6 Clearing sensitive in-memory data in perl
aadsm18.htm#18 Any TLS server key compromises?
aadsm16.htm#1 FAQ: e-Signatures and Payments
aadsm14.htm#38 An attack on paypal (trivia addenda)
aadsm14.htm#34 virus attack on banks (was attack on paypal)
aadsm14.htm#32 An attack on paypal
aadsm12.htm#16 Feasability of Palladium / TCPA
aepay11.htm#65 E-merchants Turn Fraud-busters (somewhat related)
aadsm9.htm#cfppki10 CFP: PKI research workshop
ansiepay.htm#theory Security breach raises questions about Internet shopping
99.html#219 Study says buffer overflow is most common security bug
99.html#163 IBM Assembler 101
99.html#85 Perfect Code
99.html#70 Series/1 as NCP (was: Re: System/1 ?)

top , - by subject , - technology , - networking , - public key , - Boyd
three factor authentcation - Assurance - some mention of EU FINREAD - Risk, Fraud, Exploits, Threats, Vulnerabilities - Account Number Harvesting - postings mentioning MITM attacks - Buffer overflows, overruns, exploits - Secrets and Account numbers - Counterfeit YES CARDS - Naked Transaction Metaphor
home


Assurance

2024e.html#123 big, fast, etc, was is Vax addressing sane today
2024d.html#73 GOSIP
2024d.html#70 ARPANET & IBM Internal Network
2024b.html#83 rusty iron why ``folklore''?
2024b.html#71 Vintage Internet and Vintage APL
2024b.html#70 HSDT, HA/CMP, NSFNET, Internet
2023f.html#18 MOSAIC
2023.html#56 Classified Material and Security
2022h.html#75 Researchers found security pitfalls in IBM's cloud infrastructure
2022g.html#94 IBM Cambridge Science Center Performance Technology
2022f.html#68 Security Chips and Chip Fabs
2022.html#57 Computer Security
2021k.html#133 IBM Clone Controllers
2021k.html#17 Data Breach
2021j.html#62 IBM ROLM
2021j.html#41 IBM Confidential
2021j.html#21 IBM Lost Opportunities
2021h.html#97 What Is a TPM, and Why Do I Need One for Windows 11?
2021h.html#74 "Safe" Internet Payment Products
2021g.html#84 EMV migration compliance for banking from IBM (1997)
2021g.html#75 Electronic Signature
2021g.html#66 The Case Against SQL
2021e.html#75 WEB Security
2021d.html#87 Bizarre Career Events
2021d.html#20 The Rise of the Internet
2021b.html#21 IBM Recruiting
2020.html#38 Early mainframe security
2020.html#37 Early mainframe security
2019d.html#25 Rust in peace: Memory bugs in C and C++ code cause security issues so Microsoft is considering alternatives once again
2019c.html#24 Microsoft says mandatory password changing is "ancient and obsolete"
2019.html#25 Are we all now dinosaurs, out of place and out of time?
2018e.html#32 12 Russian Agents Indicted in Mueller Investigation
2018c.html#56 Famous paper on security and source code from the '60s or '70s
2018c.html#55 Famous paper on security and source code from the '60s or '70s
2018c.html#51 EMV: Why the US migration didn't happen sooner
2018.html#110 Making Computers Secure
2017j.html#42 Tech: we didn't mean for it to turn out like this
2017j.html#30 Tech: we didn't mean for it to turn out like this
2017g.html#98 modern programming languages?
2017g.html#88 IBM Mainframe Ushers in New Era of Data Protection
2017g.html#74 Running unsupported is dangerous was Re: AW: Re: LE strikes again
2017g.html#14 Mainframe Networking problems
2017e.html#90 Ransomware on Mainframe application ?
2017e.html#78 Time to sack the chief of computing in the NHS?
2017e.html#31 [CM] What was your first home computer?
2017d.html#92 Old hardware
2017d.html#10 Encryp-xit: Europe will go all in for crypto backdoors in June
2017c.html#96 ComputerWorld Says: Cobol plays major role in U.S. government breaches
2017c.html#60 [EXTERNAL] ComputerWorld Says: Cobol plays major role in U.S. government breaches
2017.html#94 Trump to sign cyber security order
2017.html#41 History of Mainframe Cloud
2017.html#39 History of Mainframe Cloud
2016g.html#15 Rogue sysadmins the target of Microsoft's new 'Shielded VM' security
2016g.html#11 Rogue sysadmins the target of Microsoft's new 'Shielded VM' security
2016f.html#63 Missile Defense
2016f.html#40 Misc. Success of Failure
2016f.html#7 More IBM DASD RAS discussion
2016e.html#9 Is it a lost cause?
2016e.html#8 Intel spyware chip?
2016e.html#6 Is it a lost cause?
2016d.html#95 Is it a lost cause?
2016c.html#55 Institutional Memory and Two-factor Authentication
2016b.html#66 Catching Up on the OPM Breach
2016b.html#43 Ransomware
2015h.html#8 Self-service PC
2015g.html#35 [Poll] Computing favorities
2015f.html#43 No, the F-35 Can't Fight at Long Range, Either
2015f.html#34 The joy of simplicity?
2015f.html#32 Credit card fraud solution coming to America...finally
2015f.html#20 Credit card fraud solution coming to America...finally
2015e.html#35 The real story of how the Internet became so vulnerable
2015e.html#28 The real story of how the Internet became so vulnerable
2015e.html#25 The real story of how the Internet became so vulnerable
2015e.html#16 The real story of how the Internet became so vulnerable
2015d.html#4 "Trust in digital certificate ecosystem eroding"
2015c.html#104 On a lighter note, even the Holograms are demonstrating
2015b.html#72 Do we really?
2015.html#83 Winslow Wheeler's War
2014m.html#117 Are we programmed to stop at the 'first' right answer
2014m.html#26 Whole Earth
2014l.html#55 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#72 *uix web security
2014k.html#42 LA Times commentary: roll out "smart" credit cards to deter fraud
2014j.html#24 UEFI?
2014j.html#21 The SDS 92, its place in history?
2014g.html#41 Special characters for Passwords
2014g.html#18 350 DBAs stare blankly when reminded super-users can pinch data
2014f.html#82 The NSA and Snowden: Securing the All-Seeing Eye
2014f.html#25 Before the Internet: The golden age of online services
2014f.html#16 Before the Internet: The golden age of online services
2014f.html#13 Before the Internet: The golden age of online services
2014e.html#70 How the Internet wasn't Commercial Dataprocessing
2014d.html#74 Last Gasp For Hard Disk Drives
2014b.html#84 CPU time
2013n.html#13 Bounded pointers
2013m.html#59 The cloud is killing traditional hardware and software
2013m.html#58 'Free Unix!': The world-changing proclamation made 30yearsagotoday
2013m.html#10 "NSA foils much internet encryption"
2013l.html#55 "NSA foils much internet encryption"
2013k.html#88 NSA and crytanalysis
2013k.html#77 German infosec agency warns against Trusted Computing in Windows 8
2013k.html#66 German infosec agency warns against Trusted Computing in Windows 8
2013j.html#78 What Makes an Architecture Bizarre?
2013i.html#77 Insane Insider Threat Program in Context of Morally and Mentally Bankrupt US Intelligence System
2013i.html#76 The failure of cyber defence - the mindset is against it
2013i.html#69 The failure of cyber defence - the mindset is against it
2013i.html#41 Is newer technology always better? It almost is. Exceptions?
2013i.html#11 EBCDIC and the P-Bit
2013h.html#20 How about the old mainframe error messages that actually give you a clue about what's broken
2013g.html#88 What Makes code storage management so cool?
2013g.html#76 The Vindication of Barb
2013g.html#42 The Vindication of Barb
2013g.html#19 What Makes sorting so cool?
2013d.html#74 What Makes an Architecture Bizarre?
2013d.html#32 IBM Mainframe (1980's) on You tube
2013d.html#21 What Makes an Architecture Bizarre?
2013c.html#82 Retailer Sues Visa Over $13 Million "Fine" for Being Hacked
2013c.html#81 Still not convinced about the superiority of mainframe security vs distributed?
2013c.html#80 Still not convinced about the superiority of mainframe security vs distributed?
2013c.html#34 The United States is leaking 1TB of data daily to foreign countries
2013b.html#60 New HD
2012p.html#38 There can be no System Security without System Integrity
2012o.html#23 Does the IBM System z Mainframe rely on Security by Obscurity or is it Secure by Design?
2012n.html#81 history of Programming language and CPU in relation to each other
2012n.html#63 history of Programming language and CPU in relation to each other
2012n.html#58 2012 History Conference
2012m.html#7 Blades versus z was Re: Turn Off Another Light - Univ. of Tennessee
2012l.html#43 Judge dismisses BancorpSouth defense in online theft suit
2012l.html#16 X86 server
2012l.html#10 Cultural attitudes towards failure
2012k.html#19 SnOODAn: Boyd, Snowden, and Resilience
2012j.html#56 Failing Gracefully
2012j.html#22 Interesting News Article
2012j.html#6 Operating System, what is it?
2012g.html#53 The secret's out for secure chip design
2012g.html#5 What are the implication of the ongoing cyber attacks on critical infrastructure
2012e.html#82 Fighting Cyber Crime with Transparency
2012e.html#54 Why are organizations sticking with mainframes?
2012d.html#47 You Don't Need a Cyber Attack to Take Down The North American Power Grid
2012.html#65 Reject gmail
2011p.html#48 Hello?
2011o.html#32 Deja Cloud?
2011m.html#53 ISBNs
2011l.html#72 Selectric Typewriter--50th Anniversary
2011i.html#5 Robert Morris, man who helped develop Unix, dies at 78
2011g.html#22 An online bank scam worthy of a spy novel
2011g.html#18 Fight Fraud with Device ID
2011f.html#43 Massive Fraud, Common Crime, No Prosecutions
2011e.html#82 What is your most memorable Mainframe security bug, breach or lesson learned?
2011e.html#48 On Protectionism
2011e.html#24 The first personal computer (PC)
2011d.html#8 Security flaws in software development
2011c.html#80 IBM and the Computer Revolution
2011c.html#59 RISCversus CISC
2011b.html#15 History of copy on write
2011b.html#11 Credit cards with a proximity wifi chip can be as safe as walking around with your credit card number on a poster
2010q.html#57 Is email dead? What do you think?
2010q.html#37 Programmer Charged with thieft (maybe off topic)
2010p.html#73 From OODA to AAADA
2010p.html#72 Orientation - does group input (or groups of data) make better decisions than one person can?
2010p.html#13 Sandboxing: Understanding System Containment
2010p.html#3 The Credit Card Criminals Are Getting Crafty
2010o.html#54 The Credit Card Criminals Are Getting Crafty
2010o.html#52 Payment Card Industry Pursues Profits Over Security
2010o.html#50 The Credit Card Criminals Are Getting Crafty
2010n.html#67 Outgunned: How Security Tech Is Failing Us
2010n.html#23 Credit Card with a Computer Inside
2010m.html#58 memes in infosec IV - turn off HTTP, a small step towards "only one mode"
2010m.html#50 Has there been a change in US banking regulations recently?
2010m.html#6 Five Theses on Security Protocols
2010l.html#77 Five Theses on Security Protocols
2010l.html#5 Does an 'operator error' counts as a 'glitch?
2010k.html#50 Information on obscure text editors wanted
2010j.html#61 Information on obscure text editors wanted
2010i.html#83 The Evolution of the Extended Enterprise: Security Stategies for Forward Thinking Organizations
2010i.html#38 Idiotic programming style edicts
2010h.html#54 Trust Facade
2010h.html#37 (slightly OT - Linux) Did IBM bet on the wrong OS?
2010g.html#53 Far and near pointers on the 80286 and later
2010g.html#28 Intel Nehalem-EX Aims for the Mainframe
2010g.html#17 Far and near pointers on the 80286 and later
2010g.html#16 Far and near pointers on the 80286 and later
2010g.html#15 Far and near pointers on the 80286 and later
2010g.html#9 Far and near pointers on the 80286 and later
2010f.html#92 Why do most websites use HTTPS only while logging you in...and not for the entire session?
2010f.html#83 Notes on two presentations by Gordon Bell ca. 1998
2010f.html#74 Is Security a Curse for the Cloud Computing Industry?
2010f.html#41 Should the USA Implement EMV?
2010f.html#30 Should the USA Implement EMV?
2010f.html#12 Real CPU Id
2010f.html#1 More calumny: "Secret Service Uses 1980s Mainframe"
2010d.html#63 LPARs: More or Less?
2010d.html#38 search engine history, was Happy DEC-10 Day
2010d.html#34 "Unhackable" Infineon Chip Physically Cracked
2010d.html#7 "Unhackable" Infineon Chip Physically Cracked - PCWorld
2010c.html#66 Happy DEC-10 Day
2010c.html#64 Happy DEC-10 Day
2009s.html#47 Audits VII: the future of the Audit is in your hands
2009s.html#45 Audits VII: the future of the Audit is in your hands
2009r.html#69 360 programs on a z/10
2009r.html#68 360 programs on a z/10
2009r.html#48 Strong Authentication Not Strong Enough
2009r.html#41 While watching Biography about Bill Gates on CNBC last Night
2009r.html#39 While watching Biography about Bill Gates on CNBC last Night
2009q.html#71 Trade Secrets and Confidential Information
2009q.html#59 EU agency runs rule over ID cards for online banking logins
2009q.html#54 Crypto dongles to secure online transactions
2009q.html#40 Crypto dongles to secure online transactions
2009o.html#54 Should SSL be enabled on every website?
2009o.html#53 E-Banking on a Locked Down (Non-Microsoft) PC
2009n.html#52 Security
2009n.html#39 Status of Arpanet/Internet in 1976?
2009n.html#12 33 Years In IT/Security/Audit
2009n.html#3 Hacker charges also an indictment on PCI, expert says
2009m.html#89 Audits V: Why did this happen to us ;-(
2009m.html#62 August 7, 1944: today is the 65th Anniversary of the Birth of the Computer
2009m.html#51 Chip with PIN or Chip with signature
2009m.html#49 Hacker charges also an indictment on PCI, expert says
2009m.html#48 Hacker charges also an indictment on PCI, expert says
2009m.html#26 comp.arch has made itself a sitting duck for spam
2009m.html#23 Need new 3270 emulator: SSH, inexpensive, reliable
2009m.html#14 The Art of Creating Strong Passwords
2009m.html#2 Does this count as 'computer' folklore?
2009l.html#53 Hacker charges also an indictment on PCI, expert says
2009l.html#20 Cyber attackers empty business accounts in minutes
2009k.html#21 Security certificate warnings don't work, researchers say
2009k.html#5 Moving to the Net: Encrypted Execution for User Code on a Hosting Site
2009j.html#65 Infosec As a Form of Asymmetric Warfare
2009j.html#58 Price Tag for End-to-End Encryption: $4.8 Billion, Mercator Says
2009j.html#57 How can we stop Credit card FRAUD?
2009j.html#51 Replace the current antiquated credit card system
2009j.html#46 How can we stop Credit card FRAUD?
2009j.html#43 Usability and security gurus agree that masked passwords should go
2009j.html#27 Usability and security gurus agree that masked passwords should go
2009h.html#28 Computer virus strikes US Marshals, FBI affected
2009h.html#11 China deploys secure computer operating system
2009h.html#0 China deploys secure computer operating system
2009.html#4 Is SUN going to become x86'ed ??
2008r.html#65 Did you think about Virtualization Security?
2008r.html#54 PCI needs to address virtualization, experts say
2008r.html#50 Security is a subset of Reliability
2008r.html#18 Comprehensive security?
2008r.html#4 Basel Committee outlines plans to strengthen Basel II
2008q.html#64 EAL5 Certification for z10 Enterprise Class Server
2008q.html#63 EAL5 Certification for z10 Enterprise Class Server
2008q.html#13 Web Security hasn't moved since 1995
2008o.html#17 what will be a wow feature in a credit card
2008n.html#36 Builders V. Breakers
2008n.html#35 Builders V. Breakers
2008m.html#82 Data sharing among Industry players about frauds
2008m.html#55 With all the highly publicised data breeches and losses, are we all wasting our time?
2008m.html#40 IBM--disposition of clock business
2008l.html#52 Payments Security in RFS
2008l.html#33 Authentication in the e-tailer / payment gateway / customer triangle
2008j.html#64 lack of information accuracy
2008j.html#63 CLIs and GUIs
2008j.html#56 WoW security: now better than most banks
2008j.html#36 The wisdom of the ill informed
2008j.html#34 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008i.html#90 Certificate Purpose
2008i.html#81 Selling Security using Prospect Theory. Or not
2008i.html#55 Is data classification the right approach to pursue a risk based information security program?
2008i.html#54 Trusted (mainframe) online transactions
2008i.html#43 IT Security Statistics
2008h.html#76 How do you define 'privileged access'?
2008g.html#58 Virtualization: History repeats itself with a search for security
2008g.html#50 CA ESD files Options
2008g.html#26 CA ESD files Options
2008f.html#67 Virtualization's security threats
2008f.html#33 EPIC, Ending Piracy of Integrated Circuits
2008e.html#59 independent appraisers
2008e.html#57 Any benefit to programming a RISC processor by hand?
2008e.html#54 news maintenance: Prison pushes
2008e.html#50 fraying infrastructure
2008c.html#48 Data Erasure Products
2008c.html#0 folklore indeed
2008b.html#82 Break the rules of governance and lose 4.9 billion
2008b.html#39 folklore indeed
2008b.html#26 folklore indeed
2008b.html#24 folklore indeed
2008b.html#23 Yahoo's CAPTCHA Security Reportedly Broken
2008b.html#5 folklore indeed
2008b.html#4 folklore indeed
2008.html#35 U.S. Identity Theft at Record Level in 2007
2008.html#14 hacked TOPS-10 monitors
2008.html#11 Information security breaches quadrupled in 2007
2007v.html#86 folklore indeed
2007v.html#85 folklore indeed
2007v.html#79 folklore indeed
2007v.html#75 virtual appliance
2007v.html#66 2007: year in review
2007v.html#61 Apple files patent for WGA-style anti-piracy tech
2007u.html#70 folklore indeed
2007u.html#63 folklore indeed
2007u.html#62 folklore indeed
2007u.html#57 folklore indeed
2007u.html#56 folklore indeed
2007u.html#53 folklore indeed
2007u.html#47 folklore indeed
2007t.html#48 Data Center Theft
2007t.html#12 Translation of IBM Basic Assembler to C?
2007t.html#8 Translation of IBM Basic Assembler to C?
2007s.html#65 Translation of IBM Basic Assembler to C?
2007s.html#64 Is the media letting banks off the hook on payment card security
2007s.html#56 Translation of IBM Basic Assembler to C?
2007s.html#55 Translation of IBM Basic Assembler to C?
2007s.html#18 Oddly good news week: Google announces a Caps library for Javascript
2007s.html#17 Oddly good news week: Google announces a Caps library for Javascript
2007r.html#34 Is the media letting banks off the hook on payment card security
2007r.html#29 The new urgency to fix online privacy
2007r.html#21 Is the media letting banks off the hook on payment card security
2007q.html#37 what does xp do when system is copying
2007q.html#36 what does xp do when system is copying
2007q.html#20 Hackers Attack Apps While Still in Development
2007o.html#5 The Unexpected Fact about the First Computer Programmer
2007o.html#4 Hypervisors May Replace Operating Systems As King Of The Data Center
2007n.html#94 PCI Compliance - Encryption of all non-console administrative access
2007n.html#77 PSI MIPS
2007m.html#20 Patents, Copyrights, Profits, Flex and Hercules
2007m.html#9 John W. Backus, 82, Fortran developer, dies
2007l.html#64 John W. Backus, 82, Fortran developer, dies
2007l.html#55 Scholars needed to build a computer history bibliography
2007l.html#43 My Dream PC -- Chip-Based
2007l.html#42 My Dream PC -- Chip-Based
2007l.html#40 My Dream PC -- Chip-Based
2007l.html#39 My Dream PC -- Chip-Based
2007l.html#33 John W. Backus, 82, Fortran developer, dies
2007l.html#8 John W. Backus, 82, Fortran developer, dies
2007l.html#7 John W. Backus, 82, Fortran developer, dies
2007k.html#76 My Dream PC -- Chip-Based
2007k.html#55 My Dream PC -- Chip-Based
2007k.html#53 My Dream PC -- Chip-Based
2007k.html#50 John W. Backus, 82, Fortran developer, dies
2007j.html#67 open source voting
2007j.html#55 John W. Backus, 82, Fortran developer, dies
2007i.html#66 John W. Backus, 82, Fortran developer, dies
2007i.html#64 John W. Backus, 82, Fortran developer, dies
2007i.html#26 Latest Principles of Operation
2007i.html#20 Does anyone know of a documented case of VM being penetrated by hackers?
2007g.html#63 The Perfect Computer - 36 bits?
2007g.html#61 The Perfect Computer - 36 bits?
2007g.html#19 T.J. Maxx data theft worse than first reported
2007c.html#51 Securing financial transactions a high priority for 2007
2007c.html#38 Securing financial transactions a high priority for 2007
2007c.html#9 Decoding the encryption puzzle
2007c.html#1 Decoding the encryption puzzle
2007b.html#35 security engineering versus information security
2007b.html#33 security engineering versus information security
2007b.html#30 How many 36-bit Unix ports in the old days?
2007b.html#8 Special characters in passwords was Re: RACF - Password rules
2007.html#28 Securing financial transactions a high priority for 2007
2006y.html#25 "The Elements of Programming Style"
2006y.html#8 Securing financial transactions a high priority for 2007
2006w.html#0 Patent buster for a method that increases password security
2006v.html#26 Fighting Fraudulent Transactions
2006v.html#13 Who has a Core Competency in Security?
2006u.html#36 remote support questions - curiousity
2006t.html#40 Encryption and authentication
2006t.html#38 Vulnerability Assessment of a EAL 4 system
2006t.html#29 Storage Philosophy Question
2006t.html#25 Are there more stupid people in IT than there used to be?
2006t.html#5 Are there more stupid people in IT than there used to be?
2006s.html#64 Is the teaching of non-reentrant HLASM coding practices ever defensible?
2006s.html#34 Basic Question
2006s.html#28 Storage Philosophy Question
2006s.html#9 Why not 2048 or 4096 bit RSA key issuance?
2006s.html#4 Why not 2048 or 4096 bit RSA key issuance?
2006r.html#29 Intel abandons USEnet news
2006q.html#59 TCPA compatible smarcard readers?
2006q.html#3 Device Authentication - The answer to attacks lauched using stolen passwords?
2006p.html#48 Device Authentication - The answer to attacks lauched using stolen passwords?
2006p.html#43 Slow-Going For Next-Generation Threat-Scoring System
2006p.html#41 Device Authentication - The answer to attacks lauched using stolen passwords?
2006p.html#32 OT - hand-held security
2006p.html#13 What part of z/OS is the OS?
2006o.html#20 Gen 2 EPC Protocol Approved as ISO 18000-6C
2006o.html#9 Pa Tpk spends $30 million for "Duet" system; but benefits are unknown
2006o.html#2 the more things change, the more things stay the same
2006n.html#54 MD5 for z/OS?
2006n.html#53 the more things change, the more things stay the same
2006n.html#52 the more things change, the more things stay the same
2006n.html#32 The System/360 Model 20 Wasn't As Bad As All That
2006n.html#20 The System/360 Model 20 Wasn't As Bad As All That
2006n.html#17 The System/360 Model 20 Wasn't As Bad As All That
2006m.html#34 PDP-1
2006k.html#38 PDP-1
2006k.html#37 PDP-1
2006i.html#3 Spoofing fingerprint scanners - NEWBIE()
2006h.html#54 Mainframe vs. xSeries
2006h.html#53 Mainframe vs. xSeries
2006h.html#44 Mainframe vs. xSeries
2006h.html#43 vPro
2006h.html#42 Mainframe vs. xSeries
2006h.html#40 Mainframe vs. xSeries
2006h.html#33 The Pankian Metaphor
2006h.html#32 Intel vPro Technology
2006h.html#31 Intel vPro Technology
2006h.html#26 Security
2006h.html#15 Security
2006h.html#14 Security
2006f.html#17 trusted certificates and trusted repositories
2006f.html#16 trusted repositories and trusted transactions
2006e.html#11 Caller ID "spoofing"
2006.html#37 The new High Assurance SSL Certificates
2006.html#33 The new High Assurance SSL Certificates
2006.html#11 Some credible documented evidence that a MVS or later op sys has ever been hacked
2005v.html#3 ABN Tape - Found
2005u.html#37 Mainframe Applications and Records Keeping?
2005u.html#32 AMD to leave x86 behind?
2005u.html#27 RSA SecurID product
2005u.html#2 PGP Lame question
2005s.html#52 TTP and KCM
2005s.html#49 phishing web sites using self-signed certs
2005s.html#42 feasibility of certificate based login (PKI) w/o real smart card
2005r.html#39 What ever happened to Tandem and NonStop OS ?
2005r.html#7 DDJ Article on "Secure" Dongle
2005q.html#2 Article in Information week: Mainframe Programmers Wanted
2005p.html#43 Security of Secret Algorithm encruption
2005p.html#13 One more about SYRES Sharing
2005p.html#6 Innovative password security
2005p.html#0 Article: The True Value of Mainframe Security
2005o.html#46 Article: The True Value of Mainframe Security
2005o.html#3 The Chinese MD5 attack
2005o.html#2 X509 digital certificate for offline solution
2005l.html#17 The Worth of Verisign's Brand
2005l.html#13 The Worth of Verisign's Brand
2005k.html#57 Secure Banking
2005k.html#29 More Phishing scams, still no SSL being used
2005k.html#26 More on garbage
2005k.html#23 More on garbage
2005k.html#16 More on garbage
2005k.html#2 Ancient history
2005k.html#1 More on garbage
2005j.html#64 More on garbage
2005j.html#49 Public disclosure of discovered vulnerabilities
2005i.html#25 technical question about fingerprint usbkey
2005i.html#22 technical question about fingerprint usbkey
2005h.html#36 Security via hardware?
2005h.html#16 Today's mainframe--anything to new?
2005g.html#57 Security via hardware?
2005g.html#54 Security via hardware?
2005g.html#53 "Best practices" or "Best implementations"?
2005g.html#51 Security via hardware?
2005g.html#41 Maximum RAM and ROM for smartcards
2005g.html#40 MVS secure configuration standard
2005g.html#38 MVS secure configuration standard
2005g.html#37 MVS secure configuration standard
2005g.html#36 Maximum RAM and ROM for smartcards
2005f.html#61 Where should the type information be: in tags and descriptors
2005f.html#60 Where should the type information be: in tags and descriptors
2005f.html#38 Where should the type information be: in tags and descriptors
2005f.html#20 Some questions on smart cards (Software licensing using smart cards
2005e.html#62 TLS-certificates and interoperability-issues sendmail/Exchange/postfix
2005e.html#52 Where should the type information be?
2005e.html#51 TLS-certificates and interoperability-issues sendmail/Exchange/postfix
2005e.html#42 xml-security vs. native security
2005e.html#6 He Who Thought He Knew Something About DASD
2005e.html#1 [Lit.] Buffer overruns
2005d.html#52 Thou shalt have no other gods before the ANSI C standard
2005d.html#50 Secure design
2005d.html#46 Secure design
2005d.html#43 Secure design
2005d.html#42 Thou shalt have no other gods before the ANSI C standard
2005d.html#33 Thou shalt have no other gods before the ANSI C standard
2005d.html#21 Digital signature with Javascript
2005d.html#19 Digital signature with Javascript
2005d.html#14 data integrity and logs
2005d.html#0 [Lit.] Buffer overruns
2005c.html#51 [Lit.] Buffer overruns
2005c.html#48 [Lit.] Buffer overruns
2005c.html#47 [Lit.] Buffer overruns
2005c.html#44 [Lit.] Buffer overruns
2005c.html#26 [Lit.] Buffer overruns
2005c.html#17 [Lit.] Buffer overruns
2005c.html#14 [Lit.] Buffer overruns
2005c.html#13 [Lit.] Buffer overruns
2005c.html#7 [Lit.] Buffer overruns
2005c.html#6 [Lit.] Buffer overruns
2005c.html#5 [Lit.] Buffer overruns
2005b.html#56 [Lit.] Buffer overruns
2005b.html#55 [Lit.] Buffer overruns
2005b.html#50 [Lit.] Buffer overruns
2005b.html#42 [Lit.] Buffer overruns
2005b.html#40 [Lit.] Buffer overruns
2005b.html#39 [Lit.] Buffer overruns
2005b.html#37 [Lit.] Buffer overruns
2005b.html#34 [Lit.] Buffer overruns
2005b.html#17 [Lit.] Buffer overruns
2005b.html#16 [Lit.] Buffer overruns
2005b.html#7 [Lit.] Buffer overruns
2005b.html#6 [Lit.] Buffer overruns
2005.html#60 8086 memory space
2005.html#53 8086 memory space
2005.html#52 8086 memory space
2005.html#46 8086 memory space
2005.html#32 8086 memory space [was: The Soul of Barb's New Machine]
2005.html#10 The Soul of Barb's New Machine
2005.html#8 [Lit.] Buffer overruns
2005.html#3 [Lit.] Buffer overruns
2005.html#1 [Lit.] Buffer overruns
2005.html#0 [Lit.] Buffer overruns
2004q.html#84 [Lit.] Buffer overruns
2004q.html#83 [Lit.] Buffer overruns
2004q.html#82 [Lit.] Buffer overruns
2004q.html#81 [Lit.] Buffer overruns
2004q.html#78 [Lit.] Buffer overruns
2004q.html#75 [Lit.] Buffer overruns
2004q.html#74 [Lit.] Buffer overruns
2004q.html#57 high speed network, cross-over from sci.crypt
2004q.html#53 [Lit.] Buffer overruns
2004q.html#52 [Lit.] Buffer overruns
2004q.html#51 [Lit.] Buffer overruns
2004q.html#50 [Lit.] Buffer overruns
2004q.html#48 [Lit.] Buffer overruns
2004q.html#47 [Lit.] Buffer overruns
2004q.html#46 [Lit.] Buffer overruns
2004q.html#45 C v. Ada
2004q.html#3 [Lit.] Buffer overruns
2004q.html#1 Systems software versus applications software definitions
2004p.html#64 Systems software versus applications software definitions
2004p.html#63 Systems software versus applications software definitions
2004p.html#23 Systems software versus applications software definitions
2004p.html#21 need a firewall
2004m.html#50 EAL5
2004m.html#49 EAL5
2004m.html#41 EAL5
2004m.html#33 Shipwrecks
2004m.html#31 Shipwrecks
2004m.html#30 Shipwrecks
2004m.html#29 Shipwrecks
2004m.html#28 Shipwrecks
2004m.html#27 Shipwrecks
2004m.html#26 Shipwrecks
2004m.html#25 Shipwrecks
2004m.html#4 REVIEW: "Biometrics for Network Security", Paul Reid
2004l.html#49 "Perfect" or "Provable" security both crypto and non-crypto?
2004l.html#45 "Perfect" or "Provable" security both crypto and non-crypto?
2004l.html#41 "Perfect" or "Provable" security both crypto and non-crypto?
2004l.html#40 "Perfect" or "Provable" security both crypto and non-crypto?
2004k.html#21 Vintage computers are better than modern crap !
2004k.html#20 Vintage computers are better than modern crap !
2004j.html#35 A quote from Crypto-Gram
2004j.html#29 Vintage computers are better than modern crap !
2004i.html#27 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#26 /. passwords - 64 characters, changed daily?
2004i.html#25 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#24 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#23 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#22 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#21 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#20 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#19 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#18 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#17 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#16 New Method for Authenticated Public Key Exchange without Digital Ceriticates
2004i.html#7 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#6 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#5 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#4 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#58 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#57 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#56 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#55 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#54 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#53 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#52 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#51 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#4 Adventure game (was:PL/? History (was Hercules))
2004f.html#20 Why does Windows allow Worms?
2004c.html#4 OS Partitioning and security
2004b.html#51 Using Old OS for Security
2004b.html#48 Automating secure transactions
2004b.html#45 Foiling Replay Attacks
2004b.html#44 Foiling Replay Attacks
2004b.html#25 Who is the most likely to use PK?
2004b.html#10 Mars Rover Not Responding
2004b.html#8 Mars Rover Not Responding
2004.html#38 When rsa vs dsa
2004.html#37 When rsa vs dsa
2004.html#36 merged security taxonomy & glossary
2004.html#29 passwords
2003p.html#37 The BASIC Variations
2003p.html#10 Secure web logins w random passwords
2003p.html#4 Does OTP need authentication?
2003o.html#50 Pub/priv key security
2003o.html#46 What 'NSA'?
2003o.html#45 Any experience with "The Last One"?
2003o.html#44 Biometrics
2003o.html#20 IS CP/M an OS?
2003o.html#15 secure delete on 3390
2003n.html#31 hardware vs software security
2003n.html#21 Is it possible to devise a public-key cipher with no flaws?
2003l.html#26 Secure OS Thoughts
2003l.html#22 Secure OS Thoughts
2003l.html#20 Secure OS Thoughts
2003l.html#19 Secure OS Thoughts
2003k.html#25 virtual machines for security
2003k.html#23 virtual machines for security
2003j.html#45 Hand cranking telephones
2003j.html#44 Hand cranking telephones
2003j.html#36 CC vs. NIST/TCSEC - Which do you prefer?
2003j.html#30 How is a smartcard created?
2003j.html#25 Idea for secure login
2003j.html#15 A Dark Day
2003g.html#65 IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
2003g.html#62 IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
2003e.html#74 Security Certifications?
2003e.html#73 Security Certifications?
2003e.html#41 Why we don't use homebrew crypto
2003e.html#11 PDP10 and RISC
2003d.html#30 SSL questions
2003b.html#55 Microsoft worm affecting Automatic Teller Machines
2003b.html#54 Microsoft worm affecting Automatic Teller Machines
2003b.html#53 Microsoft worm affecting Automatic Teller Machines
2003.html#52 SSL & Man In the Middle Attack
2003.html#49 InfiniBand Group Sharply, Evenly Divided
2003.html#48 InfiniBand Group Sharply, Evenly Divided
2003.html#38 Calculating expected reliability for designed system
2003.html#37 Calculating expected reliability for designed system
2003.html#34 Calculating expected reliability for designed system
2002o.html#14 Home mainframes
2002m.html#6 Dumb Question - Hardend Site?
2002l.html#42 Thirty Years Later: Lessons from the Multics Security Evaluation
2002l.html#23 >Moore law
2002l.html#12 IEEE article on intelligence and security
2002l.html#11 IEEE article on intelligence and security
2002l.html#9 Moore law
2002l.html#5 What good is RSA when using passwords?
2002k.html#44 how to build tamper-proof unix server?
2002k.html#43 how to build tamper-proof unix server?
2002k.html#38 GOTOs cross-posting
2002k.html#36 ... certification addenda
2002k.html#11 Serious vulnerablity in several common SSL implementations?
2002j.html#63 SSL integrity guarantees in abscense of client certificates
2002j.html#55 AADS, ECDSA, and even some TCPA
2002j.html#39 Beginner question on Security
2002h.html#68 Are you really who you say you are?
2002f.html#34 Security and e-commerce
2002f.html#31 Security and e-commerce
2002f.html#28 Security Issues of using Internet Banking
2002f.html#27 Security Issues of using Internet Banking
2002f.html#24 Computers in Science Fiction
2002f.html#23 Computers in Science Fiction
2002e.html#73 Blade architectures
2002e.html#71 Blade architectures
2002e.html#58 O'Reilly C Book
2002e.html#17 Smart Cards
2002d.html#16 Mainframers: Take back the light (spotlight, that is)
2002c.html#35 TOPS-10 logins (Was Re: HP-2000F - want to know more about it)
2002.html#32 Buffer overflow
2002.html#29 Buffer overflow
2002.html#28 Buffer overflow
2001n.html#91 Buffer overflow
2001n.html#71 Q: Buffer overflow
2001j.html#54 Does "Strong Security" Mean Anything?
2001j.html#5 E-commerce security????
2001i.html#57 E-commerce security????
2001i.html#52 misc loosely-coupled, sysplex, cluster, supercomputer, & electronic commerce
2001h.html#64 Net banking, is it safe???
2001h.html#61 Net banking, is it safe???
2001h.html#16 D
2001h.html#7 PKI/Digital signature doesn't work
2001g.html#0 FREE X.509 Certificates
2001e.html#59 Design (Was Re: Server found behind drywall)
2001e.html#40 Can I create my own SSL key?
2001e.html#35 Can I create my own SSL key?
2001e.html#26 Can I create my own SSL key?
2001d.html#58 Very CISC Instuctions (Was: why the machine word size ...)
2001d.html#41 solicit advice on purchase of digital certificate
2001c.html#34 PKI and Non-repudiation practicalities
2001c.html#20 Something wrong with "re-inventing the wheel".?
2001.html#50 What exactly is the status of the Common Criteria
2000g.html#33 does CA need the proof of acceptance of key binding?
2000b.html#40 general questions on SSL certificates
2000.html#39 "Trusted" CA - Oxymoron?
aadsm28.htm#73 "Designing and implementing malicious hardware"
aadsm28.htm#64 Seeking expert on credit card fraud prevention - particularly CNP/online transactions
aadsm28.htm#63 Is Basel 2 out...Basel 3 in?
aadsm28.htm#35 H2.1 Protocols Divide Naturally Into Two Parts
aadsm28.htm#16 Dutch Transport Card Broken
aadsm28.htm#12 #4.2 Simplicity is Inversely Proportional to the Number of Designers
aadsm28.htm#11 Death of antivirus software imminent
aadsm28.htm#9 Death of antivirus software imminent
aadsm28.htm#8 Death of antivirus software imminent
aadsm28.htm#7 Why Security Modelling doesn't work -- the OODA-loop of today's battle
aadsm28.htm#6 Death of antivirus software imminent
aadsm28.htm#4 Death of antivirus software imminent
aadsm28.htm#0 2007: year in review
aadsm27.htm#63 Oddly good news week: Google announces a Caps library for Javascript
aadsm27.htm#61 Linus: Security is "people wanking around with their opinions"
aadsm27.htm#54 Security can only be message-based?
aadsm27.htm#53 Doom and Gloom spreads, security revisionism suggests "H6.5: Be an adept!"
aadsm27.htm#49 If your CSO lacks an MBA, fire one of you
aadsm27.htm#48 If your CSO lacks an MBA, fire one of you
aadsm27.htm#47 If your CSO lacks an MBA, fire one of you
aadsm27.htm#37 The bank fraud blame game
aadsm27.htm#36 TPM, part 2
aadsm27.htm#33 The bank fraud blame game
aadsm27.htm#32 The bank fraud blame game
aadsm27.htm#22 A crazy thought?
aadsm27.htm#17 dnssec?
aadsm27.htm#13 Is this Risk Management's Waterloo?
aadsm27.htm#10 K6 again, again and again. Therefore, H6.4 -- Compromise on Security before Delivery
aadsm27.htm#9 Enterprise Right Management vs. Traditional Encryption Tools
aadsm26.htm#64 Dr Geer goes to Washington
aadsm26.htm#58 Our security sucks. Why can't we change? What's wrong with us?
aadsm26.htm#57 Our security sucks. Why can't we change? What's wrong with us?
aadsm26.htm#54 What to do about responsible disclosure?
aadsm26.htm#44 Governance of anonymous financial services
aadsm26.htm#36 New Credit Cards May Leak Personal Information
aadsm26.htm#35 Failure of PKI in messaging
aadsm26.htm#23 It's a Presidential Mandate, Feds use it. How come you are not using FDE?
aadsm26.htm#17 Changing the Mantra -- RFC 4732 on rethinking DOS
aadsm26.htm#9 Who has a Core Competency in Security?
aadsm26.htm#6 Citibank e-mail looks phishy
aadsm26.htm#2 Audit Follies - Atlantic differences, branding UnTrust, thunbs on Sarbanes-Oxley, alternates
aadsm25.htm#44 TPM & disk crypto
aadsm25.htm#43 Audit Follies - Atlantic differences, branding UnTrust, thunbs on Sarbanes-Oxley, alternates
aadsm25.htm#40 Why security training is really important (and it ain't anything to do with security!)
aadsm25.htm#39 How the Classical Scholars dropped security from the canon of Computer Science
aadsm25.htm#38 How the Classical Scholars dropped security from the canon of Computer Science
aadsm25.htm#37 How the Classical Scholars dropped security from the canon of Computer Science
aadsm25.htm#33 Mozilla moves on security
aadsm25.htm#25 RSA SecurID SID800 Token vulnerable by design
aadsm25.htm#15 Sarbanes-Oxley is what you get when you don't do FC
aadsm25.htm#14 Sarbanes-Oxley is what you get when you don't do FC
aadsm25.htm#13 Sarbanes-Oxley is what you get when you don't do FC
aadsm25.htm#12 Sarbanes-Oxley is what you get when you don't do FC
aadsm25.htm#10 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#6 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#4 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#3 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#2 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#1 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#0 Crypto to defend chip IP: snake oil or good idea?
aadsm24.htm#52 Crypto to defend chip IP: snake oil or good idea?
aadsm24.htm#51 Crypto to defend chip IP: snake oil or good idea?
aadsm24.htm#50 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#49 Crypto to defend chip IP: snake oil or good idea?
aadsm24.htm#48 more on FBI plans new Net-tapping push
aadsm24.htm#47 More Brittle Security -- Agriculture
aadsm24.htm#46 More Brittle Security -- Agricultur
aadsm24.htm#45 Case Study: Thunderbird's brittle security as proof of Iang's 3rd Hypothesis in secure design: there is only one mode, and it's secure
aadsm24.htm#40 Interesting bit of a quote
aadsm24.htm#39 Interesting bit of a quote
aadsm24.htm#36 Interesting bit of a quote
aadsm24.htm#28 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#23 Use of TPM chip for RNG?
aadsm24.htm#16 Apple to help Microsoft with "security neutrality"?
aadsm24.htm#15 Apple to help Microsoft with "security neutrality"?
aadsm24.htm#11 FC++3 - Advances in Financial Cryptography, Number Three
aadsm23.htm#21 Reliable Connections Are Not
aadsm23.htm#10 PGP "master keys"
aadsm23.htm#7 PGP "master keys"
aadsm23.htm#6 PGP "master keys"
aadsm23.htm#2 News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
aadsm22.htm#41 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#36 Unforgeable Blinded Credentials
aadsm22.htm#35 4th April, 1984
aadsm22.htm#32 Meccano Trojans coming to a desktop near you
aadsm22.htm#19 "doing the CA statement shuffle" and other dances
aadsm22.htm#18 "doing the CA statement shuffle" and other dances
aadsm22.htm#17 Major Browsers and CAS announce balkanisation of Internet Security
aadsm21.htm#36 browser vendors and CAs agreeing on high-assurance certificates
aadsm21.htm#32 NSA posts notice about faster, lighter crypto
aadsm21.htm#28 X.509 / PKI, PGP, and IBE Secure Email Technologies
aadsm21.htm#27 X.509 / PKI, PGP, and IBE Secure Email Technologies
aadsm21.htm#25 Broken SSL domain name trust model
aadsm21.htm#20 Some thoughts on high-assurance certificates
aadsm21.htm#18 'Virtual Card' Offers Online Security Blanket
aadsm21.htm#8 simple (&secure??) PW-based web login (was Re: Another entry in the internet security hall of shame....)
aadsm21.htm#3 Is there any future for smartcards?
aadsm21.htm#1 Is there any future for smartcards?
aadsm20.htm#35 Federal Information Assurance Conference 2005, Oct 25-26
aadsm20.htm#30 How much for a DoD X.509 certificate?
aadsm20.htm#21 Qualified Certificate Request
aadsm19.htm#44 massive data theft at MasterCard processor
aadsm19.htm#32 Using Corporate Logos to Beat ID Theft
aadsm19.htm#27 Citibank discloses private information to improve security
aadsm19.htm#24 Citibank discloses private information to improve security
aadsm19.htm#12 EuroPKI 2005 - Call for Participation
aadsm19.htm#6 Do You Need a Digital ID?
aadsm19.htm#5 Do You Need a Digital ID?
aadsm19.htm#3 Do You Need a Digital ID?
aadsm18.htm#48 Dell to Add Security Chip to PCs
aadsm18.htm#47 Dell to Add Security Chip to PCs
aadsm18.htm#46 Banks Test ID Device for Online Security
aadsm18.htm#41 Adding reliability and trust to smartcards
aadsm18.htm#40 Financial identity is *dangerous*? (was re: Fake companies, real money)
aadsm18.htm#34 An interesting "new" computer security problem
aadsm18.htm#33 An interesting "new" computer security problem
aadsm18.htm#32 EMV cards as identity cards
aadsm18.htm#26 public-key: the wrong model for email?
aadsm18.htm#25 public-key: the wrong model for email?
aadsm18.htm#24 public-key: the wrong model for email?
aadsm18.htm#23 public-key: the wrong model for email?
aadsm18.htm#21 RFC 3833 Threat analysis of the domain name system (DNS)
aadsm18.htm#13 dual-use digital signature vulnerability
aadsm18.htm#12 dual-use digital signature vulnerability
aadsm18.htm#4 dual-use digital signature vulnerability
aadsm18.htm#2 dual-use digital signature vulnerability
aadsm18.htm#1 dual-use digital signature vulnerability
aadsm17.htm#59 dual-use digital signature vulnerability
aadsm17.htm#57 dual-use digital signature vulnerability
aadsm17.htm#47 authentication and authorization ... addenda
aadsm17.htm#42 Article on passwords in Wired News
aadsm17.htm#40 The future of security
aadsm17.htm#39 The future of security
aadsm17.htm#0 Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
aadsm16.htm#20 Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
aadsm16.htm#12 Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
aadsm16.htm#9 example: secure computing kernel needed
aadsm16.htm#8 example: secure computing kernel needed
aadsm16.htm#1 FAQ: e-Signatures and Payments
aadsm15.htm#39 FAQ: e-Signatures and Payments
aadsm15.htm#38 FAQ: e-Signatures and Payments
aadsm15.htm#36 VS: On-line signature standards
aadsm15.htm#34 VS: On-line signature standards (slight addenda)
aadsm15.htm#31 Electronic Safety and Soundness: A Four Piller Approach; Public Policy Issues
aadsm15.htm#24 Homeland Security chief mulls SEC cybersecurity filings
aadsm15.htm#23 NCipher Takes Hardware Security To Network Level
aadsm14.htm#52 Committee calls for better e-banking security management
aadsm14.htm#50 E-banking is board-level Issue, Says Basel Committee
aadsm12.htm#16 Feasability of Palladium / TCPA
aepay12.htm#25 Cyber Security In The Financial Services Sector
aepay12.htm#36 DNS, yet again
aepay10.htm#22 PKI: An Insider's View
aepay6.htm#asrn5 assurance, X9.59, etc
aepay6.htm#cacr7 7th CACR Information Security Workshop
aepay6.htm#ecom some electronic commerce discussion from dcsb & IDF
aepay6.htm#idf Intel Developer's Forum ... fyi
aepay4.htm#comcert3 Merchant Comfort Certificates
aepay3.htm#x959risk4 Risk Management in AA / draft X9.59
aepay3.htm#x959risk1 Risk Management in AA / draft X9.59
aepay3.htm#votec (my) long winded observations regarding X9.59 & XML, encryption and certificates
ansiepay.htm#breach Security breach raises questions about Internet shopping
aadsm10.htm#keygen2 Welome to the Internet, here's your private key
aadsm10.htm#paiin PAIIN security glossary & taxonomy
aadsm10.htm#cfppki18 CFP: PKI research workshop
aadsm10.htm#cfppki13 CFP: PKI research workshop
aadsm9.htm#cfppki11 CFP: PKI research workshop
aadsm9.htm#cfppki10 CFP: PKI research workshop
aadsm9.htm#cfppki5 CFP: PKI research workshop
aadsm8.htm#softpki19 DNSSEC (RE: Software for PKI)
aadsm7.htm#rubberhose Rubber hose attack
aadsm6.htm#terror3 [FYI] Did Encryption Empower These Terrorists?
aadsm5.htm#shock2 revised Shocking Truth about Digital Signatures
aadsm5.htm#shock revised Shocking Truth about Digital Signatures
aadsm5.htm#asrn4 assurance, X9.59, etc
aadsm5.htm#asrn3 Assurance, e-commerce, and some x9.59 ... fyi
aadsm5.htm#asrn2 Assurance, e-commerce, and some x9.59 ... fyi
aadsm5.htm#asrn1 Assurance, e-commerce, and some x9.59 ... fyi
aadsm3.htm#kiss9 KISS for PKIX .... password/digital signature
aadsm3.htm#kiss8 KISS for PKIX
aadsm3.htm#kiss2 Common misconceptions, was Re: KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp-00.txt))
aadsm3.htm#cstech13 cardtech/securetech & CA PKI
aadsm3.htm#cstech12 cardtech/securetech & CA PKI
aadsm3.htm#cstech10 cardtech/securetech & CA PKI
aadsm3.htm#cstech9 cardtech/securetech & CA PKI
aadsm3.htm#cstech5 cardtech/securetech & CA PKI
aadsm3.htm#cstech4 cardtech/securetech & CA PKI
aadsm2.htm#strawm3 AADS Strawman
aadsm2.htm#strawm2 AADS Strawman
aadsm2.htm#straw AADS Strawman
aadsm2.htm#stall EU digital signature initiative stalled
aadsm2.htm#useire3 U.S. & Ireland use digital signature
aadsm2.htm#privacy Identification and Privacy are not Antinomies
aadsmore.htm#client3 Client-side revocation checking capability

top , - by subject , - technology , - networking , - public key , - Boyd
three factor authentcation - Assurance - some mention of EU FINREAD - Risk, Fraud, Exploits, Threats, Vulnerabilities - Account Number Harvesting - postings mentioning MITM attacks - Buffer overflows, overruns, exploits - Secrets and Account numbers - Counterfeit YES CARDS - Naked Transaction Metaphor
home


three factor authentcation paradigm

2024d.html#75 Joe Biden Kicked Off the Encryption Wars
2017h.html#42 The Man Who Wrote Those Password Rules Has a New Tip: N3v$r M1^d!
2016h.html#12 The FBI Is Wrongly Telling People To Change Passwords 'Frequently'
2016c.html#57 Institutional Memory and Two-factor Authentication
2016c.html#33 Institutional Memory and Two-factor Authentication
2015.html#4 NYT on Sony hacking
2014k.html#14 Cyberspace KISS
2014g.html#35 Special characters for Passwords
2014g.html#30 Special characters for Passwords
2014e.html#32 The dark side of digital banking
2013m.html#20 Steve B sees what investors think
2013h.html#22 Check out Moto X: Motorola reveals plans for ink and even pills to replace AL
2013f.html#22 I Need A Good Password
2013d.html#21 What Makes an Architecture Bizarre?
2013.html#53 slightly O/T but interesting
2012n.html#75 history of Programming language and CPU in relation to each other
2012j.html#67 Protecting Pin Pad Payment
2012g.html#27 Weak PINs, Habits Increase Risk of Financial Fraud
2012g.html#3 Quitting Top IBM Salespeople Say They Are Leaving In Droves
2012e.html#104 Time to Think ... and to Listen
2012d.html#8 Time to pull the PIN!
2012b.html#71 Password shortcomings
2012b.html#52 Banking malware a growing threat, as new variant of Zeus is detected
2012.html#9 Anyone sceptically about about Two Factor Authentication?
2011o.html#13 Two-Factor Authentication - Hardware token or SMS OTP
2010q.html#2 "Compound threats" to appear in 2011 ?
2010q.html#0 Card Fraud: 'Flash Attacks' and Wireless Transmissions
2010o.html#17 ZeuS attacks mobiles in bank SMS bypass scam
2010n.html#59 Question: Why Has Debit Grown So Quickly?
2010n.html#28 Will new card innovation help interchange and improve retention?
2010m.html#65 How Safe Are Online Financial Transactions?
2010l.html#5 Does an 'operator error' counts as a 'glitch?
2010k.html#27 taking down the machine - z9 series
2010k.html#7 taking down the machine - z9 series
2010k.html#5 The Attacker's Advantage
2010j.html#0 Wal-Mart to support smartcard payments
2010h.html#54 Trust Facade
2010g.html#21 Should the USA Implement EMV?
2010f.html#44 Can't PIN be mandated in normal POS machines ? to avoid Losses / Frauds / NPA's ?
2010f.html#41 Should the USA Implement EMV?
2010f.html#25 Should the USA Implement EMV?
2010c.html#72 Users still make hacking easy with weak passwords
2010c.html#59 Customers risk online banking fraud by reusing bank credentials
2010.html#93 Korean bank Moves back to Mainframes (...no, not back)
2009q.html#54 Crypto dongles to secure online transactions
2009n.html#7 Some companies are selling the idea that you can use just a (prox) physical access badge (single factor) for logical access as acceptable
2009m.html#52 Online banking: Which bank is the most secure?
2009m.html#51 Chip with PIN or Chip with signature
2009m.html#14 The Art of Creating Strong Passwords
2009l.html#4 Card PINs traded at two for a dollar
2009j.html#51 Replace the current antiquated credit card system
2009j.html#31 password safes for mac
2009i.html#46 64 Cores -- IBM is showing a prototype already
2009h.html#69 How practically risky is it to use unsecured IMAP
2009f.html#39 PIN Crackers Nab Holy Grail of Bank Card Security
2009e.html#75 The Future Shape of Payments Is Anything But Flat
2009e.html#2 Passwords: silly or serious?
2009b.html#21 ICSF and VISA/MasterCard?amex reference list
2009b.html#15 It's Me, and Here's My Proof: Why Identity and Authentication Must Remain Distinct
2009b.html#14 question about ssh-keygen with empty passphrase
2009.html#72 Double authentification for internet payment
2009.html#69 Double authentification for internet payment
2009.html#66 What's missing in security: business
2009.html#60 The 25 Most Dangerous Programming Errors
2008s.html#26 Combining EMV and eID on a payment card?
2008r.html#65 Did you think about Virtualization Security?
2008q.html#7 GPG
2008p.html#83 Residual Risk Methodology for Single Factor Authentication
2008p.html#79 PIN entry on digital signatures + extra token
2008p.html#76 Multi-Factor Authentication - Moving Beyond Passwords for Security of Online Transactions
2008p.html#46 Would you say high tech authentication gizmo's are a waste of time/money/effort?
2008o.html#64 In your experience which is a superior debit card scheme - PIN based debit or signature debit?
2008o.html#60 Biometric Credit cards
2008o.html#17 what will be a wow feature in a credit card
2008o.html#13 What risk of possible data leakage do you see for your organization?
2008o.html#9 Homebanking authentication methods: what's being used by your bank?
2008k.html#38 Calling Out
2008j.html#55 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008j.html#45 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008f.html#49 How do OTP tokens work?
2008e.html#76 independent appraisers
2008d.html#10 Toyota Sales for 2007 May Surpass GM
2007u.html#58 folklore indeed
2007u.html#47 folklore indeed
2007u.html#5 Public Computers
2007s.html#65 Translation of IBM Basic Assembler to C?
2007s.html#62 Translation of IBM Basic Assembler to C?
2007s.html#59 Translation of IBM Basic Assembler to C?
2007s.html#51 Translation of IBM Basic Assembler to C?
2007s.html#12 Translation of IBM Basic Assembler to C?
2007r.html#34 Is the media letting banks off the hook on payment card security
2007o.html#29 EZPass: Yes, Big Brother IS Watching You!
2007l.html#64 John W. Backus, 82, Fortran developer, dies
2007l.html#35 My Dream PC -- Chip-Based
2007l.html#8 John W. Backus, 82, Fortran developer, dies
2007j.html#3 John W. Backus, 82, Fortran developer, dies
2007i.html#17 John W. Backus, 82, Fortran developer, dies
2007e.html#61 Securing financial transactions a high priority for 2007
2007d.html#34 Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
2007b.html#12 Special characters in passwords was Re: RACF - Password rules
2007b.html#10 Special characters in passwords was Re: RACF - Password rules
2006w.html#5 Patent buster for a method that increases password security
2006v.html#45 On sci.crypt: New attacks on the financial PIN processing
2006u.html#42 New attacks on the financial PIN processing
2006u.html#40 New attacks on the financial PIN processing
2006u.html#36 remote support questions - curiousity
2006u.html#5 Are there more stupid people in IT than there used to be?
2006t.html#40 Encryption and authentication
2006r.html#38 Trying to underdtand 2-factor authentication
2006q.html#48 Smartcard reader with certificate inside the reader
2006p.html#32 OT - hand-held security
2006o.html#40 the personal data theft pandemic continues
2006k.html#0 Passwords for bank sites - change or not?
2006i.html#25 Benefits of PKI - 5,000 nodes organization
2006i.html#3 Spoofing fingerprint scanners - NEWBIE()
2006h.html#33 The Pankian Metaphor
2006h.html#13 Security
2006g.html#38 Why are smart cards so dumb?
2006f.html#39 X.509 and ssh
2006e.html#44 Does the Data Protection Act of 2005 Make Sense
2006e.html#30 Debit Cards HACKED now
2006e.html#21 Debit Cards HACKED now
2006e.html#10 Caller ID "spoofing"
2006e.html#4 When *not* to sign an e-mail message?
2006e.html#2 When *not* to sign an e-mail message?
2006d.html#41 Caller ID "spoofing"
2006d.html#32 When *not* to sign an e-mail message?
2006d.html#31 Caller ID "spoofing"
2006c.html#16 X.509 and ssh
2005u.html#34 PGP Lame question
2005u.html#33 PGP Lame question
2005u.html#31 AMD to leave x86 behind?
2005u.html#26 RSA SecurID product
2005u.html#13 AMD to leave x86 behind?
2005u.html#0 PGP Lame question
2005t.html#52 PGP Lame question
2005t.html#31 Looking for Information on password systems
2005t.html#28 RSA SecurID product
2005t.html#27 RSA SecurID product
2005t.html#22 What ever happened to Tandem and NonStop OS ?
2005s.html#52 TTP and KCM
2005s.html#42 feasibility of certificate based login (PKI) w/o real smart card
2005r.html#54 NEW USA FFIES Guidance
2005r.html#45 Password Requirements - VM:Secure
2005r.html#25 PCI audit compliance
2005q.html#23 Logon with Digital Siganture (PKI/OCES - or what else they're called)
2005q.html#13 IPSEC with non-domain Server
2005q.html#11 Securing Private Key
2005p.html#33 Digital Singatures question
2005p.html#32 PKI Certificate question
2005p.html#25 Hi-tech no panacea for ID theft woes
2005p.html#2 Innovative password security
2005o.html#17 Smart Cards?
2005o.html#6 X509 digital certificate for offline solution
2005m.html#37 public key authentication
2005m.html#15 Course 2821; how this will help for CISSP exam ?
2005m.html#11 Question about authentication protocols
2005m.html#1 Creating certs for others (without their private keys)
2005l.html#35 More Phishing scams, still no SSL being used
2005l.html#29 Importing CA certificate to smartcard
2005k.html#16 More on garbage
2005i.html#36 Improving Authentication on the Internet
2005i.html#28 REPOST: Authentication, Authorization TO Firewall
2005i.html#27 REPOST: Authentication, Authorization TO Firewall
2005i.html#26 The Worth of Verisign's Brand
2005i.html#3 General PKI Question
2005i.html#1 Brit banks introduce delays on interbank xfers due to phishing boom
2005h.html#36 Security via hardware?
2005g.html#57 Security via hardware?
2005g.html#54 Security via hardware?
2005g.html#51 Security via hardware?
2005g.html#47 Maximum RAM and ROM for smartcards
2005g.html#46 Maximum RAM and ROM for smartcards
2005g.html#34 Maximum RAM and ROM for smartcards
2005g.html#8 On smartcards and card readers
2005g.html#0 What is a Certificate?
2005f.html#20 Some questions on smart cards (Software licensing using smart cards)
2005e.html#43 Actual difference between RSA public and private keys?
2005e.html#31 Public/Private key pair protection on Windows
2005e.html#26 PKI: the end
2005e.html#25 PKI: the end
2005e.html#24 PKI: the end
2005e.html#22 PKI: the end
2005d.html#32 Is a cryptographic monoculture hurting us all?
2005d.html#21 Digital signature with Javascript
2005d.html#19 Digital signature with Javascript
2005d.html#17 Digital signature with Javascript
2005.html#35 Do I need a certificat?
2005.html#14 Using smart cards for signing and authorization in applets
2004q.html#0 Single User: Password or Certificate
2004p.html#60 Single User: Password or Certificate
2004m.html#23 Help! I'm trying to understand PKI - especially CA's role
2004m.html#9 REVIEW: "Biometrics for Network Security", Paul Reid
2004m.html#4 REVIEW: "Biometrics for Network Security", Paul Reid
2004l.html#63 Actuarial facts
2004k.html#22 Public key authentication defeats passwd age warning
2004k.html#21 Vintage computers are better than modern crap !
2004j.html#39 Methods of payment
2004j.html#37 Vintage computers are better than modern crap !
2004j.html#14 US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
2004j.html#13 US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
2004j.html#6 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#27 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#26 /. passwords - 64 characters, changed daily?
2004i.html#24 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#18 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#17 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#16 New Method for Authenticated Public Key Exchange without Digital Ceritificates
2004h.html#58 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#23 Basics of key authentication
2004h.html#14 Two-factor Authentication Options?
2004h.html#13 Two-factor Authentication Options?
2004f.html#8 racf
2004e.html#21 A POX on you, Dennis Ritchie!!!
2004e.html#20 Soft signatures
2004e.html#9 Authentification classifications
2004b.html#45 Foiling Replay Attacks
2004b.html#28 Methods of Authentication on a Corporate
2004.html#29 passwords
2003p.html#17 Does OTP need authentication?
2003o.html#57 Pub/priv key security
2003o.html#50 Pub/priv key security
2003o.html#44 Biometrics
2003o.html#29 Biometric cards will not stop identity fraud
2003n.html#17 which CPU for educational purposes?
2003m.html#52 public key vs passwd authentication?
2003m.html#51 public key vs passwd authentication?
2003m.html#49 public key vs passwd authentication?
2003j.html#25 Idea for secure login
2003i.html#35 electronic-ID and key-generation
2003i.html#2 Two-factor authentication with SSH?
2003i.html#1 Two-factor authentication with SSH?
2003h.html#38 entity authentication with non-repudiation
2003h.html#29 application of unique signature
2003d.html#29 SSL questions
2002o.html#67 smartcard+fingerprint
2002o.html#57 Certificate Authority: Industry vs. Government
2002o.html#41 META: Newsgroup cliques?
2002n.html#30 Help! Good protocol for national ID card?
2002n.html#26 Help! Good protocol for national ID card?
2002i.html#65 privileged IDs and non-privileged IDs
2002i.html#1 User 2-factor authentication on laptops
2002h.html#41 Biometric authentication for intranet websites?
2002h.html#8 Biometric authentication for intranet websites?
2002h.html#6 Biometric authentication for intranet websites?
2002f.html#22 Biometric Encryption: the solution for network intruders?
2002e.html#36 Crypting with Fingerprints ?
2002e.html#18 Opinion on smartcard security requested
2002d.html#7 IBM Mainframe at home
2002c.html#26 economic trade off in a pure reader system
2002c.html#10 Opinion on smartcard security requested
2002c.html#7 Opinion on smartcard security requested
2001n.html#57 Certificate Authentication Issues in IE and Verisign
2001k.html#61 I-net banking security
2001k.html#34 A thought on passwords
2001j.html#52 Are client certificates really secure?
2001j.html#49 Are client certificates really secure?
2001j.html#44 Does "Strong Security" Mean Anything?
2001i.html#36 Net banking, is it safe???
2001i.html#26 No Trusted Viewer possible?
2001g.html#63 PKI/Digital signature doesn't work
2001g.html#62 PKI/Digital signature doesn't work
2001g.html#38 distributed authentication
2001g.html#11 FREE X.509 Certificates
2001g.html#1 distributed authentication
2001c.html#39 PKI and Non-repudiation practicalities
2000f.html#65 Cryptogram Newsletter is off the wall?
2000f.html#2 Why trust root CAs ?
2000c.html#2 Financial Stnadards Work group?
2000.html#57 RealNames hacked. Firewall issues.
aadsm27.htm#23 Identity resurges as a debate topic
aadsm26.htm#48 Governance of anonymous financial services
aadsm26.htm#35 Failure of PKI in messaging
aadsm25.htm#42 Why security training is really important (and it ain't anything to do with security!)
aadsm25.htm#32 On-card displays
aadsm24.htm#34 Phishers Defeat 2-Factor Auth
aadsm24.htm#33 Threatwatch - 2-factor tokens attacked by phishers
aadsm24.htm#32 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#9 Naked Payments IV - let's all go naked
aadsm24.htm#1 UK Detects Chip-And-PIN Security Flaw
aadsm23.htm#11 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm23.htm#2 News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
aadsm23.htm#1 RSA Adaptive Authentication
aadsm22.htm#45 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm21.htm#27 X.509 / PKI, PGP, and IBE Secure Email Technologies
aadsm21.htm#13 Contactless payments and the security challenges
aadsm21.htm#5 Is there any future for smartcards?
aadsm19.htm#46 the limits of crypto and authentication
aadsm19.htm#33 Digital signatures have a big problem with meaning
aadsm19.htm#23 Citibank discloses private information to improve security
aadsm19.htm#17 What happened with the session fixation bug?
aadsm19.htm#11 EuroPKI 2005 - Call for Participation
aadsm19.htm#6 Do You Need a Digital ID?
aadsm19.htm#5 Do You Need a Digital ID?
aadsm19.htm#4 Do You Need a Digital ID?
aadsm19.htm#3 Do You Need a Digital ID?
aadsm19.htm#2 Do You Need a Digital ID?
aadsm19.htm#1 Do You Need a Digital ID?
aadsm19.htm#0 two-factor authentication problems
aadsm18.htm#56 two-factor authentication problems
aadsm18.htm#55 MD5 collision in X509 certificates
99.html#160 checks (was S/390 on PowerPC?)
aepay12.htm#4 Confusing business process, payment, authentication and identification
aepay12.htm#2 Confusing business process, payment, authentication and identification
aepay11.htm#56 FINREAD was. Authentication white paper
aepay11.htm#55 FINREAD ... and as an aside
aepay11.htm#53 Authentication white paper
aepay10.htm#65 eBay Customers Targetted by Credit Card Scam
aadsm18.htm#32 EMV cards as identity cards
aadsm18.htm#7 Using crypto against Phishing, Spoofing and Spamming
aadsm18.htm#6 dual-use digital signature vulnerability
aadsm17.htm#57 dual-use digital signature vulnerability
aadsm17.htm#53 Using crypto against Phishing, Spoofing and Spamming
aadsm17.htm#50 authentication and authorization (was: Question on the state of the security industry)
aadsm17.htm#47 authentication and authorization ... addenda
aadsm17.htm#46 authentication and authorization (was: Question on the state of the security industry)
aadsm17.htm#42 Article on passwords in Wired News
aadsm17.htm#34 The future of security
aadsm17.htm#23 PKI International Consortium
aadsm17.htm#2 Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
aadsm17.htm#0 Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
aadsm16.htm#20 Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
aadsm16.htm#14 Non-repudiation (was RE: The PAIN mnemonic)
aadsm16.htm#12 Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
aadsm16.htm#11 Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
aadsm16.htm#10 Difference between TCPA-Hardware and a smart card (was: example:secure computing kernel needed)
aadsm16.htm#9 example: secure computing kernel needed
aadsm15.htm#37 VS: On-line signature standards
aadsm15.htm#36 VS: On-line signature standards
aadsm15.htm#35 VS: On-line signature standards
aadsm15.htm#34 VS: On-line signature standards (slight addenda)
aadsm15.htm#33 VS: On-line signature standards
aadsm15.htm#32 VS: On-line signature standards
aadsm15.htm#25 WYTM?
aadsm14.htm#48 basic question: semantics of "map", "tie", etc in PKI
aadsm14.htm#39 An attack on paypal
aadsm14.htm#34 virus attack on banks (was attack on paypal)
aadsm14.htm#32 An attack on paypal
aadsm14.htm#23 Maybe It's Snake Oil All the Way Down
aadsm13.htm#16 A challenge
aadsm12.htm#42 draft-ietf-pkix-warranty-extn-01.txt
aadsm12.htm#0 maximize best case, worst case, or average case? (TCPA)
aadsm11.htm#20 IBM alternative to PKI?
aadsm11.htm#6 Meaning of Non-repudiation
aadsm11.htm#5 Meaning of Non-repudiation
aadsm10.htm#keygen2 Welome to the Internet, here's your private key
aadsm10.htm#keygen Welome to the Internet, here's your private key
aadsm10.htm#bio7 biometrics
aadsm10.htm#bio6 biometrics
aadsm10.htm#cfppki18 CFP: PKI research workshop
aadsm10.htm#cfppki17 CFP: PKI research workshop
aepay7.htm#3dsecure 3D Secure Vulnerabilities? Photo ID's and Payment Infrastructure
aepay6.htm#pkimort2 problem with the death of X.509 PKI (forwarded)
aepay4.htm#comcert12 Merchant Comfort Certificates
aepay3.htm#x959risk2 Risk Management in AA / draft X9.59
aepay2.htm#privrule3 U.S. firms gird for privacy rules
aadsm9.htm#cfppki9 CFP: PKI research workshop
aadsm8.htm#softpki8 Software for PKI
aadsm7.htm#rhose15 when a fraud is a sale, Re: Rubber hose attack
aadsm7.htm#rhose14 when a fraud is a sale, Re: Rubber hose attack
aadsm7.htm#rhose13 when a fraud is a sale, Re: Rubber hose attack
aadsm7.htm#rhose12 when a fraud is a sale, Re: Rubber hose attack
aadsm7.htm#rubberhose Rubber hose attack
aadsm5.htm#spki4 Simple PKI
aadsm5.htm#spki3 Simple PKI
aadsm5.htm#shock2 revised Shocking Truth about Digital Signatures
aadsm5.htm#shock revised Shocking Truth about Digital Signatures
aadsm3.htm#cstech10 cardtech/securetech & CA PKI
aadsm3.htm#cstech7 cardtech/securetech & CA PKI
aadsm2.htm#pkikrb PKI/KRB
aadsm2.htm#architecture A different architecture? (was Re: certificate path
aadsmore.htm#schneier Schneier: Why Digital Signatures are not Signatures (was Re :CRYPTO-GRAM, November 15, 2000)
aadsmore.htm#killer1 Killer PKI Applications
aadsmore.htm#bioinfo1 QC Bio-info leak?
aadsmail.htm#perform AADS & X9.59 performance and algorithm key sizes
2005h.html#8 keysigning: identity checks

top , - by subject , - technology , - networking , - public key , - Boyd
three factor authentcation - Assurance - some mention of EU FINREAD - Risk, Fraud, Exploits, Threats, Vulnerabilities - Account Number Harvesting - postings mentioning MITM attacks - Buffer overflows, overruns, exploits - Secrets and Account numbers - Counterfeit YES CARDS - Naked Transaction Metaphor
home


Secrets and/or Account numbers

2024d.html#75 Joe Biden Kicked Off the Encryption Wars
2022h.html#75 Researchers found security pitfalls in IBM's cloud infrastructure
2018c.html#37 Software Delivery on Tape to be Discontinued
2018c.html#20 April 1st Corporate Directive
2017h.html#42 The Man Who Wrote Those Password Rules Has a New Tip: N3v$r M1^d!
2017e.html#39 [CM] What was your first home computer?
2017d.html#101 Electronic Payments
2016h.html#14 The FBI Is Wrongly Telling People To Change Passwords 'Frequently'
2016h.html#12 The FBI Is Wrongly Telling People To Change Passwords 'Frequently'
2016c.html#67 We Must Stop The Race to Attribution After Each Cyberattack
2015f.html#11 Credit card fraud solution coming to America...finally
2015c.html#84 On a lighter note, even the Holograms are demonstrating
2015.html#100 Anthem Healthcare Hacked
2015.html#5 NYT on Sony hacking
2015.html#4 NYT on Sony hacking
2014k.html#14 Cyberspace KISS
2014g.html#42 Special characters for Passwords
2014g.html#35 Special characters for Passwords
2014g.html#30 Special characters for Passwords
2014f.html#74 Is end of mainframe near ?
2013h.html#22 Check out Moto X: Motorola reveals plans for ink and even pills to replace AL
2012j.html#68 The Myth of Password Complexity & Frequent Change Rules
2012j.html#64 The Myth of Password Complexity & Frequent Change Rules
2012j.html#62 The Myth of Password Complexity & Frequent Change Rules
2012j.html#61 The Myth of Password Complexity & Frequent Change Rules
2012j.html#56 Failing Gracefully
2012j.html#54 Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
2012i.html#35 US Senate proposes national data breach notification act
2012i.html#31 US Senate proposes national data breach notification act
2012g.html#27 Weak PINs, Habits Increase Risk of Financial Fraud
2012g.html#3 Quitting Top IBM Salespeople Say They Are Leaving In Droves
2012e.html#104 Time to Think ... and to Listen
2012d.html#8 Time to pull the PIN!
2012b.html#94 public key, encryption and trust
2012b.html#71 Password shortcomings
2012b.html#48 Driver's licenses for the Internet
2010n.html#59 Question: Why Has Debit Grown So Quickly?
2010m.html#64 How Safe Are Online Financial Transactions?
2010l.html#79 Five Theses on Security Protocols
2010l.html#5 Does an 'operator error' counts as a 'glitch?
2010k.html#5 The Attacker's Advantage
2010g.html#21 Should the USA Implement EMV?
2010f.html#75 Is Security a Curse for the Cloud Computing Industry?
2010f.html#25 Should the USA Implement EMV?
2010e.html#3 "Unhackable" Infineon Chip Physically Cracked - PCWorld
2010c.html#79 Customers risk online banking fraud by reusing bank credentials
2010c.html#72 Users still make hacking easy with weak passwords
2010c.html#59 Customers risk online banking fraud by reusing bank credentials
2010.html#95 Korean bank Moves back to Mainframes (...no, not back)
2009r.html#55 Verizon report goes deep inside data breach investigations
2009m.html#14 The Art of Creating Strong Passwords
2009m.html#13 PCI Council Releases Recommendations For Preventing Card-Skimming Attacks
2009i.html#68 Weak security enables credit card hacks
2009i.html#14 Online Banking's Innate Security Flaws
2009f.html#39 PIN Crackers Nab Holy Grail of Bank Card Security
2009e.html#75 The Future Shape of Payments Is Anything But Flat
2009e.html#2 Passwords: silly or serious?
2009b.html#61 Passport RFIDs cloned wholesale by $250 eBay auction spree
2009b.html#21 ICSF and VISA/MasterCard?amex reference list
2009b.html#14 question about ssh-keygen with empty passphrase
2009.html#72 Double authentification for internet payment
2008r.html#0 ATM Skimmers: Watch Out for Electronic Theft Devices
2008q.html#7 GPG
2008p.html#83 Residual Risk Methodology for Single Factor Authentication
2008p.html#42 Password Rules
2008o.html#76 Blinkenlights
2008n.html#45 In your experience which is a superior debit card scheme - PIN based debit or signature debit?
2008k.html#38 Calling Out
2008j.html#79 Calling Out
2008j.html#45 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008f.html#54 How do OTP tokens work?
2008f.html#49 How do OTP tokens work?
2008e.html#76 independent appraisers
2008d.html#10 Toyota Sales for 2007 May Surpass GM
2008d.html#3 Govt demands password to personal computer
2008c.html#76 Neglected IT Tasks May Have Led to Bank Meltdown
2008.html#54 Really stupid question about z/OS HTTP server
2007u.html#59 folklore indeed
2007u.html#51 folklore indeed
2007u.html#15 Public Computers
2007s.html#65 Translation of IBM Basic Assembler to C?
2007s.html#59 Translation of IBM Basic Assembler to C?
2007s.html#12 Translation of IBM Basic Assembler to C?
2007l.html#35 My Dream PC -- Chip-Based
2007i.html#64 John W. Backus, 82, Fortran developer, dies
2007e.html#61 Securing financial transactions a high priority for 2007
2007d.html#42 Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
2007d.html#34 Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
2007d.html#12 One Time Identification, a request for comments/testing
2007b.html#54 Forbidding Special characters in passwords
2007b.html#36 Special characters in passwords was Re: RACF - Password rules
2007b.html#10 Special characters in passwords was Re: RACF - Password rules
2007b.html#6 Special characters in passwords was Re: RACF - Password rules
2007.html#5 Securing financial transactions a high priority for 2007
2007.html#0 Securing financial transactions a high priority for 2007
2006w.html#30 Does Public Key Authentication offer additional security over SSH/SFTP
2006w.html#5 Patent buster for a method that increases password security
2006w.html#4 Patent buster for a method that increases password security
2006v.html#46 Patent buster for a method that increases password security
2006v.html#45 On sci.crypt: New attacks on the financial PIN processing
2006v.html#44 User Authentication
2006v.html#29 User Authentication
2006u.html#40 New attacks on the financial PIN processing
2006u.html#36 remote support questions - curiousity
2006u.html#5 Are there more stupid people in IT than there used to be?
2006u.html#3 ssh - password control or key control?
2006t.html#40 Encryption and authentication
2006t.html#5 Are there more stupid people in IT than there used to be?
2006r.html#38 Trying to underdtand 2-factor authentication
2006p.html#32 OT - hand-held security
2006o.html#37 the personal data theft pandemic continues
2006k.html#28 Hashes and Passwords
2006k.html#23 Value of an old IBM PS/2 CL57 SX Laptop
2006j.html#52 Passwords for bank sites - change or not?
2006j.html#42 Passwords for bank sites - change or not?
2006j.html#28 Password Complexity
2006i.html#25 Benefits of PKI - 5,000 nodes organization
2006i.html#3 Spoofing fingerprint scanners - NEWBIE()
2006h.html#26 Security
2006h.html#15 Security
2006h.html#13 Security
2006g.html#38 Why are smart cards so dumb?
2006d.html#41 Caller ID "spoofing"
2006c.html#35 X.509 and ssh
2006c.html#34 X.509 and ssh
2005v.html#3 ABN Tape - Found
2005u.html#33 PGP Lame question
2005t.html#34 RSA SecurID product
2005t.html#31 Looking for Information on password systems
2005t.html#27 RSA SecurID product
2005t.html#22 What ever happened to Tandem and NonStop OS ?
2005r.html#53 Password Requirements - VM:Secure
2005r.html#45 Password Requirements - VM:Secure
2005r.html#31 Symbols vs letters as passphrase?
2005r.html#25 PCI audit compliance
2005q.html#23 Logon with Digital Siganture (PKI/OCES - or what else they're called)
2005q.html#13 IPSEC with non-domain Server
2005p.html#33 Digital Singatures question
2005p.html#25 Hi-tech no panacea for ID theft woes
2005p.html#2 Innovative password security
2005o.html#17 Smart Cards?
2005o.html#1 The Chinese MD5 attack
2005o.html#0 The Chinese MD5 attack
2005m.html#37 public key authentication
2005m.html#15 Course 2821; how this will help for CISSP exam ?
2005l.html#35 More Phishing scams, still no SSL being used
2005l.html#22 The Worth of Verisign's Brand
2005l.html#8 derive key from password
2005l.html#7 Signing and bundling data using certificates
2005j.html#52 Banks
2005j.html#42 Public disclosure of discovered vulnerabilities
2005j.html#0 private key encryption - doubts
2005i.html#52 Single Password - Linux & Windows
2005i.html#36 Improving Authentication on the Internet
2005i.html#26 The Worth of Verisign's Brand
2005i.html#24 The Worth of Verisign's Brand
2005i.html#22 technical question about fingerprint usbkey
2005i.html#1 Brit banks introduce delays on interbank xfers due to phishing boom
2005h.html#46 Password question
2005g.html#57 Security via hardware?
2005g.html#51 Security via hardware?
2005g.html#48 "Best practices" or "Best implementations"?
2005g.html#33 Good passwords and security priorities
2005g.html#15 Good passwords and security priorities
2005g.html#0 What is a Certificate?
2005d.html#17 Digital signature with Javascript
2004q.html#0 Single User: Password or Certificate
2004p.html#60 Single User: Password or Certificate
2004m.html#9 REVIEW: "Biometrics for Network Security", Paul Reid
2004h.html#13 Two-factor Authentication Options?
2004f.html#13 racf
2004.html#29 passwords
2003o.html#29 Biometric cards will not stop identity fraud
2003m.html#51 public key vs passwd authentication?
2003m.html#50 public key vs passwd authentication?
2003m.html#1 Password / access rights check
2003l.html#64 Can you use ECC to produce digital signatures? It doesn't see
2003j.html#25 Idea for secure login
2003i.html#1 Two-factor authentication with SSH?
2003e.html#47 Public key and the authority problem
2002n.html#25 Help! Good protocol for national ID card?
2002n.html#14 So how does it work... (public/private key)
2002m.html#55 Beware, Intel to embed digital certificates in Banias
2002m.html#19 A new e-commerce security proposal
2002m.html#14 fingerprint authentication
2002l.html#35 Cryptography
2002j.html#63 SSL integrity guarantees in abscense of client certificates
2002j.html#18 Symmetric-Key Credit Card Protocol on Web Site
2002j.html#14 Symmetric-Key Credit Card Protocol on Web Site
2002f.html#45 Biometric Encryption: the solution for network intruders?
2002e.html#23 Opinion on smartcard security requested
2002e.html#18 Opinion on smartcard security requested
2002c.html#31 You think? TOM
2002c.html#7 Opinion on smartcard security requested
2001m.html#5 Smart Card vs. Magnetic Strip Market
2001k.html#34 A thought on passwords
2001j.html#52 Are client certificates really secure?
2001j.html#49 Are client certificates really secure?
2001j.html#9 E-commerce security????
2001j.html#2 E-commerce security????
2001j.html#0 E-commerce security????
2001i.html#57 E-commerce security????
2001i.html#36 Net banking, is it safe???
2001i.html#35 Net banking, is it safe???
2001i.html#25 Net banking, is it safe???
2001i.html#16 Net banking, is it safe???
2001i.html#9 Net banking, is it safe???
2001h.html#58 Net banking, is it safe???
2001h.html#7 PKI/Digital signature doesn't work
2001h.html#5 PKI/Digital signature doesn't work
2001f.html#31 Remove the name from credit cards!
2001f.html#25 Question about credit card number
2001c.html#45 PKI and Non-repudiation practicalities
2001c.html#42 PKI and Non-repudiation practicalities
2001c.html#41 PKI and Non-repudiation practicalities
2001c.html#34 PKI and Non-repudiation practicalities
2001c.html#30 PKI and Non-repudiation practicalities
2000g.html#49 Use of SET?
2000g.html#33 does CA need the proof of acceptance of key binding ?
2000g.html#5 e-commerce: Storing Credit Card numbers safely
2000b.html#92 Question regarding authentication implementation
2000b.html#90 Question regarding authentication implementation
2000.html#39 "Trusted" CA - Oxymoron?
aadsm28.htm#19 Lack of fraud reporting paths considered harmful
aadsm26.htm#30 man in the middle, SSL
aadsm25.htm#41 Why security training is really important (and it ain't anything to do with security!)
aadsm25.htm#4 Crypto to defend chip IP: snake oil or good idea?
aadsm22.htm#45 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm22.htm#6 long-term GPG signing key
aadsm22.htm#5 long-term GPG signing key
aadsm22.htm#2 GP4.3 - Growth and Fraud - Case #3 - Phishing
aadsm22.htm#1 GP4.3 - Growth and Fraud - Case #3 - Phishing
aadsm21.htm#40 X.509 / PKI, PGP, and IBE Secure Email Technologies
aadsm20.htm#41 Another entry in the internet security hall of shame
aadsm20.htm#24 [Clips] Escaping Password Purgatory
aadsm19.htm#47 the limits of crypto and authentication
aadsm19.htm#18 Citibank discloses private information to improve security
aadsm18.htm#18 Any TLS server key compromises?
aadsm18.htm#6 dual-use digital signature vulnerability
aadsm17.htm#58 Using crypto against Phishing, Spoofing and Spamming
aadsm17.htm#46 authentication and authorization (was: Question on the state of the security industry)
aadsm17.htm#42 Article on passwords in Wired News
aadsm17.htm#25 Single Identity. Was: PKI International Consortium
aadsm17.htm#19 PKI International Consortium
aadsm17.htm#15 PKI International Consortium
aadsm17.htm#13 A combined EMV and ID card
99.html#238 Attacks on a PKI
99.html#235 Attacks on a PKI
99.html#228 Attacks on a PKI
99.html#189 Internet Credit Card Security
aepay12.htm#8 Know your security onions (or security proportional to risk)
aepay12.htm#4 Confusing business process, payment, authentication and identification
aepay12.htm#2 Confusing business process, payment, authentication and identification
aepay11.htm#73 Account Numbers. Was: Confusing Authentication and Identiification? (addenda)
aepay11.htm#72 Account Numbers. Was: Confusing Authentication and Identiification? (addenda)
aepay11.htm#66 Confusing Authentication and Identiification?
aepay11.htm#53 Authentication white paper
aepay11.htm#50 Concern Grows About ID Theft
aepay11.htm#49 A More Anonymous Internet
aepay11.htm#37 Who's afraid of Mallory Wolf?
aepay10.htm#37 landscape & p-cards
aadsm16.htm#20 Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
aadsm15.htm#36 VS: On-line signature standards
aadsm15.htm#26 SSL, client certs, and MITM (was WYTM?)
aadsm15.htm#21 Simple SSL/TLS - Some Questions
aadsm14.htm#35 The real problem that https has conspicuously failed to fix
aadsm14.htm#33 An attack on paypal
aadsm14.htm#32 An attack on paypal
aadsm14.htm#30 Maybe It's Snake Oil All the Way Down
aadsm14.htm#29 Maybe It's Snake Oil All the Way Down
aadsm14.htm#28 Maybe It's Snake Oil All the Way Down
aadsm14.htm#26 Maybe It's Snake Oil All the Way Down
aadsm14.htm#4 Who's afraid of Mallory Wolf?
aadsm14.htm#1 Who's afraid of Mallory Wolf?
aadsm13.htm#14 A challenge (addenda)
aadsm12.htm#4 NEWS: 3D-Secure and Passport
aadsm11.htm#17 Alternative to Microsoft Passport: Sunshine vs Hai
aadsm10.htm#bio8 biometrics (addenda)
aadsm10.htm#bio7 biometrics
aadsm10.htm#bio3 biometrics (addenda)
aadsm8.htm#3dvulner 3D Secure Vulnerabilities?
aadsm8.htm#softpki11 Software for PKI
aadsm7.htm#rhose13 when a fraud is a sale, Re: Rubber hose attack
aadsm7.htm#rhose12 when a fraud is a sale, Re: Rubber hose attack
aadsm7.htm#rhose9 when a fraud is a sale, Re: Rubber hose attack
aadsm7.htm#cryptofree Erst-Freedom: Sic Semper Political Cryptography
aadsm6.htm#websecure merchant web server security
aadsm5.htm#shock2 revised Shocking Truth about Digital Signatures
aadsm3.htm#cstech8 cardtech/securetech & CA PKI
aadsm3.htm#cstech6 cardtech/securetech & CA PKI
aadsm3.htm#cstech5 cardtech/securetech & CA PKI
aadsm3.htm#cstech4 cardtech/securetech & CA PKI
aadsm2.htm#pkikrb PKI/KRB
aadsm2.htm#strawm3 AADS Strawman
aepay8.htm#vulner account number & shared-secret vulnerabilities
aepay7.htm#3dsecure 3D Secure Vulnerabilities? Photo ID's and Payment Infrastructure
aepay7.htm#netbank net banking, is it safe?? ... power to the consumer
aepay7.htm#ssexploit Shared-Secret exploit
aepay6.htm#erictalk Announce: Eric Hughes giving Stanford EE380 talk this
aepay6.htm#x959b X9.59 Electronic Payment standard issue
aepay3.htm#passwords Passwords don't work
aepay3.htm#aadsrel1 AADS related information
aepay3.htm#mcomm (my) misc. additional comments on X9.59 issues.
aepay3.htm#votec (my) long winded observations regarding X9.59 & XML, encryption and certificates

top , - by subject , - technology , - networking , - public key , - Boyd
three factor authentcation - Assurance - some mention of EU FINREAD - Risk, Fraud, Exploits, Threats, Vulnerabilities - Account Number Harvesting - postings mentioning MITM attacks - Buffer overflows, overruns, exploits - Secrets and Account numbers - Counterfeit YES CARDS - Naked Transaction Metaphor
home


Account Number Harvesting

2023.html#56 Classified Material and Security
2022b.html#47 Security
2021e.html#57 Hacking, Exploits and Vulnerabilities
2017k.html#0 Data Breach Notification
2017f.html#2 Gotcha, Tatcha! Thieves hide in servers to hoover up victims' bank card numbers mid-order
2017e.html#39 [CM] What was your first home computer?
2017d.html#101 Electronic Payments
2017c.html#61 [EXTERNAL] ComputerWorld Says: Cobol plays major role in U.S. government breaches
2016h.html#8 Make companies pay full cost of breaches to restore trust in the internet, says ISOC
2016g.html#35 OODA-loop and virtual machines
2016g.html#33 OODA-loop and virtual machines
2016c.html#67 We Must Stop The Race to Attribution After Each Cyberattack
2015f.html#11 Credit card fraud solution coming to America...finally
2015c.html#96 Data breach notification bill could weaken consumer protections
2015.html#100 Anthem Healthcare Hacked
2015.html#5 NYT on Sony hacking
2014k.html#58 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#14 Cyberspace KISS
2014.html#65 Washington Post on Target store data thefts
2014.html#57 Washington Post on Target store data thefts
2014.html#53 Why the Target Breach Might Be Even Bigger: Big Data Means Big Breach
2013n.html#12 How the IETF plans to protect the web from NSA snooping
2013m.html#22 Steve B sees what investors think
2013m.html#14 Gilmore response to NSA mathematician's "make rules for NSA" appeal
2013j.html#46 Feds indict indentity theft ring
2013j.html#45 U.S. agents 'got lucky' pursuing accused Russia master hackers
2013h.html#22 Check out Moto X: Motorola reveals plans for ink and even pills to replace AL
2012o.html#23 Does the IBM System z Mainframe rely on Security by Obscurity or is it Secure by Design?
2012m.html#10 Does the IBM System z Mainframe rely on Security by Obscurity or is it Secure by Design
2012j.html#56 Failing Gracefully
2012j.html#47 Yahoo Password Breach: 7 Lessons Learned - Security - Attacks/breaches - Informationweek
2012i.html#80 Firms told to own up to cybercrime attacks
2012i.html#35 US Senate proposes national data breach notification act
2012i.html#31 US Senate proposes national data breach notification act
2012g.html#27 Weak PINs, Habits Increase Risk of Financial Fraud
2012d.html#55 Do you know where all your sensitive data is located?
2012d.html#49 Do you know where all your sensitive data is located?
2012c.html#11 The 15 Worst Data Security Breaches of the 21st Century
2012c.html#6 The 15 Worst Data Security Breaches of the 21st Century
2012c.html#3 zSeries Manpower Sizing
2012b.html#71 Password shortcomings
2012b.html#3 Why Threat Modelling fails in practice
2011n.html#47 PCI and the Insider Threat
2011l.html#72 Selectric Typewriter--50th Anniversary
2011l.html#49 Does outsourcing cause data loss?
2011l.html#47 Does outsourcing cause data loss?
2011j.html#63 Why do defenders keep losing to smaller cyberwarriors?
2011h.html#60 Cyberwar vs. Cyber-Espionage vs. Cybercrime
2011h.html#21 Eurofighter v F16
2011h.html#9 Breaches and Consumer Backlash
2011.html#30 Data Breaches: Stabilize in 2010, But There's an Asterisk
2010q.html#4 Plug Your Data Leaks from the inside
2010q.html#2 "Compound threats" to appear in 2011 ?
2010q.html#0 Card Fraud: 'Flash Attacks' and Wireless Transmissions
2010p.html#40 The Great Cyberheist
2010p.html#25 CARD AUTHENTICATION TECHNOLOGY - Embedded keypad on Card - Is this the future
2010p.html#5 Fun with ATM Skimmers, Part III
2010o.html#76 E-commerce smackdown as PCI standards revised
2010o.html#36 Cookies Are Dead in the Fight Against Fraud
2010o.html#9 On Scope Scrinkage in PCI DSS
2010o.html#8 PCI: Smaller Merchants Threatened
2010n.html#77 ZeuS attacks mobiles in bank SMS bypass scam
2010n.html#72 When Merchants Get Rid Of Cardholder Data
2010n.html#52 Who are these people who think cybersecurity experts are crying wolf?
2010n.html#49 ZeuS attacks mobiles in bnak SMS bypass scam
2010n.html#47 ZeuS attacks mobiles in bank SMS bypass scam
2010n.html#46 Who are these people who think cybersecurity experts are crying wolf?
2010n.html#44 Who are these people who think cybersecurity experts are crying wolf?
2010n.html#28 Will new card innovation help interchange and improve retention?
2010n.html#23 Credit Card with a Computer Inside
2010n.html#22 Data breaches remain high
2010n.html#6 zSecurity blog post - "READ is not benign"
2010n.html#4 zSecurity blog post - "READ is not benign"
2010n.html#1 zSecurity blog post - "READ is not benign"
2010m.html#64 How Safe Are Online Financial Transactions?
2010m.html#19 AT&T, Verizon to Target Visa, MasterCard With Phones
2010m.html#7 GSM eavesdropping
2010m.html#6 Five Theses on Security Protocols
2010m.html#2 Five Theses on Security Protocols
2010l.html#79 Five Theses on Security Protocols
2010l.html#28 Mainframe Hacking -- Fact or Fiction
2010g.html#84 In SSL We Trust? Not Lately
2010f.html#75 Is Security a Curse for the Cloud Computing Industry?
2010f.html#25 Should the USA Implement EMV?
2010e.html#41 PCI tokenization push promising but premature, experts say
2010c.html#72 Users still make hacking easy with weak passwords
2010c.html#59 Customers risk online banking fraud by reusing bank credentials
2010b.html#12 Korean bank Moves back to Mainframes (...no, not back)
2009m.html#67 European Banks Warned: Brace for Rise in Cash Machine Fraud
2009m.html#13 PCI Council Releases Recommendations For Preventing Card-Skimming Attacks
2009l.html#53 Hacker charges also an indictment on PCI, expert says
2009l.html#50 Hacker charges also an indictment on PCI, expert says
2009l.html#4 Card PINs traded at two for a dollar
2009k.html#77 Cyber attackers empty business accounts in minutes
2009k.html#54 The satate of software
2009k.html#21 Security certificate warnings don't work, researchers say
2009j.html#26 Price Tag for End-to-End Encryption: $4.8 Billion, Mercator Says
2009j.html#11 Is anyone aware of a system that offers three layers of security and ID protection for online purchases or even over the counter POS purchases?
2009i.html#68 Weak security enables credit card hacks
2009i.html#53 Merchant Groups Ask for Broad Changes in Letter to PCI's Overseer
2009i.html#20 Online Banking's Innate Security Flaws
2009i.html#14 Online Banking's Innate Security Flaws
2009g.html#57 LexisNexis says its data was used by fraudsters
2009e.html#21 ATMs At Risk
2009d.html#38 Internet threat: Hackers swarm bank accounts
2009d.html#27 Californa's Data Breach Law May Get an Update
2009b.html#63 Study: Data breaches continue to get more costly for businesses
2009b.html#28 Online-Banking Authentication
2009b.html#13 US credit card payment house breaches by sniffing malware
2009b.html#9 New Research Reveals 45% of Card Breach Victims Lose Confidence in Their Financial Accounts
2009b.html#6 US credit card payment house breached by sniffing malware
2009.html#66 What's missing in security: business
2009.html#33 European Payments Council calls for action on counterfeit cards
2009.html#29 Data losses set to soar
2009.html#7 Swedish police warn of tampered credit card terminals
2008s.html#50 Perfect MITM Attacks With No-Check SSL
2008s.html#10 Data leakage - practical measures to improve Information Governance
2008s.html#1 PCI's Bob Russo: Data loss hurts brand more than a fine
2008r.html#59 Stolen credit-card boom
2008r.html#53 21 million German bank account details on black market
2008r.html#23 What is the level of security in payment systems (credit and bank cards) nowadays?
2008p.html#23 Your views on the increase in phishing crimes such as the recent problem French president Sarkozy faces
2008p.html#14 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#5 Privacy, Identity theft, account fraud
2008o.html#76 Blinkenlights
2008n.html#75 Should online transactions be allowed on credit cards without adequate safeguards?
2008n.html#54 In your experience which is a superior debit card scheme - PIN based debit or signature debit?
2008n.html#38 In your experience which is a superior debit card scheme - PIN based debit or signature debit?
2008l.html#53 Quality of IBM school clock systems?
2008j.html#79 Calling Out
2008j.html#55 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008j.html#37 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008i.html#101 We're losing the battle
2008i.html#42 "Security Breaches"
2008g.html#27 Hannaford case exposes holes in law, some say
2008g.html#10 Hannaford case exposes holes in law, some say
2008g.html#8 Hannaford case exposes holes in law, some say
2008e.html#69 independent appraisers
2008b.html#67 Govt demands password to personal computer
2008.html#31 1975 movie "Three Days of the Condor" tech stuff
2007u.html#58 folklore indeed
2007u.html#56 folklore indeed
2007u.html#10 Crypto Related Posts
2007t.html#22 'Man in the browser' is new threat to online banking
2007t.html#6 Translation of IBM Basic Assembler to C?
2007s.html#10 Translation of IBM Basic Assembler to C?
2007r.html#34 Is the media letting banks off the hook on payment card security
2007r.html#24 How to tell a fake SSL certificate from a real one
2007o.html#29 EZPass: Yes, Big Brother IS Watching You!
2007o.html#27 EZPass: Yes, Big Brother IS Watching You!
2007n.html#85 PCI Compliance - Encryption of all non-console administrative access
2007n.html#72 Poll: oldest computer thing you still use
2007n.html#71 Poll: oldest computer thing you still use
2007n.html#9 John W. Backus, 82, Fortran developer, dies
2007l.html#35 My Dream PC -- Chip-Based
2007k.html#53 My Dream PC -- Chip-Based
2007j.html#3 John W. Backus, 82, Fortran developer, dies
2007i.html#64 John W. Backus, 82, Fortran developer, dies
2007i.html#19 John W. Backus, 82, Fortran developer, dies
2007i.html#17 John W. Backus, 82, Fortran developer, dies
2007h.html#58 T.J. Maxx data theft worse than first reported
2007h.html#56 T.J. Maxx data theft worse than first reported
2007h.html#43 sizeof() was: The Perfect Computer - 36 bits?
2007h.html#36 sizeof() was: The Perfect Computer - 36 bits?
2007g.html#30 T.J. Maxx data theft worse than first reported
2007g.html#20 T.J. Maxx data theft worse than first reported
2007g.html#19 T.J. Maxx data theft worse than first reported
2007g.html#8 Securing financial transactions a high priority for 2007
2007f.html#75 Securing financial transactions a high priority for 2007
2007f.html#72 Securing financial transactions a high priority for 2007
2007f.html#68 Securing financial transactions a high priority for 2007
2007f.html#58 Securing financial transactions a high priority for 2007
2007e.html#61 Securing financial transactions a high priority for 2007
2007d.html#70 Securing financial transactions a high priority for 2007
2007d.html#57 Which is the Fastest (Secure) Way to Exchange 256-bit Keys?
2007d.html#10 The logic of privacy
2007c.html#43 Securing financial transactions a high priority for 2007
2007c.html#33 Securing financial transactions a high priority for 2007
2007c.html#15 Securing financial transactions a high priority for 2007
2007c.html#10 Securing financial transactions a high priority for 2007
2007c.html#8 Securing financial transactions a high priority for 2007
2007c.html#6 Securing financial transactions a high priority for 2007
2007b.html#60 Securing financial transactions a high priority for 2007
2007.html#5 Securing financial transactions a high priority for 2007
2007.html#0 Securing financial transactions a high priority for 2007
2006y.html#25 "The Elements of Programming Style"
2006x.html#14 IBM ATM machines
2006w.html#5 Patent buster for a method that increases password security
2006w.html#4 Patent buster for a method that increases password security
2006v.html#49 Patent buster for a method that increases password security
2006v.html#45 On sci.crypt: New attacks on the financial PIN processing
2006v.html#2 New attacks on the financial PIN processing
2006u.html#43 New attacks on the financial PIN processing
2006u.html#40 New attacks on the financial PIN processing
2006u.html#36 remote support questions - curiousity
2006t.html#40 Encryption and authentication
2006t.html#5 Are there more stupid people in IT than there used to be?
2006p.html#32 OT - hand-held security
2006o.html#40 the personal data theft pandemic continues
2006o.html#37 the personal data theft pandemic continues
2006m.html#24 OT - J B Hunt
2006m.html#15 OpenSSL Hacks
2006l.html#33 Google Architecture
2006k.html#23 Value of an old IBM PS/2 CL57 SX Laptop
2006k.html#17 Hey! Keep Your Hands Out Of My Abstraction Layer!
2006k.html#5 Value of an old IBM PS/2 CL57 SX Laptop
2006k.html#0 Passwords for bank sites - change or not?
2006i.html#25 Benefits of PKI - 5,000 nodes organization
2006h.html#26 Security
2006h.html#15 Security
2006h.html#13 Security
2006e.html#44 Does the Data Protection Act of 2005 Make Sense
2006e.html#30 Debit Cards HACKED now
2006e.html#24 Debit Cards HACKED now
2006d.html#41 Caller ID "spoofing"
2006d.html#31 Caller ID "spoofing"
2006d.html#28 Caller ID "spoofing"
2006c.html#35 X.509 and ssh
2006.html#11 Some credible documented evidence that a MVS or later op sys has ever been hacked
2005v.html#3 ABN Tape - Found
2005v.html#2 ABN Tape - Found
2005u.html#33 PGP Lame question
2005u.html#31 AMD to leave x86 behind?
2005u.html#3 PGP Lame question
2005t.html#34 RSA SecurID product
2005p.html#34 What is CRJE
2005p.html#24 Hi-tech no panacea for ID theft woes
2005p.html#15 DUMP Datasets and SMS
2005n.html#45 Anyone know whether VM/370 EDGAR is still available anywhere?
2005m.html#53 Barcode Email
2005m.html#16 CPU time and system load
2005l.html#36 More Phishing scams, still no SSL being used
2005l.html#35 More Phishing scams, still no SSL being used
2005l.html#24 The Worth of Verisign's Brand
2005l.html#23 The Worth of Verisign's Brand
2005l.html#22 The Worth of Verisign's Brand
2005k.html#56 Encryption Everywhere? (Was: Re: Ho boy! Another big one!)
2005k.html#55 Encryption Everywhere? (Was: Re: Ho boy! Another big one!)
2005k.html#32 The 8008 (was: Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELYwith slide rules)
2005k.html#31 Banks
2005k.html#26 More on garbage
2005j.html#54 Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
2005j.html#53 Banks
2005j.html#52 Banks
2005j.html#10 Request for comments - anti-phishing approach
2005j.html#3 Request for comments - anti-phishing approach
2005i.html#38 More Phishing scams, still no SSL being used
2005i.html#37 Secure FTP on the Mainframe
2005i.html#36 Improving Authentication on the Internet
2005i.html#14 The Worth of Verisign's Brand
2005i.html#9 More Phishing scams, still no SSL being used
2005i.html#8 More Phishing scams, still no SSL being used
2005i.html#1 Brit banks introduce delays on interbank xfers due to phishing boom
2005i.html#0 More Phishing scams, still no SSL being used
2005h.html#13 Today's mainframe--anything to new?
2005h.html#6 Software for IBM 360/30 (was Re: DOS/360: Forty years)
2005g.html#51 Security via hardware?
2005g.html#46 Maximum RAM and ROM for smartcards
2005f.html#53 Where should the type information be: in tags and descriptors
2005f.html#18 Is Supercomputing Possible?
2005f.html#12 Mozilla v Firefox
2005f.html#11 Mozilla v Firefox
2005e.html#31 Public/Private key pair protection on Windows
2005c.html#51 [Lit.] Buffer overruns
2005b.html#41 [Lit.] Buffer overruns
2005.html#14 Using smart cards for signing and authorization in applets
2005.html#5 [Lit.] Buffer overruns
2004m.html#9 REVIEW: "Biometrics for Network Security", Paul Reid
2004k.html#22 Public key authentication defeats passwd age warning
2004k.html#22 Public key authentication defeats passwd age warning
2004j.html#2 Authenticated Public Key Exchange without Digital Certificates?
2004j.html#0 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#5 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#2 Adventure game (was:PL/? History (was Hercules))
2004f.html#31 MITM attacks
2004f.html#8 racf
2004b.html#55 Oldest running code
2004b.html#50 The SOB that helped IT jobs move to India is dead!
2004b.html#39 SSL certificates
2004.html#29 passwords
2003o.html#50 Pub/priv key security
2003o.html#29 Biometric cards will not stop identity fraud
2003o.html#4 Bank security question (newbie question)
2003o.html#3 Bank security question (newbie question)
2003m.html#51 public key vs passwd authentication?
2003j.html#60 Big Ideas, where are they now?
2003h.html#45 Question about Unix "heritage"
2003h.html#25 HELP, Vulnerability in Debit PIN Encryption security, possibly
2003h.html#24 HELP, Vulnerability in Debit PIN Encryption security, possibly
2003e.html#78 Microsoft strikes again - from comp.risks
2003d.html#30 SSL questions
2003d.html#14 OT: Attaining Perfection
2003b.html#27 360/370 disk drives
2002q.html#52 Big Brother -- Re: National IDs
2002o.html#56 Certificate Authority: Industry vs. Government
2002m.html#36 (OT) acceptance of technology, was: Convenient and secure
2002m.html#20 A new e-commerce security proposal
2002m.html#19 A new e-commerce security proposal
2002j.html#63 SSL integrity guarantees in abscense of client certificates
2002i.html#74 A Lesson In Security
2002h.html#40 [survey] Possestional Security
2002f.html#45 Biometric Encryption: the solution for network intruders?
2002f.html#10 Least folklorish period in computing (was Re: IBM Mainframe at home)
2002e.html#37 Would the value of knowledge and information be transferred or shared accurately across the different culture??????
2002e.html#18 Opinion on smartcard security requested
2002d.html#42 Farm kids
2002d.html#41 Why?
2002d.html#16 Mainframers: Take back the light (spotlight, that is)
2001m.html#4 Smart Card vs. Magnetic Strip Market
2001k.html#34 A thought on passwords
2001j.html#52 Are client certificates really secure?
2001j.html#9 E-commerce security????
2001i.html#57 E-commerce security????
2001i.html#25 Net banking, is it safe???
2001h.html#75 Net banking, is it safe???
2001h.html#70 Net banking, is it safe???
2001h.html#68 Net banking, is it safe???
2001h.html#67 Would this type of credit card help online shopper to feel more secure?
2001h.html#66 UUCP email
2001h.html#61 Net banking, is it safe???
2001h.html#58 Net banking, is it safe???
2001h.html#53 Net banking, is it safe???
2001h.html#37 Credit Card # encryption
2001h.html#7 PKI/Digital signature doesn't work
2001h.html#5 PKI/Digital signature doesn't work
2001g.html#63 PKI/Digital signature doesn't work
2001g.html#38 distributed authentication
2001g.html#29 any 70's era supercomputers that ran as slow as today's supercomputers?
2001g.html#11 FREE X.509 Certificates
2001g.html#0 FREE X.509 Certificates
2001f.html#57 any 70's era supercomputers that ran as slow as today's supercomputers?
2001f.html#55 any 70's era supercomputers that ran as slow as today's supercomputers?
2001f.html#54 any 70's era supercomputers that ran as slow as today's supercomputers?
2001f.html#52 any 70's era supercomputers that ran as slow as today's supercomputers?
2001f.html#31 Remove the name from credit cards!
2001f.html#25 Question about credit card number
2001f.html#24 Question about credit card number
2001d.html#19 [Newbie] Authentication vs. Authorisation?
2001c.html#73 PKI and Non-repudiation practicalities
2001c.html#59 PKI and Non-repudiation practicalities
2001c.html#54 PKI and Non-repudiation practicalities
2001c.html#45 PKI and Non-repudiation practicalities
2001c.html#44 PKI and Non-repudiation practicalities
2001c.html#42 PKI and Non-repudiation practicalities
2001c.html#41 PKI and Non-repudiation practicalities
2001c.html#39 PKI and Non-repudiation practicalities
aadsm28.htm#77 How safe do you feel when using a debit or credit card?
aadsm28.htm#74 Visa and MasterCard mandated PCI compliance as of Jan 1, 2008. I would like to get a feel or opinion on this subject
aadsm28.htm#71 Paypal -- Practical Approaches to Phishing -- open white paper
aadsm28.htm#64 Seeking expert on credit card fraud prevention - particularly CNP/online transactions
aadsm28.htm#56 Signs of Liability: 'Zero Day Threat' blames IT and Security industry
aadsm28.htm#53 Pogo reports: big(gest) bank breach was covered up?
aadsm28.htm#52 Pogo reports: big(gest) bank breach was covered up?
aadsm28.htm#50 Liability for breaches: do we need new laws?
aadsm28.htm#19 Lack of fraud reporting paths considered harmful
aadsm27.htm#15 307 digit number factored
aadsm27.htm#3 Solution to phishing -- an idea who's time has come?
aadsm27.htm#2 Threatwatch: Still searching for the economic MITM
aadsm26.htm#70 WSJ: Soft evidence on a crypto-related breach
aadsm26.htm#66 More Tipping Point evidence - POS vendors sued
aadsm26.htm#24 News.com: IBM donates new privacy tool to open-source Higgins
aadsm26.htm#18 SSL (https, really) accelerators for Linux/Apache?
aadsm26.htm#11 What is the point of encrypting information that is publicly visible?
aadsm26.htm#6 Citibank e-mail looks phishy
aadsm25.htm#41 Why security training is really important (and it ain't anything to do with security!)
aadsm25.htm#25 RSA SecurID SID800 Token vulnerable by design
aadsm25.htm#24 DDA cards may address the UK Chip&Pin woes
aadsm25.htm#5 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#4 Crypto to defend chip IP: snake oil or good idea?
aadsm24.htm#38 Interesting bit of a quote
aadsm24.htm#10 Naked Payments IV - let's all go naked
aadsm24.htm#9 Naked Payments IV - let's all go naked
aadsm23.htm#54 Status of SRP
aadsm23.htm#34 Chip-and-Pin terminals were replaced by "repairworkers"?
aadsm23.htm#30 Petrol firm suspends chip-and-pin
aadsm23.htm#28 JIBC April 2006 - "Security Revisionism"
aadsm23.htm#27 Chip-and-Pin terminals were replaced by "repairworkers"?
aadsm23.htm#26 Petrol firm suspends chip-and-pin
aadsm23.htm#25 Petrol firm suspends chip-and-pin
aadsm23.htm#20 Petrol firm suspends chip-and-pin
aadsm23.htm#19 Petrol firm suspends chip-and-pin
aadsm22.htm#45 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm22.htm#44 Creativity and security
aadsm22.htm#36 Unforgeable Blinded Credentials
aadsm22.htm#5 long-term GPG signing key
aadsm22.htm#2 GP4.3 - Growth and Fraud - Case #3 - Phishing
aadsm22.htm#1 GP4.3 - Growth and Fraud - Case #3 - Phishing
aadsm21.htm#34 X.509 / PKI, PGP, and IBE Secure Email Technologies
aadsm21.htm#16 PKI too confusing to prevent phishing, part 28
aadsm20.htm#1 Keeping an eye on ATM fraud
aadsm19.htm#48 Why Blockbuster looks at your ID
aadsm19.htm#47 the limits of crypto and authentication
aadsm19.htm#40 massive data theft at MasterCard processor
aadsm19.htm#39 massive data theft at MasterCard processor
aadsm19.htm#38 massive data theft at MasterCard processor
aadsm19.htm#28 "SSL stops credit card sniffing" is a correlation/causality myth
aadsm19.htm#27 Citibank discloses private information to improve security
aadsm19.htm#24 Citibank discloses private information to improve security
aadsm19.htm#19 "SSL stops credit card sniffing" is a correlation/causality myth
aadsm19.htm#18 Citibank discloses private information to improve security
aadsm19.htm#17 What happened with the session fixation bug?
aadsm19.htm#13 What happened with the session fixation bug?
aadsm19.htm#5 Do You Need a Digital ID?
aadsm18.htm#45 Banks Test ID Device for Online Security
aadsm18.htm#35 Credit card leaks continue at a furious pace
aadsm18.htm#29 EMV cards as identity cards
aadsm18.htm#18 Any TLS server key compromises?
aadsm18.htm#6 dual-use digital signature vulnerability
aepay12.htm#24 More on the ID theft saga
aepay12.htm#23 Police smash UK's biggest credit card fraud ring
aepay12.htm#14 Technology and Crime, Criminal Intelligence Service Canada - 2003
aepay12.htm#6 Know Your Enemy Automated Credit Card Fraud (automated, forwarded)
aepay11.htm#63 E-merchants Turn Fraud-busters
aepay11.htm#62 HIPAA, privacy, identity theft (addenda)
aepay11.htm#49 A More Anonymous Internet
aepay11.htm#37 Who's afraid of Mallory Wolf?
aepay11.htm#32 Don't-Ask-Don't-Tell E-commerce
aepay11.htm#22 FBI Probing Theft of 8 Million Credit Card Numbers
aepay10.htm#44 Credit Card Skimming Rising In The US
aepay10.htm#38 Credit card fraud sending night-vision rifle scope to criminal
aepay10.htm#26 Definese Dept Criticised on Internal Credit Card Fraud
aepay10.htm#25 Definese Dept Criticised on Internal Credit Card Fraud
aepay10.htm#19 Misc. payment, security, fraud, & authentication GAO reports (long posting)
aepay10.htm#6 credit card & gift card fraud (from today's comp.risks)
aepay10.htm#3 High-tech Thieves Snatch Data From ATMs (including PINs)
aadsm17.htm#60 Using crypto against Phishing, Spoofing and Spamming
aadsm17.htm#53 Using crypto against Phishing, Spoofing and Spamming
aadsm17.htm#50 authentication and authorization (was: Question on the state of the security industry)
aadsm17.htm#49 Use cash machines as little as possible
aadsm17.htm#47 authentication and authorization ... addenda
aadsm17.htm#46 authentication and authorization (was: Question on the state of the security industry)
aadsm17.htm#42 Article on passwords in Wired News
aadsm17.htm#35 Online credit card fraud rocks Indonesia
aadsm17.htm#2 Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
aadsm16.htm#20 Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
aadsm15.htm#36 VS: On-line signature standards
aadsm15.htm#27 SSL, client certs, and MITM (was WYTM?)
aadsm15.htm#21 Simple SSL/TLS - Some Questions
aadsm15.htm#5 Is cryptography where security took the wrong branch?
aadsm15.htm#2 Is cryptography where security took the wrong branch?
aadsm14.htm#34 virus attack on banks (was attack on paypal)
aadsm14.htm#32 An attack on paypal
aadsm14.htm#28 Maybe It's Snake Oil All the Way Down
aadsm14.htm#4 Who's afraid of Mallory Wolf?
aadsm14.htm#2 Who's afraid of Mallory Wolf? (addenda)
aadsm14.htm#1 Who's afraid of Mallory Wolf?
aadsm13.htm#35 How effective is open source crypto? (bad form)
aadsm12.htm#60 signing & authentication (was Credit Card Scam)
aadsm12.htm#57 eBay Customers Targetted by Credit Card Scam
aadsm12.htm#51 Frist Data Unit Says It's Untangling Authentication
aadsm12.htm#47 Online Fraud Growing in Scale, Sophistication
aadsm11.htm#45 Web site exposes credit card fraud
aadsm11.htm#44 Web site exposes credit card fraud
aadsm10.htm#bio7 biometrics
aadsm10.htm#bio6 biometrics
aadsm10.htm#bio5 biometrics
aadsm10.htm#bio3 biometrics (addenda)
aadsm10.htm#tamper Limitations of limitations on RE/tampering (was: Re: biometrics)
aadsm10.htm#risks credit card & gift card fraud (from today's comp.risks)
aadsm10.htm#cfppki13 CFP: PKI research workshop
aadsm9.htm#carnivore Shades of FV's Nathaniel Borenstein: Carnivore's "Magic Lantern"
aadsm8.htm#softpki16 DNSSEC (RE: Software for PKI)
aadsm7.htm#rhose5 when a fraud is a sale, Re: Rubber hose attack
aadsm7.htm#rhose4 Rubber hose attack
aadsm7.htm#rubberhose Rubber hose attack
aadsm7.htm#cryptofree Erst-Freedom: Sic Semper Political Cryptography
aadsm7.htm#auth2 Who or what to authenticate? (addenda)
aadsm7.htm#pcards4 FW: The end of P-Cards?
aadsm6.htm#terror14 [FYI] Did Encryption Empower These Terrorists? (addenda to chargebacks)
aadsm6.htm#terror8 [FYI] Did Encryption Empower These Terrorists?
aadsm6.htm#terror7 [FYI] Did Encryption Empower These Terrorists?
aadsm6.htm#websecure merchant web server security
aadsm5.htm#asrn4 assurance, X9.59, etc
aepay9.htm#skim High-tech Thieves Snatch Data From ATMs (including PINs)
aepay9.htm#risks credit card & gift card fraud (from today's comp.risks)
aepay8.htm#x959paper Credit Card Fraud and E-Commerce: A Case Study
aepay8.htm#ccfraud2 Statistics for General and Online Card Fraud
aepay8.htm#ccfraud Almost Half UK E-Shopper's Fear Card Fraud (CC fraud increased by 50% in 2k)
aepay7.htm#netbank net banking, is it safe?? ... power to the consumer
aepay7.htm#ssexploit Shared-Secret exploit
aepay7.htm#nonrep6 non-repudiation, was Re: crypto flaw in secure mail standards
aepay7.htm#nonrep5 non-repudiation, was Re: crypto flaw in secure mail standards
aepay7.htm#nonrep4 non-repudiation, was Re: crypto flaw in secure mail standards
aepay7.htm#nonrep3 non-repudiation, was Re: crypto flaw in secure mail standards
aepay7.htm#nonrep1 non-repudiation, was Re: crypto flaw in secure mail standards
aepay7.htm#nonrep0 non-repudiation, was Re: crypto flaw in secure mail standards
aepay6.htm#ccfraud3 "out of control credit card fraud"
aepay6.htm#ccfraud2 "out of control credit card fraud"
aepay6.htm#erictalk Announce: Eric Hughes giving Stanford EE380 talk this
aepay6.htm#harvest2 shared-secrets, CC#, & harvesting CC#
aepay6.htm#harvest harvesting of credit card numbers
aepay6.htm#fraud Online Card Fraud Thirty Times That Offline
aadsmore.htm#debitfraud Debit card fraud in Canada
ansiepay.htm#theory Security breach raises questions about Internet shopping
ansiepay.htm#privacy more on privacy

top , - by subject , - technology , - networking , - public key , - Boyd
three factor authentcation - Assurance - some mention of EU FINREAD - Risk, Fraud, Exploits, Threats, Vulnerabilities - Account Number Harvesting - postings mentioning MITM attacks - Buffer overflows, overruns, exploits - Secrets and Account numbers - Counterfeit YES CARDS - Naked Transaction Metaphor
home


some mention of EU FINREAD

2022b.html#42 Security
2018f.html#36 Banking via home computers/internet is a disaster for the computer world
2018.html#110 Making Computers Secure
2016h.html#99 PC Compromise and Internet Transactions
2016e.html#35 How the internet was invented
2016c.html#55 Institutional Memory and Two-factor Authentication
2014k.html#60 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#59 LA Times commentary: roll out "smart" credit cards to deter fraud
2014i.html#61 A computer at home?
2014i.html#59 A computer at home?
2014h.html#43 Oil Co. Wins $350,000 Cyberheist Settlement
2014g.html#41 Special characters for Passwords
2014g.html#17 Is it time for a revolution to replace TLS?
2014f.html#17 Online Debit, Credit Fraud Will Soon Get Much Worse
2014f.html#8 Is cybersecurity the next banking crisis in the making?
2014e.html#64 How the IETF plans to protect the web from NSA snooping
2014e.html#44 The dark side of digital banking
2013j.html#21 8080 BASIC
2013j.html#5 Botnets Unearthed -- The ZEUS BOT
2012n.html#75 history of Programming language and CPU in relation to each other
2012l.html#32 Use another browser - Kaspersky follows suit
2012j.html#94 Gordon Crovitz: Who Really Invented the Internet?
2012j.html#73 Is it time to consider a stand-alone PC for online banking?
2012j.html#72 Bank Sues Customer Over ACH/Wire Fraud
2012j.html#8 Federal appeal court raps bank over shoddy online security
2012i.html#79 Does Two-Factor Authentication Need Fixing?
2012i.html#32 Zeus/SpyEye 'Automatic Transfer' Module Masks Online Banking Theft
2012b.html#71 Password shortcomings
2012b.html#52 Banking malware a growing threat, as new variant of Zeus is detected
2011o.html#13 Two-Factor Authentication - Hardware token or SMS OTP
2011m.html#38 ISBNs
2010o.html#81 The Credit Card Criminals Are Getting Crafty
2010n.html#47 ZeuS attacks mobiles in bank SMS bypass scam
2010m.html#65 How Safe Are Online Financial Transactions?
2010m.html#38 U.K. bank hit by massive fraud from ZeuS-based botnet
2010j.html#41 Monet, was Re: A "portable" hard disk
2010g.html#21 Should the USA Implement EMV?
2010f.html#30 Should the USA Implement EMV?
2010f.html#6 Online Banking & Password Theft
2010d.html#31 Michigan firm sues bank over theft of $560,000
2010d.html#25 Cambridge researchers show Chip and PIN system vulnerable to fraud
2010d.html#21 Credit card data security: Who's responsible?
2010c.html#79 Customers risk online banking fraud by reusing bank credentials
2010b.html#21 security and online banking
2009r.html#48 Strong Authentication Not Strong Enough
2009p.html#75 What's old is new again
2009p.html#65 Crypto dongles to secure online transactions
2009n.html#72 Real-Time Hackers Foil Two-Factor Security
2009n.html#3 Hacker charges also an indictment on PCI, expert says
2009m.html#49 Hacker charges also an indictment on PCI, expert says
2009m.html#4 Hacker charges also an indictment on PCI, expert says
2009m.html#0 Lawsuit seeks to pry information from banks on account breaches
2009l.html#6 Cyber attackers empty business accounts in minutes
2009l.html#2 Cyber attackers empty business accounts in minutes
2009j.html#31 password safes for mac
2009d.html#38 Internet threat: Hackers swarm bank accounts
2009.html#69 Double authentification for internet payment
2009.html#34 Swedish police warn of tampered credit card terminals
2008q.html#3 GPG
2008p.html#32 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#28 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#18 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#11 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008o.html#9 Homebanking authentication methods: what's being used by your bank?
2008o.html#2 Credit Card Security
2008l.html#33 Authentication in the e-tailer / payment gateway / customer triangle
2008j.html#57 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2007v.html#6 Ironkey
2007u.html#76 folklore indeed
2007u.html#74 folklore indeed
2007u.html#71 folklore indeed
2007u.html#67 folklore indeed
2007u.html#60 folklore indeed
2007u.html#47 folklore indeed
2007u.html#15 Public Computers
2007u.html#11 Public Computers
2007t.html#22 'Man in the browser' is new threat to online banking
2007n.html#78 Poll: oldest computer thing you still use
2007m.html#27 nouns and adjectives
2007l.html#41 My Dream PC -- Chip-Based
2007l.html#39 My Dream PC -- Chip-Based
2007e.html#20 Securing financial transactions a high priority for 2007
2007c.html#44 Securing financial transactions a high priority for 2007
2007c.html#36 Securing financial transactions a high priority for 2007
2006v.html#26 Fighting Fraudulent Transactions
2006s.html#34 Basic Question
2006q.html#47 Smartcard reader with certificate inside the reader
2006l.html#20 Why I use a Mac, anno 2006
2006k.html#52 Keylogger resistance
2006k.html#46 Keylogger resistance
2006k.html#15 Passwords for bank sites - change or not?
2006k.html#4 Passwords for bank sites - change or not?
2006h.html#31 Intel vPro Technology
2006h.html#26 Security
2006g.html#40 Why are smart cards so dumb?
2006.html#37 The new High Assurance SSL Certificates
2005u.html#0 PGP Lame question
2005o.html#3 The Chinese MD5 attack
2005g.html#57 Security via hardware?
2005g.html#46 Maximum RAM and ROM for smartcards
2005g.html#41 Maximum RAM and ROM for smartcards
2005f.html#20 Some questions on smart cards (Software licensing using smart cards)
2005e.html#42 xml-security vs. native security
2005e.html#31 Public/Private key pair protection on Windows
2004m.html#4 REVIEW: "Biometrics for Network Security", Paul Reid
2004j.html#1 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#27 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#24 New Method for Authenticated Public Key Exchange without Digital Certificates
2004.html#29 passwords
2003o.html#44 Biometrics
2003o.html#29 Biometric cards will not stop identity fraud
2003m.html#51 public key vs passwd authentication?
2003j.html#25 Idea for secure login
2003h.html#29 application of unique signature
2003h.html#25 HELP, Vulnerability in Debit PIN Encryption security, possibly
2002o.html#67 smartcard+fingerprint
2002n.html#26 Help! Good protocol for national ID card?
2002n.html#13 Help! Good protocol for national ID card?
2002m.html#38 Convenient and secure eCommerce using POWF
2002g.html#69 Digital signature
2002f.html#55 Security Issues of using Internet Banking
2002f.html#46 Security Issues of using Internet Banking
2002c.html#21 Opinion on smartcard security requested
2002c.html#10 Opinion on smartcard security requested
2001m.html#9 Smart Card vs. Magnetic Strip Market
2001m.html#6 Smart Card vs. Magnetic Strip Market
2001k.html#0 Are client certificates really secure?
2001i.html#26 No Trusted Viewer possible?
2001i.html#25 Net banking, is it safe???
2001g.html#64 PKI/Digital signature doesn't work
2001g.html#62 PKI/Digital signature doesn't work
2001g.html#61 PKI/Digital signature doesn't work
2001g.html#60 PKI/Digital signature doesn't work
2001g.html#57 Q: Internet banking
aadsm28.htm#42 Trojan with Everything, To Go!
aadsm28.htm#41 Trojan with Everything, To Go!
aadsm28.htm#37 Attack on Brit retail payments -- some takeways
aadsm27.htm#31 The bank fraud blame game
aadsm26.htm#20 Tamperproof, yet playing Tetris
aadsm25.htm#25 RSA SecurID SID800 Token vulnerable by design
aadsm25.htm#8 smart cards with displays - at last!
aadsm23.htm#53 Status of SRP
aadsm23.htm#49 Status of SRP
aadsm23.htm#45 Status of SRP
aadsm23.htm#15 Security Soap Opera - (Central) banks don't (want to) know, MS prefers Brand X, airlines selling your identity, first transaction trojan
aadsm23.htm#13 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm23.htm#12 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm23.htm#11 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm23.htm#2 News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
aadsm21.htm#8 simple (&secure??) PW-based web login (was Re: Another entry in the internet security hall of shame....)
aadsm21.htm#7 simple (&secure??) PW-based web login (was Re: Another entry in the internet security hall of shame....)
aadsm21.htm#5 Is there any future for smartcards?
aadsm21.htm#4 Another entry in the internet security hall of shame
aadsm21.htm#3 Is there any future for smartcards?
aadsm19.htm#46 the limits of crypto and authentication
aadsm19.htm#44 massive data theft at MasterCard processor
aadsm19.htm#25 Digital signatures have a big problem with meaning
aadsm19.htm#2 Do You Need a Digital ID?
aadsm18.htm#56 two-factor authentication problems
aadsm18.htm#55 MD5 collision in X509 certificates
aadsm18.htm#40 Financial identity is *dangerous*? (was re: Fake companies, real money)
aadsm18.htm#32 EMV cards as identity cards
aadsm18.htm#2 dual-use digital signature vulnerability
aadsm18.htm#1 dual-use digital signature vulnerability
aadsm18.htm#0 dual-use digital signature vulnerability
aadsm16.htm#9 example: secure computing kernel needed
aadsm15.htm#40 FAQ: e-Signatures and Payments
aadsm15.htm#38 FAQ: e-Signatures and Payments
aadsm14.htm#35 The real problem that https has conspicuously failed to fix
aadsm14.htm#32 An attack on paypal
aadsm12.htm#24 Interests of online banks and their users [was Re: Cryptogram: Palladium Only for DRM]
aadsm11.htm#23 Proxy PKI. Was: IBM alternative to PKI?
aadsm11.htm#6 Meaning of Non-repudiation
aadsm11.htm#5 Meaning of Non-repudiation
aadsm11.htm#4 AW: Digital signatures as proof
aadsm10.htm#keygen2 Welome to the Internet, here's your private key
aepay11.htm#56 FINREAD was. Authentication white paper
aepay11.htm#55 FINREAD ... and as an aside
aepay11.htm#54 FINREAD was. Authentication white paper
aepay11.htm#53 Authentication white paper
aadsm9.htm#carnivore Shades of FV's Nathaniel Borenstein: Carnivore's "Magic Lantern"
aepay7.htm#3dsecure 3D Secure Vulnerabilities? Photo ID's and Payment Infrastructure

top , - by subject , - technology , - networking , - public key , - Boyd
three factor authentcation - Assurance - some mention of EU FINREAD - Risk, Fraud, Exploits, Threats, Vulnerabilities - Account Number Harvesting - postings mentioning MITM attacks - Buffer overflows, overruns, exploits - Secrets and Account numbers - Counterfeit YES CARDS - Naked Transaction Metaphor
home


Man In The Middle Attacks

2021g.html#84 EMV migration compliance for banking from IBM (1997)
2011m.html#48 ISBNs
2010n.html#2 UAE Man-in-the-Middle Attack Against SSL
2010n.html#0 UAE Man-in-the-Middle Attack Against SSL
2010m.html#89 UAE Man-in-the-Middle Attack Against SSL
2010g.html#84 In SSL We Trust? Not Lately
2010d.html#25 Cambridge researchers show Chip and PIN system vulnerable to fraud
2009l.html#6 Cyber attackers empty business accounts in minutes
2009j.html#57 How can we stop Credit card FRAUD?
2009f.html#14 SSL: Broken Even More
2009e.html#64 An interesting take on Verified by Visa Policy
2009c.html#63 SSLstrip hacking tool bypasses SSL to trick users, steal passwords
2009c.html#60 SSLstrip hacking tool bypasses SSL to trick users, steal passwords
2009.html#35 Perfect MITM Attacks With No-Check SSL Certs
2008s.html#76 Boffins bust web authentication with game consoles
2008s.html#50 Perfect MITM Attacks With No-Check SSL
2008r.html#42 Online Bill Payment Website Hijacked - Users were redirected to a page serving malware
2008q.html#72 https question
2008o.html#9 Homebanking authentication methods: what's being used by your bank?
2008n.html#100 Wachovia Bank web site
2008l.html#32 Authentication in the e-tailer / payment gateway / customer triangle
2008f.html#49 How do OTP tokens work?
2007u.html#56 folklore indeed
2007u.html#55 folklore indeed
2007t.html#22 'Man in the browser' is new threat to online banking
2007r.html#63 Translation of IBM Basic Assembler to C?
2007r.html#34 Is the media letting banks off the hook on payment card security
2007r.html#12 How to tell a fake SSL certificate from a real one
2007q.html#31 what does xp do when system is copying
2007q.html#29 what does xp do when system is copying
2007o.html#5 The Unexpected Fact about the First Computer Programmer
2007n.html#71 Poll: oldest computer thing you still use
2007k.html#79 John W. Backus, 82, Fortran developer, dies
2007j.html#3 John W. Backus, 82, Fortran developer, dies
2007i.html#74 public key password authentication
2007h.html#56 T.J. Maxx data theft worse than first reported
2007g.html#38 Can SSL sessions be compromised?
2007g.html#32 Can SSL sessions be compromised?
2007f.html#31 Is that secure : <form action="https" from a local HTML page ?
2007e.html#61 Securing financial transactions a high priority for 2007
2007e.html#26 Securing financial transactions a high priority for 2007
2007e.html#24 Securing financial transactions a high priority for 2007
2007e.html#20 Securing financial transactions a high priority for 2007
2007d.html#70 Securing financial transactions a high priority for 2007
2007d.html#26 Securing financial transactions a high priority for 2007
2007c.html#33 Securing financial transactions a high priority for 2007
2007c.html#32 Securing financial transactions a high priority for 2007
2007c.html#3 "New Universal Man-in-the-Middle Phishing Kit"
2007b.html#54 Forbidding Special characters in passwords
2007b.html#53 Forbidding Special characters in passwords
2006w.html#4 Patent buster for a method that increases password security
2006v.html#49 Patent buster for a method that increases password security
2006v.html#45 On sci.crypt: New attacks on the financial PIN processing
2006u.html#4 ssh - password control or key control?
2006u.html#3 ssh - password control or key control?
2006q.html#48 Smartcard reader with certificate inside the reader
2006p.html#7 SSL, Apache 2 and RSA key sizes
2006o.html#47 the personal data theft pandemic continues
2006o.html#40 the personal data theft pandemic continues
2006o.html#16 Gen 2 EPC Protocol Approved as ISO 18000-6C
2006h.html#13 Security
2006e.html#3 When *not* to sign an e-mail message?
2006d.html#41 Caller ID "spoofing"
2006d.html#28 Caller ID "spoofing"
2006d.html#26 Caller ID "spoofing"
2006c.html#36 Secure web page?
2005u.html#9 PGP Lame question
2005t.html#28 RSA SecurID product
2005m.html#37 public key authentication
2005m.html#0 simple question about certificate chains
2005l.html#21 The Worth of Verisign's Brand
2005l.html#19 Bank of America - On Line Banking *NOT* Secure?
2005l.html#17 The Worth of Verisign's Brand
2005i.html#50 XOR passphrase with a constant
2005g.html#13 What is a Certificate?
2005c.html#51 [Lit.] Buffer overruns
2004n.html#35 Shipwrecks
2004k.html#21 Vintage computers are better than modern crap !
2004j.html#37 Vintage computers are better than modern crap !
2004j.html#0 New Method for Authenticated Public Key Exchange without Digital Certificates
2004i.html#7 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#58 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#57 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#55 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#53 New Method for Authenticated Public Key Exchange without Digital Certificates
2004h.html#52 New Method for Authenticated Public Key Exchange without Digital Certificates
2004g.html#22 Infiniband - practicalities for small clusters
2004f.html#36 MITM attacks
2004f.html#33 MITM attacks
2004f.html#31 MITM attacks
2004c.html#61 IBM 360 memory
2004b.html#45 Foiling Replay Attacks
2003p.html#20 Dumb anti-MITM hacks / CAPTCHA application
2003p.html#17 Does OTP need authentication?
2003p.html#10 Secure web logins w random passwords
2003p.html#6 Does OTP need authentication?
2003p.html#4 Does OTP need authentication?
2003o.html#22 securID weakness
2003o.html#8 Bank security question (newbie question)
2003o.html#4 Bank security question (newbie question)
2003o.html#3 Bank security question (newbie question)
2003n.html#30 Is this right? Question about SSL and PKI
2003n.html#10 Cracking SSL
2003n.html#3 public key vs passwd authentication?
2003n.html#2 public key vs passwd authentication?
2003n.html#1 public key vs passwd authentication?
2003m.html#50 public key vs passwd authentication?
2003m.html#0 Passwords multiply as users' rage rises
2003l.html#65 Strength of RSA with known plain-text
2003l.html#37 Thoughts on Utility Computing?
2003l.html#36 Proposal for a new PKI model (At least I hope it's new)
2003l.html#6 The Original Interlock Protocol (what is...)
2003j.html#25 Idea for secure login
2003j.html#17 pbx security from 20 years ago
2003h.html#23 Authentication protocol
2003h.html#18 Authentication protocol
2003g.html#38 What is Meet In The Middle Attack
2003f.html#48 Alpha performance, why?
2003f.html#25 New RFC 3514 addresses malicious network traffic
2003e.html#78 Microsoft strikes again - from comp.risks
2003c.html#73 iso 8583
2003b.html#1 Disk drives as commodities. Was Re: Yamhill
2003.html#66 SSL & Man In the Middle Attack
2003.html#64 SSL & Man In the Middle Attack
2003.html#63 SSL & Man In the Middle Attack
2003.html#52 SSL & Man In the Middle Attack
2002n.html#25 Help! Good protocol for national ID card?
2002m.html#65 SSL certificate modification
2002l.html#5 What good is RSA when using passwords ?
2002k.html#51 SSL Beginner's Question
2002k.html#11 Serious vulnerablity in several common SSL implementations?
2002j.html#58 SSL integrity guarantees in abscense of client certificates
2002j.html#38 MITM solved by AES/CFB - am I missing something?!
2002h.html#12 Why did OSI fail compared with TCP-IP?
2002h.html#11 Why did OSI fail compared with TCP-IP?
2002g.html#65 Real man-in-the-middle attacks?
2002f.html#45 Biometric Encryption: the solution for network intruders?
2002e.html#18 Opinion on smartcard security requested
2002d.html#50 SSL MITM Attacks
2002d.html#47 SSL MITM Attacks
2002d.html#43 Mainframers: Take back the light (spotlight, that is)
2002d.html#4 IBM Mainframe at home
2002c.html#5 Did Intel Bite Off More Than It Can Chew?
2002c.html#4 Did Intel Bite Off More Than It Can Chew?
2002b.html#10 hollow files in unix filesystems?
2001m.html#41 Solutions to Man in the Middle attacks?
2001m.html#5 Smart Card vs. Magnetic Strip Market
2001k.html#1 Are client certificates really secure?
2001i.html#28 Proper ISA lifespan?
2001h.html#10 VM: checking some myths.
2001e.html#83 The Mind of War: John Boyd and American Security
2001d.html#36 solicit advice on purchase of digital certificate
2001d.html#12 database (or b-tree) page sizes
2001c.html#63 SSL weaknesses
2001b.html#0 Java as a first programming language for cs students
2001.html#68 California DMV
2000f.html#78 TSS ancient history, was X86 ultimate CISC? designs)
aadsm28.htm#36 Say it ain't so? MITM protection on SSH shows its paces
aadsm27.htm#65 MITM spotted in Tor
aadsm27.htm#44 Threatwatch: how much to MITM, how quickly, how much lost
aadsm27.htm#2 Threatwatch: Still searching for the economic MITM
aadsm26.htm#56 Threatwatch: MITB spotted: MITM over SSL from within the browser
aadsm26.htm#47 SSL MITM-attacks make the news
aadsm26.htm#31 man in the middle, SSL ... addenda 2
aadsm26.htm#30 man in the middle, SSL
aadsm26.htm#28 man in the middle, SSL
aadsm26.htm#27 man in the middle, SSL ... addenda
aadsm26.htm#26 man in the middle, SSL
aadsm26.htm#20 Tamperproof, yet playing Tetris
aadsm26.htm#5 ATMs hacked using MP3 player
aadsm25.htm#42 Why security training is really important (and it ain't anything to do with security!)
aadsm25.htm#25 RSA SecurID SID800 Token vulnerable by design
aadsm25.htm#16 Fraudwatch - Chip&PIN one-sided story, banks and deception and liability shifts
aadsm25.htm#8 smart cards with displays - at last!
aadsm24.htm#43 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#32 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#31 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#30 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#27 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#26 Naked Payments IV - let's all go naked
aadsm24.htm#22 Naked Payments IV - let's all go naked
aadsm24.htm#1 UK Detects Chip-And-PIN Security Flaw
aadsm23.htm#56 UK Detects Chip-And-PIN Security Flaw
aadsm23.htm#34 Chip-and-Pin terminals were replaced by "repairworkers"?
aadsm23.htm#28 JIBC April 2006 - "Security Revisionism"
aadsm23.htm#19 Petrol firm suspends chip-and-pin
aadsm23.htm#18 Security Soap Opera - (Central) banks don't (want to) know, MS prefers Brand X, airlines selling your identity, first transaction trojan
aadsm23.htm#15 Security Soap Opera - (Central) banks don't (want to) know, MS prefers Brand X, airlines selling your identity, first transaction trojan
aadsm22.htm#45 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm22.htm#40 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#38 Creativity and security
aadsm22.htm#29 Meccano Trojans coming to a desktop near you
aadsm22.htm#23 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm21.htm#34 X.509 / PKI, PGP, and IBE Secure Email Technologies
aadsm21.htm#31 X.509 / PKI, PGP, and IBE Secure Email Technologies
aadsm20.htm#32 How many wrongs do you need to make a right?
aadsm20.htm#24 [Clips] Escaping Password Purgatory
aadsm20.htm#17 the limits of crypto and authentication
aadsm19.htm#44 massive data theft at MasterCard processor
aadsm19.htm#27 Citibank discloses private information to improve security
aadsm19.htm#26 Trojan horse attack involving many major Israeli companies, executives
aadsm19.htm#21 Citibank discloses private information to improve security
aadsm19.htm#20 Citibank discloses private information to improve security
aadsm19.htm#13 What happened with the session fixation bug?
aadsm18.htm#56 two-factor authentication problems
aadsm18.htm#45 Banks Test ID Device for Online Security
aadsm18.htm#40 Financial identity is *dangerous*? (was re: Fake companies, real money)
aadsm18.htm#16 In Search of Eve - the upper boundary on Mallory
aadsm18.htm#15 In Search of Eve - the upper boundary on Mallory
aadsm18.htm#14 In Search of Eve - the upper boundary on Mallory
aadsm17.htm#36 Yahoo releases internet standard draft for using DNS as public key server
aadsm16.htm#16 Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
aadsm15.htm#29 SSL, client certs, and MITM (was WYTM?)
aadsm15.htm#28 SSL, client certs, and MITM (was WYTM?)
aadsm15.htm#27 SSL, client certs, and MITM (was WYTM?)
aadsm15.htm#26 SSL, client certs, and MITM (was WYTM?)
aadsm14.htm#43 PKI "not working"
aadsm14.htm#39 An attack on paypal
aadsm14.htm#9 "Marginot Web" (SSL, payments, etc)
aadsm14.htm#5 Who's afraid of Mallory Wolf?
aadsm14.htm#4 Who's afraid of Mallory Wolf?
aadsm14.htm#3 Armoring websites
aadsm14.htm#2 Who's afraid of Mallory Wolf? (addenda)
aadsm14.htm#1 Who's afraid of Mallory Wolf?
aadsm13.htm#35 How effective is open source crypto? (bad form)
aadsm13.htm#26 How effective is open source crypto?
aadsm13.htm#20 surrogate/agent addenda (long)
aadsm12.htm#51 Frist Data Unit Says It's Untangling Authentication
aadsm12.htm#29 Employee Certificates - Security Issues
aadsm11.htm#39 ALARMED ... Only Mostly Dead ... RIP PKI .. addenda
aadsm11.htm#17 Alternative to Microsoft Passport: Sunshine vs Hai
aadsm10.htm#bio7 biometrics
aadsm10.htm#bio3 biometrics (addenda)
aepay12.htm#36 DNS, yet again
aepay11.htm#49 A More Anonymous Internet
aepay11.htm#37 Who's afraid of Mallory Wolf?
aepay10.htm#84 Invisible Ink, E-signatures slow to broadly catch on (addenda)
aadsm3.htm#cstech11 cardtech/securetech & CA PKI
aepay3.htm#riskm The Thread Between Risk Management and Information Security
aadsmore.htm#pkiart Public Key Infrastructure: An Artifact...
aadsmail.htm#variations variations on your account-authority model (small clarification)

top , - by subject , - technology , - networking , - public key , - Boyd
three factor authentcation - Assurance - some mention of EU FINREAD - Risk, Fraud, Exploits, Threats, Vulnerabilities - Account Number Harvesting - postings mentioning MITM attacks - Buffer overflows, overruns, exploits - Secrets and Account numbers - Counterfeit YES CARDS - Naked Transaction Metaphor
home


postings mentioning (counterfeit) YES CARDS

Cartes 2002 trip report including discussion of YES CARD vulnerability gone 404 but lives on at the wayback machine

2022f.html#14 The January 6 Secret Service Text Scandal Turns Criminal
2022b.html#103 AADS Chip Strawman
2022b.html#44 Security
2021k.html#17 Data Breach
2021h.html#74 "Safe" Internet Payment Products
2021g.html#81 EMV migration compliance for banking from IBM (1997)
2021e.html#57 Hacking, Exploits and Vulnerabilities
2018f.html#106 Is LINUX the inheritor of the Earth?
2018e.html#58 Watch Your Debit and Credit Cards: Thieves Get Craftier With Skimmers
2018c.html#53 EMV: Why the US migration didn't happen sooner
2018c.html#51 EMV: Why the US migration didn't happen sooner
2018.html#110 Making Computers Secure
2018.html#94 Predicting the future in five years as seen from 1983
2017i.html#44 learning Unix, was progress in e-mail, such as AOL
2017i.html#42 Commercial grade ink and paper (Western Union)
2017h.html#4 chip card
2017g.html#80 Running unsupported is dangerous was Re: AW: Re: LE strikes again
2017g.html#77 TRAX manual set for sale
2017e.html#31 [CM] What was your first home computer?
2017d.html#10 Encryp-xit: Europe will go all in for crypto backdoors in June
2016h.html#104 PC Compromise and Internet Transactions
2016f.html#60 Funny error messages
2016f.html#59 Funny error messages
2016f.html#58 Funny error messages
2016f.html#34 The chip card transition in the US has been a disaster
2016e.html#74 The chip card transition in the US has been a disaster
2016e.html#73 The chip card transition in the US has been a disaster
2016e.html#6 Is it a lost cause?
2016d.html#51 Penn Central PL/I advertising
2016c.html#55 Institutional Memory and Two-factor Authentication
2015h.html#74 Were you at SHARE in Seattle? Watch your credit card statements!
2015h.html#12 Did 1st EMV transaction
2015h.html#1 FALSE: Reverse PIN Panic Code
2015f.html#17 Credit card fraud solution coming to America...finally
2015f.html#8 Credit card fraud solution coming to America...finally
2015f.html#7 Credit card fraud solution coming to America...finally
2015f.html#6 Credit card fraud solution coming to America...finally
2015f.html#3 Credit card fraud solution coming to America...finally
2015d.html#65 Western Union envisioned internet functionality
2015d.html#61 Western Union envisioned internet functionality
2015c.html#73 EMV: Why the US migration didn't happen sooner
2015.html#5 NYT on Sony hacking
2014l.html#80 LA Times commentary: roll out "smart" credit cards to deter fraud
2014l.html#67 LA Times commentary: roll out "smart" credit cards to deter fraud
2014l.html#55 LA Times commentary: roll out "smart" credit cards to deter fraud
2014l.html#39 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#53 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#52 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#51 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#45 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#44 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#43 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#42 LA Times commentary: roll out "smart" credit cards to deter fraud
2014i.html#42 Sale receipt--obligatory?
2014h.html#67 Sale receipt--obligatory?
2014f.html#79 EMV
2014f.html#17 Online Debit, Credit Fraud Will Soon Get Much Worse
2014b.html#69 Why is the US a decade behind Europe on 'chip and pin' cards?
2014.html#77 In a Cyber Breach, Who Pays, Banks or Retailers?
2013o.html#60 Target Offers Free Credit Monitoring Following Security Breach
2013o.html#58 US a laggard in adopting more secure credit cards
2013m.html#21 Steve B sees what investors think
2013m.html#20 Steve B sees what investors think
2013m.html#17 Steve B sees what investors think
2013k.html#88 NSA and crytanalysis
2013g.html#38 regulation,bridges,streams
2013f.html#59 Crypto Facility performance
2012o.html#50 What will contactless payment do to security?
2012m.html#26 Chip and pin 'weakness' exposed by Cambridge researchers
2012j.html#67 Protecting Pin Pad Payment
2012j.html#38 The Conceptual ATM program
2012j.html#35 The Conceptual ATM program
2012g.html#33 Cartons of Punch Cards
2012d.html#8 Time to pull the PIN!
2012b.html#71 Password shortcomings
2012b.html#55 Mythbusters Banned From Discussing RFID By Visa And Mastercard
2012.html#9 Anyone sceptically about about Two Factor Authentication?
2011o.html#13 Two-Factor Authentication - Hardware token or SMS OTP
2011o.html#1 Silicoin
2011m.html#39 ISBNs
2011l.html#72 Selectric Typewriter--50th Anniversary
2011l.html#71 Selectric Typewriter--50th Anniversary
2011l.html#18 Selectric Typewriter--50th Anniversary
2010p.html#5 Fun with ATM Skimmers, Part III
2010p.html#2 Fun with ATM Skimmers, Part III
2010p.html#0 CARD AUTHENTICATION TECHNOLOGY - Embedded keypad on Card - Is this the future
2010o.html#84 CARD AUTHENTICATION TECHNOLOGY - Embedded keypad on Card - Is this the future
2010o.html#81 The Credit Card Criminals Are Getting Crafty
2010o.html#49 The Credit Card Criminals Are Getting Crafty
2010o.html#23 Spooky Myths that Trick Merchants When It Comes to Secure Payments Processes
2010n.html#48 Is the United States the weakest link when it comes to credit card security?
2010n.html#47 ZeuS attacks mobiles in bank SMS bypass scam
2010l.html#73 A mighty fortress is our PKI, Part II
2010j.html#10 Wal-Mart to support smartcard payments
2010j.html#0 Wal-Mart to support smartcard payments
2010i.html#63 Wal-Mart to support smartcard payments
2010g.html#21 Should the USA Implement EMV?
2010f.html#44 Can't PIN be mandated in normal POS machines ? to avoid Losses / Frauds / NPA's ?
2010f.html#30 Should the USA Implement EMV?
2010f.html#25 Should the USA Implement EMV?
2010f.html#19 Should the USA Implement EMV?
2010d.html#25 Cambridge researchers show Chip and PIN system vulnerable to fraud
2010d.html#24 Cambridge researchers show Chip and PIN system vulnerable to fraud
2010d.html#21 Credit card data security: Who's responsible?
2010d.html#17 Chip and PIN is Broken!
2010c.html#79 Customers risk online banking fraud by reusing bank credentials
2010.html#97 Korean bank Moves back to Mainframes (...no, not back)
2010.html#95 Korean bank Moves back to Mainframes (...no, not back)
2010.html#93 Korean bank Moves back to Mainframes (...no, not back)
2010.html#73 Korean bank Moves back to Mainframes (...no, not back)
2010.html#72 Korean bank Moves back to Mainframes (...no, not back)
2010.html#71 Korean bank Moves back to Mainframes (...no, not back)
2009r.html#71 While watching Biography about Bill Gates on CNBC last Night
2009r.html#41 While watching Biography about Bill Gates on CNBC last Night
2009r.html#4 70 Years of ATM Innovation
2009q.html#56 Crypto dongles to secure online transactions ... addenda
2009q.html#55 Crypto dongles to secure online transactions ... addenda
2009q.html#54 Crypto dongles to secure online transactions
2009q.html#40 Crypto dongles to secure online transactions
2009p.html#44 Nearly 500 People Fall Victim to ATM Skimming Scam
2009p.html#14 Heartland CIO is critical of First Data's credit card tokenization plan
2009m.html#45 PCI Council Releases Recommendations For Preventing Card-Skimming Attacks
2009m.html#21 The Art of Creating Strong Passwords
2009l.html#68 Hacker charges also an indictment on PCI, expert says
2009l.html#64 Hacker charges also an indictment on PCI, expert says
2009l.html#61 Hacker charges also an indictment on PCI, expert says
2009j.html#29 Price Tag for End-to-End Encryption: $4.8 Billion, Mercator Says
2009g.html#28 Halifax faces legal challenge on chip-and-pin security
2009f.html#61 Halifax faces legal challenge on chip-and-pin security
2009f.html#44 Chip and PIN for ID cards: Not such a sharp idea?; Hackers PINing after your details
2009f.html#7 An interesting take on Verified by Visa Policy
2009e.html#75 The Future Shape of Payments Is Anything But Flat
2009c.html#56 Why use RFID in personal documents & cards at all?
2009b.html#61 Passport RFIDs cloned wholesale by $250 eBay auction spree
2009b.html#21 ICSF and VISA/MasterCard?amex reference list
2009.html#72 Double authentification for internet payment
2009.html#34 Swedish police warn of tampered credit card terminals
2009.html#33 European Payments Council calls for action on counterfeit cards
2009.html#11 Swedish police warn of tampered credit card terminals
2009.html#10 Swedish police warn of tampered credit card terminals
2008p.html#74 2008 Data Breaches: 30 Million and Counting
2008p.html#31 FC5 Special Workshop CFP: Emerging trends in Online Banking and Electronic Payments
2008p.html#28 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#22 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#14 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#11 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008o.html#83 Chip-and-pin card reader supply-chain subversion 'has netted millions from British shoppers'
2008o.html#40 Signposts on the US Government's Trail of IT Failures
2008o.html#2 Credit Card Security
2008n.html#90 Credit Card Security
2008n.html#48 In your experience which is a superior debit card scheme - PIN based debit or signature debit?
2008n.html#45 In your experience which is a superior debit card scheme - PIN based debit or signature debit?
2008m.html#5 Fraud due to stupid failure to test for negative
2008m.html#0 Fraud due to stupid failure to test for negative
2008j.html#34 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008j.html#33 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008g.html#10 Hannaford case exposes holes in law, some say
2008e.html#69 independent appraisers
2008e.html#34 The hands-free way to steal a credit card
2008d.html#84 The hands-free way to steal a credit card
2008d.html#3 Govt demands password to personal computer
2008c.html#89 Toyota Sales for 2007 May Surpass GM
2008c.html#59 Govt demands password to personal computer
2007u.html#76 folklore indeed
2007u.html#60 folklore indeed
2007u.html#51 folklore indeed
2007u.html#15 Public Computers
2007s.html#12 Translation of IBM Basic Assembler to C?
2007s.html#11 Translation of IBM Basic Assembler to C?
2007s.html#10 Translation of IBM Basic Assembler to C?
2007r.html#34 Is the media letting banks off the hook on payment card security
2007q.html#73 Value of SSL client certificates?
2007q.html#34 what does xp do when system is copying
2007o.html#5 The Unexpected Fact about the First Computer Programmer
2007n.html#54 Windows Monitor or CUSP?
2007m.html#27 nouns and adjectives
2007l.html#41 My Dream PC -- Chip-Based
2007l.html#35 My Dream PC -- Chip-Based
2007k.html#53 My Dream PC -- Chip-Based
2007j.html#3 John W. Backus, 82, Fortran developer, dies
2007h.html#28 sizeof() was: The Perfect Computer - 36 bits?
2007f.html#75 Securing financial transactions a high priority for 2007
2007e.html#61 Securing financial transactions a high priority for 2007
2007e.html#24 Securing financial transactions a high priority for 2007
2007e.html#20 Securing financial transactions a high priority for 2007
2007d.html#70 Securing financial transactions a high priority for 2007
2007d.html#68 Securing financial transactions a high priority for 2007
2007d.html#34 Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
2007d.html#26 Securing financial transactions a high priority for 2007
2007c.html#36 Securing financial transactions a high priority for 2007
2007c.html#28 Securing financial transactions a high priority for 2007
2007c.html#8 Securing financial transactions a high priority for 2007
2007b.html#64 Securing financial transactions a high priority for 2007
2007b.html#8 Special characters in passwords was Re: RACF - Password rules
2007.html#17 SSL info
2007.html#0 Securing financial transactions a high priority for 2007
2006y.html#7 Securing financial transactions a high priority for 2007
2006w.html#4 Patent buster for a method that increases password security
2006w.html#0 Patent buster for a method that increases password security
2006v.html#45 On sci.crypt: New attacks on the financial PIN processing
2006v.html#42 On sci.crypt: New attacks on the financial PIN processing
2006u.html#43 New attacks on the financial PIN processing
2006u.html#40 New attacks on the financial PIN processing
2006u.html#12 Are there more stupid people in IT than there used to be?
2006t.html#5 Are there more stupid people in IT than there used to be?
2006s.html#5 Why not 2048 or 4096 bit RSA key issuance?
2006r.html#38 Trying to underdtand 2-factor authentication
2006r.html#28 Greatest Software Ever Written?
2006q.html#48 Smartcard reader with certificate inside the reader
2006q.html#5 Materiel and graft
2006p.html#32 OT - hand-held security
2006o.html#47 the personal data theft pandemic continues
2006o.html#40 the personal data theft pandemic continues
2006l.html#33 Google Architecture
2006l.html#32 Google Architecture
2006l.html#27 Google Architecture
2006k.html#0 Passwords for bank sites - change or not?
2006e.html#3 When *not* to sign an e-mail message?
2006d.html#31 Caller ID "spoofing"
2005u.html#13 AMD to leave x86 behind?
2004j.html#44 Methods of payment
2004j.html#39 Methods of payment
2004j.html#35 A quote from Crypto-Gram
2004j.html#14 US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
2004j.html#13 US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
2004j.html#12 US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
2004g.html#45 command line switches [Re: [REALLY OT!] Overuse of symbolic constants]
2003o.html#37 Security of Oyster Cards
aadsm25.htm#42 Why security training is really important (and it ain't anything to do with security!)
aadsm25.htm#33 Mozilla moves on security
aadsm26.htm#20 Tamperproof, yet playing Tetris
aadsm26.htm#21 FC07 Preliminary Programme - Leaving Room for the Bad Guys
aadsm26.htm#22 Tamperproof, yet playing Tetris
aadsm26.htm#23 It's a Presidential Mandate, Feds use it. How come you are not using FDE?
aadsm26.htm#4 Citibank e-mail looks phishy
aadsm27.htm#38 The bank fraud blame game
aadsm27.htm#42 The bank fraud blame game
aadsm27.htm#52 more on firing your MBA-less CSO
aadsm28.htm#1 2008: The year of hack the vote?
aadsm28.htm#37 Attack on Brit retail payments -- some takeways
aadsm25.htm#16 Fraudwatch - Chip&PIN one-sided story, banks and deception and liability shifts
aadsm25.htm#9 DDA cards may address the UK Chip&Pin woes
aadsm25.htm#4 Crypto to defend chip IP: snake oil or good idea?
aadsm24.htm#43 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#32 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#31 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#30 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#29 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#27 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#25 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm24.htm#22 Naked Payments IV - let's all go naked
aadsm24.htm#21 Use of TPM chip for RNG?
aadsm24.htm#14 Naked Payments IV - let's all go naked
aadsm24.htm#12 Naked Payments IV - let's all go naked
aadsm24.htm#9 Naked Payments IV - let's all go naked
aadsm24.htm#8 Microsoft - will they bungle the security game?
aadsm24.htm#7 Naked Payments IV - let's all go naked
aadsm24.htm#2 UK Banks Expected To Move To DDA EMV Cards
aadsm24.htm#1 UK Detects Chip-And-PIN Security Flaw
aadsm24.htm#0 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm23.htm#55 UK Detects Chip-And-PIN Security Flaw
aadsm23.htm#43 Spring is here - that means Pressed Flowers
aadsm23.htm#30 Petrol firm suspends chip-and-pin
aadsm23.htm#27 Chip-and-Pin terminals were replaced by "repairworkers"?
aadsm23.htm#25 Petrol firm suspends chip-and-pin
aadsm23.htm#20 Petrol firm suspends chip-and-pin
aadsm23.htm#15 Security Soap Opera - (Central) banks don't (want to) know, MS prefers Brand X, airlines selling your identity, first transaction trojan
aadsm23.htm#2 News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
aadsm22.htm#47 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
aadsm22.htm#40 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#39 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#34 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#33 Meccano Trojans coming to a desktop near you
aadsm22.htm#29 Meccano Trojans coming to a desktop near you
aadsm22.htm#23 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#20 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm18.htm#20 RPOW - Reusable Proofs of Work
aadsm17.htm#42 Article on passwords in Wired News
aadsm17.htm#25 Single Identity. Was: PKI International Consortium
aadsm17.htm#13 A combined EMV and ID card
aadsm15.htm#25 WYTM?

top , - by subject , - technology , - networking , - public key , - Boyd
three factor authentcation - Assurance - some mention of EU FINREAD - Risk, Fraud, Exploits, Threats, Vulnerabilities - Account Number Harvesting - postings mentioning MITM attacks - Buffer overflows, overruns, exploits - Secrets and Account numbers - Counterfeit YES CARDS - Naked Transaction Metaphor
home


Naked Transaction Metaphor

https://financialcryptography.com/mt/archives/000745.html Naked Payments I - New ISO standard for payments security - the Emperor's new clothes?
https://financialcryptography.com/mt/archives/000744.html Naked Payments II - uncovering alternates, merchants v. issuers, Brits bungle the risk, and just what are MBAs good for?
https://financialcryptography.com/mt/archives/000747.html Naked Payments III - the well-dressed bank
https://financialcryptography.com/mt/archives/000749.html Naked Payments IV - let's all go naked

2024e.html#123 big, fast, etc, was is Vax addressing sane today
2022b.html#47 Security
2022b.html#38 Security
2017f.html#2 Gotcha, Tatcha! Thieves hide in servers to hoover up victims' bank card numbers mid-order
2017e.html#39 [CM] What was your first home computer?
2014k.html#60 LA Times commentary: roll out "smart" credit cards to deter fraud
2014k.html#45 LA Times commentary: roll out "smart" credit cards to deter fraud
2014f.html#74 Is end of mainframe near ?
2014f.html#71 Stopping Cybersecurity Breaches Means Rethinking Consequences
2014f.html#19 Is cybersecurity the next banking crisis in the making?
2014.html#53 Why the Target Breach Might Be Even Bigger: Big Data Means Big Breach
2013k.html#88 NSA and crytanalysis
2013j.html#46 Feds indict indentity theft ring
2013j.html#45 U.S. agents 'got lucky' pursuing accused Russia master hackers
2012n.html#79 history of Programming language and CPU in relation to each other
2012i.html#35 US Senate proposes national data breach notification act
2012i.html#31 US Senate proposes national data breach notification act
2011l.html#47 Does outsourcing cause data loss?
2011j.html#63 Why do defenders keep losing to smaller cyberwarriors?
2010q.html#19 E-commerce and Internet Security: Why Walls Don't Work
2010q.html#13 "Compound threats" to appear in 2011 ?
2010q.html#4 Plug Your Data Leaks from the inside
2010m.html#31 Are we spending too little on security? Or are we spending too much??
2010f.html#75 Is Security a Curse for the Cloud Computing Industry?
2010b.html#15 security and online banking
2010b.html#12 Korean bank Moves back to Mainframes (...no, not back)
2009s.html#47 Audits VII: the future of the Audit is in your hands
2009r.html#29 Data Breaches Show PCI DSS Ineffective
2009k.html#54 The satate of software
2009f.html#57 Data masking/data disguise Primer 1) WHY
2009f.html#36 PCI security rules may require reinforcements
2009e.html#21 ATMs At Risk
2008s.html#10 Data leakage - practical measures to improve Information Governance
2008r.html#53 21 million German bank account details on black market
2008p.html#59 Can Smart Cards Reduce Payments Fraud and Identity Theft?
2008p.html#7 Dealing with the neew MA ID protection law
2008p.html#5 Privacy, Identity theft, account fraud
2008o.html#76 Blinkenlights
2008o.html#70 What happened in security over the last 10 years?
2008n.html#75 Should online transactions be allowed on credit cards without adequate safeguards?
2008j.html#39 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008j.html#34 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008j.html#33 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
2008i.html#42 Security Breaches
2008i.html#24 Credit Card Fraud
2008h.html#4 You won't guess who's the bad guy of ID theft
2008g.html#28 Hannaford case exposes holes in law, some say
2008g.html#17 Hannaford breach illustrates dangerous compliance mentality
2008e.html#66 independent appraisers
2008.html#9 folklore indeed
2008.html#8 folklore indeed
2008.html#7 folklore indeed
2008.html#5 folklore indeed
2008.html#4 folklore indeed
2007v.html#97 folklore indeed
2007v.html#94 folklore indeed
2007v.html#93 folklore indeed
2007v.html#85 folklore indeed
2007v.html#74 folklore indeed
2007u.html#76 folklore indeed
2007u.html#74 folklore indeed
2007u.html#71 folklore indeed
2007u.html#67 folklore indeed
2007u.html#10 Crypto Related Posts
2007t.html#61 Crypto Related Posts
2007t.html#28 'Man in the browser' is new threat to online banking
2007t.html#22 'Man in the browser' is new threat to online banking
2007t.html#20 UK Retail Giant Breached by Insider
2007t.html#6 Translation of IBM Basic Assembler to C?
2007s.html#16 The new urgency to fix online privacy
2007r.html#35 Is the media letting banks off the hook on payment card security
2007r.html#34 Is the media letting banks off the hook on payment card security
2007r.html#32 Is the media letting banks off the hook on payment card security
2007r.html#21 Is the media letting banks off the hook on payment card security
2007q.html#73 Value of SSL client certificates?
2007q.html#11 what does xp do when system is copying
2007o.html#28 EZPass: Yes, Big Brother IS Watching You!
2007n.html#85 PCI Compliance - Encryption of all non-console administrative access
2007n.html#71 Poll: oldest computer thing you still use
2007n.html#70 Poll: oldest computer thing you still use
2007n.html#50 WindowsMonitor or CUSP?
2007n.html#9 John W. Backus, 82, Fortran developer, dies
2007n.html#8 nouns and adjectives
2007m.html#27 nouns and adjectives
2007m.html#9 John W. Backus, 82, Fortran developer, dies
2007l.html#35 My Dream PC -- Chip-Based
2007l.html#33 John W. Backus, 82, Fortran developer, dies
2007l.html#8 John W. Backus, 82, Fortran developer, dies
2007k.html#76 My Dream PC -- Chip-Based
2007k.html#53 My Dream PC -- Chip-Based
2007j.html#3 John W. Backus, 82, Fortran developer, dies
2007i.html#74 public key password authentication
2007i.html#64 John W. Backus, 82, Fortran developer, dies
2007h.html#56 T.J. Maxx data theft worse than first reported
2007h.html#51 Securing financial transactions a high priority for 2007
2007h.html#22 sizeof() was: The Perfect Computer - 36 bits?
2007g.html#20 T.J. Maxx data theft worse than first reported
2007f.html#75 Securing financial transactions a high priority for 2007
2007f.html#68 Securing financial transactions a high priority for 2007
2007f.html#36 Silly beginner questions
2007f.html#31 Is that secure : <form action="https" from a local HTML page ?
2007e.html#26 Securing financial transactions a high priority for 2007
2007e.html#2 Securing financial transactions a high priority for 2007
2007d.html#57 Which is the Fastest (Secure) Way to Exchange 256-bit Keys?
2007c.html#44 Securing financial transactions a high priority for 2007
2007c.html#40 Point-of-Sale security
2007c.html#38 Securing financial transactions a high priority for 2007
2007c.html#37 Securing financial transactions a high priority for 2007
2007c.html#27 Securing financial transactions a high priority for 2007
2007c.html#26 Securing financial transactions a high priority for 2007
2007c.html#11 Decoding the encryption puzzle
2007c.html#10 Securing financial transactions a high priority for 2007
2007c.html#9 Decoding the encryption puzzle
2007c.html#8 Securing financial transactions a high priority for 2007
2007c.html#6 Securing financial transactions a high priority for 2007
2007b.html#60 Securing financial transactions a high priority for 2007
2007b.html#33 security engineering versus information security
2007b.html#8 Special characters in passwords was Re: RACF - Password rules
2006y.html#25 "The Elements of Programming Style"
2006y.html#8 Securing financial transactions a high priority for 2007
2006v.html#49 Patent buster for a method that increases password security
2006v.html#39 On sci.crypt: New attacks on the financial PIN processing
2006v.html#2 New attacks on the financial PIN processing
2006u.html#43 New attacks on the financial PIN processing
2006t.html#40 Encryption and authentication
2006t.html#5 Are there more stupid people in IT than there used to be?
2006s.html#5 Why not 2048 or 4096 bit RSA key issuance?
2006r.html#29 Intel abandons USEnet news
2006r.html#1 Greatest Software Ever Written?
2006q.html#5 Materiel and graft
2006p.html#18 19,000 Accounts Compromised
2006p.html#9 New airline security measures in Europe
2006p.html#8 SSL, Apache 2 and RSA key sizes
2006o.html#35 the personal data theft pandemic continues
2006o.html#16 Gen 2 EPC Protocol Approved as ISO 18000-6C
2006n.html#32 The System/360 Model 20 Wasn't As Bad As All That
2006m.html#15 OpenSSL Hacks
2006l.html#57 DEC's Hudson fab
2006k.html#23 Value of an old IBM PS/2 CL57 SX Laptop
2006k.html#16 Value of an old IBM PS/2 CL57 SX Laptop
2006k.html#4 Passwords for bank sites - change or not?
2006h.html#15 Security
2006e.html#44 Does the Data Protection Act of 2005 Make Sense
2006e.html#26 Debit Cards HACKED now
2006d.html#26 Caller ID "spoofing"
2006c.html#34 X.509 and ssh
2005v.html#4 ABN Tape - Found
2005u.html#33 PGP Lame question
2005u.html#3 PGP Lame question
2005t.html#34 RSA SecurID product
2005r.html#7 DDJ Article on "Secure" Dongle
2005p.html#24 Hi-tech no panacea for ID theft woes
2005p.html#6 Innovative password security
2005o.html#2 X509 digital certificate for offline solution
2005l.html#22 The Worth of Verisign's Brand
2005k.html#26 More on garbage
2005k.html#23 More on garbage
2005j.html#53 Banks
2005i.html#36 Improving Authentication on the Internet
2005i.html#1 Brit banks introduce delays on interbank xfers due to phishing boom
2005g.html#54 Security via hardware?
2005g.html#51 Security via hardware?
2005f.html#60 Where should the type information be: in tags and descriptors
2004m.html#28 Shipwrecks
2004m.html#9 REVIEW: "Biometrics for Network Security", Paul Reid
2004f.html#36 MITM attacks
2004f.html#8 racf
2004b.html#50 The SOB that helped IT jobs move to India is dead!
2004b.html#48 Automating secure transactions
2004b.html#39 SSL certificates
2004b.html#25 Who is the most likely to use PK?
2004.html#29 passwords
2003n.html#25 Are there any authentication algorithms with runtime changeable
2003m.html#51 public key vs passwd authentication?
2003m.html#11 AES-128 good enough for medical data?
2003l.html#64 Can you use ECC to produce digital signatures? It doesn't see
2002o.html#56 Certificate Authority: Industry vs. Government
2002n.html#26 Help! Good protocol for national ID card?
2002n.html#14 So how does it work... (public/private key)
2002m.html#55 Beware, Intel to embed digital certificates in Banias
2002m.html#19 A new e-commerce security proposal
2002m.html#14 fingerprint authentication
2002l.html#20 Backdoor in AES ?
2002l.html#11 IEEE article on intelligence and security
2002k.html#44 how to build tamper-proof unix server?
2002j.html#63 SSL integrity guarantees in abscense of client certificates
2002j.html#14 Symmetric-Key Credit Card Protocol on Web Site
2002i.html#72 A Lesson In Security
2002f.html#35 Security and e-commerce
2002f.html#28 Security Issues of using Internet Banking
2002f.html#23 Computers in Science Fiction
2002f.html#10 Least folklorish period in computing (was Re: IBM Mainframe at home)
2002e.html#62 Computers in Science Fiction
2002d.html#8 Security Proportional to Risk (was: IBM Mainframe at home)
2001l.html#2 Why is UNIX semi-immune to viral infection?
2001k.html#55 I-net banking security
2001j.html#44 Does "Strong Security" Mean Anything?
2001j.html#5 E-commerce security????
2001j.html#2 E-commerce security????
2001i.html#57 E-commerce security????
2001i.html#53 Credit Card # encryption
aadsm28.htm#71 Paypal -- Practical Approaches to Phishing -- open white paper
aadsm28.htm#56 Signs of Liability: 'Zero Day Threat' blames IT and Security industry
aadsm28.htm#42 Trojan with Everything, To Go!
aadsm28.htm#41 Trojan with Everything, To Go!
aadsm28.htm#37 Attack on Brit retail payments -- some takeways
aadsm28.htm#5 Why Security Modelling doesn't work -- the OODA-loop of today's battle
aadsm27.htm#52 more on firing your MBA-less CSO
aadsm27.htm#50 If your CSO lacks an MBA, fire one of you
aadsm27.htm#31 The bank fraud blame game
aadsm27.htm#29 A secure Internet requires a secure network protocol
aadsm27.htm#15 307 digit number factored
aadsm27.htm#15 307 digit number factored
aadsm26.htm#70 WSJ: Soft evidence on a crypto-related breach
aadsm26.htm#65 Public key encrypt-then-sign or sign-then-encrypt?
aadsm26.htm#58 Our security sucks. Why can't we change? What's wrong with us?
aadsm26.htm#54 What to do about responsible disclosure?
aadsm26.htm#25 EV - what was the reason, again?
aadsm26.htm#24 News.com: IBM donates new privacy tool to open-source Higgins
aadsm26.htm#13 Who has a Core Competency in Security?
aadsm26.htm#11 What is the point of encrypting information that is publicly visible?
aadsm26.htm#6 Citibank e-mail looks phishy
aadsm25.htm#41 Why security training is really important (and it ain't anything to do with security!)
aadsm25.htm#39 How the Classical Scholars dropped security from the canon of Computer Science
aadsm25.htm#38 How the Classical Scholars dropped security from the canon of Computer Science
aadsm25.htm#33 Mozilla moves on security
aadsm25.htm#28 WESII - Programme - Economics of Securing the Information Infrastructure
aadsm25.htm#24 DDA cards may address the UK Chip&Pin woes
aadsm25.htm#21 Identity v. anonymity -- that is not the question
aadsm25.htm#20 Identity v. anonymity -- that is not the question
aadsm25.htm#13 Sarbanes-Oxley is what you get when you don't do FC
aadsm25.htm#10 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#9 DDA cards may address the UK Chip&Pin woes
aadsm25.htm#4 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#2 Crypto to defend chip IP: snake oil or good idea?
aadsm25.htm#1 Crypto to defend chip IP: snake oil or good idea?
aadsm24.htm#46 More Brittle Security -- Agriculture
aadsm24.htm#43 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#42 Naked Payments II - uncovering alternates, merchants v. issuers, Brits bungle the risk, and just what are MBAs good for?
aadsm24.htm#41 Naked Payments IV - let's all go naked
aadsm24.htm#38 Interesting bit of a quote
aadsm24.htm#37 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#32 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#30 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#27 DDA cards may address the UK Chip&Pin woes
aadsm24.htm#26 Naked Payments IV - let's all go naked
aadsm24.htm#25 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm24.htm#22 Naked Payments IV - let's all go naked
aadsm24.htm#21 Use of TPM chip for RNG?
aadsm24.htm#14 Naked Payments IV - let's all go naked
aadsm24.htm#12 Naked Payments IV - let's all go naked
aadsm24.htm#10 Naked Payments IV - let's all go naked
aadsm24.htm#9 Naked Payments IV - let's all go naked
aadsm24.htm#8 Microsoft - will they bungle the security game?
aadsm24.htm#7 Naked Payments IV - let's all go naked
aadsm24.htm#5 New ISO standard aims to ensure the security of financial transactions on the Internet
aadsm23.htm#54 Status of SRP
aadsm23.htm#31 JIBC April 2006 - "Security Revisionism"
aadsm23.htm#27 Chip-and-Pin terminals were replaced by "repairworkers"?
aadsm23.htm#26 Petrol firm suspends chip-and-pin
aadsm23.htm#9 PGP "master keys"
aadsm22.htm#36 Unforgeable Blinded Credentials
aadsm22.htm#25 FraudWatch - Chip&Pin, a new tenner (USD10)
aadsm22.htm#5 long-term GPG signing key
aadsm22.htm#3 GP4.3 - Growth and Fraud - Case #3 - Phishing
aadsm22.htm#2 GP4.3 - Growth and Fraud - Case #3 - Phishing
aadsm21.htm#27 X.509 / PKI, PGP, and IBE Secure Email Technologies
aadsm21.htm#18 'Virtual Card' Offers Online Security Blanket
aadsm20.htm#12 the limits of crypto and authentication
aadsm19.htm#47 the limits of crypto and authentication
aadsm19.htm#45 payment system fraud, etc
aadsm19.htm#25 Digital signatures have a big problem with meaning
aadsm19.htm#19 "SSL stops credit card sniffing" is a correlation/causality myth
aadsm19.htm#17 What happened with the session fixation bug?
aadsm19.htm#15 Loss Expectancy in NPV calculations
aadsm19.htm#13 What happened with the session fixation bug?
aadsm18.htm#46 Banks Test ID Device for Online Security
aadsm18.htm#45 Banks Test ID Device for Online Security
aadsm18.htm#35 Credit card leaks continue at a furious pace
aadsm18.htm#29 EMV cards as identity cards
aadsm18.htm#6 dual-use digital signature vulnerability
aadsm17.htm#53 Using crypto against Phishing, Spoofing and Spamming
aadsm17.htm#50 authentication and authorization (was: Question on the state of the security industry)
aadsm17.htm#47 authentication and authorization ... addenda
aadsm17.htm#46 authentication and authorization (was: Question on the state of the security industry)
aadsm17.htm#42 Article on passwords in Wired News
aadsm17.htm#38 Study: ID theft usually an inside job
aadsm17.htm#32 visa cards violated, BofA reissuing after hack attack
aadsm17.htm#22 secret hackers to aid war on internet fraud
aadsm17.htm#2 Difference between TCPA-Hardware and a smart card (was: example: secure computing kernel needed)
aadsm16.htm#20 Ousourced Trust (was Re: Difference between TCPA-Hardware and a smart card and something else before
aadsm15.htm#27 SSL, client certs, and MITM (was WYTM?)
aadsm15.htm#5 Is cryptography where security took the wrong branch?
aadsm14.htm#33 An attack on paypal
aadsm14.htm#28 Maybe It's Snake Oil All the Way Down
aadsm14.htm#3 Armoring websites
aadsm12.htm#60 signing & authentication (was Credit Card Scam)
aadsm12.htm#57 eBay Customers Targetted by Credit Card Scam
aadsm12.htm#51 Frist Data Unit Says It's Untangling Authentication
aadsm12.htm#42 draft-ietf-pkix-warranty-extn-01.txt
aadsm12.htm#18 Overcoming the potential downside of TCPA
aadsm12.htm#15 Challenge to TCPA/Palladium detractors
aadsm12.htm#14 Challenge to TCPA/Palladium detractors
aadsm10.htm#tamper Limitations of limitations on RE/tampering (was: Re: biometrics)
aadsm10.htm#cfppki16 CFP: PKI research workshop
aadsm10.htm#cfppki13 CFP: PKI research workshop
aepay12.htm#8 Know your security onions (or security proportional to risk)
aepay11.htm#50 Concern Grows About ID Theft
aepay10.htm#20 Security Proportional to Risk (was: IBM Mainframe at home)
aadsm9.htm#carnivore3 Shades of FV's Nathaniel Borenstein: Carnivore's "Magic Lantern"
aadsm8.htm#rhose17 [Fwd: Re: when a fraud is a sale, Re: Rubber hose attack]
aadsm7.htm#rubberhose Rubber hose attack
aadsm6.htm#pcards The end of P-Cards?
aadsm6.htm#websecure merchant web server security
aepay7.htm#netsecure some recent threads on netbanking & e-commerce security
aepay7.htm#netbank2 net banking, is it safe?? ... security proportional to risk

(other) Postings by various subjects

Misc. 545 Tech Sq and Cambridge Science Center
Disk Engineering
Performance and/or Scheduling
Cluster, High Availability and/or Loosely-Coupled
APL and/or HONE
Memory Mapping & File System
Multiprocessor, tightly-coupled, SMP, compare&swap
Working Set, LRU, WSClock Page Replacement Algorithm
Misc. subthreads
801 &/or ROMP
Backup, storage management
Benchmarking, workload profile, capacity planning
Future system
Problem determination, zombies, dump readers
System/R, SQL/DS, misc RDBMS
Location/address independent code
Misc. commercial time-sharing
peer-coupled shared data
GML origin at science center
continuous availability, disaster survivability, geographic survivability
misc VAMPS and/or bounce lock
mentioning HASP
IBM DASD, CKD, FBA, vtocs, multi-track search, etc
BDAM and/or CICS posts
Unbundling and charging for software
360/370 m'code
First 360 PCM/OEM Controller
Misc. Bitnet, Earn
HSDT, HYPERchannel
Misc. ARPANET, NSFNET, Internet
OSI and High Speed Protocol
Misc. Interop '88 references
Misc. Internal Network references
RFC1044 Implementation
Various Terminal Emulation issues
Computer Mediated Conversation
3 tier, middle layer, saa
Client and Radius Authentication
SSL Domain Name Server Certificates
X9.59, Identity, Authentication, and Privacy
Misc. Relying Party Certificates
Kerberos and/or pk-init
certificate-less operation
Coining the term certificate manufacturing to differentiate from PKI
Electronic Signature legislation, human signature, intent
Discussion of real-time public key distribution with DNS
Digital Certificate Payload Bloat
Boyd
other Boyd references from around the web

top , by subject : technology , networking , public key , integrity , Boyd - home