Design Con 2015
Breaking News
Comments
Newest First | Oldest First | Threaded View
jennieingram
User Rank
Rookie
Without public awareness its useless
jennieingram   9/26/2013 12:05:15 AM
NO RATINGS
Cyber security is reall worry now a day with every passing day more and more people and organization are effected by cyber criminals. Law for cyber crimes are very strict for them its time to bring some public awarness program to protect people from identity stealing and pther financial crimes.  What ever governmnet and agencies do will not work becuase public are not aware that how they can protect theirself. 

chanj0
User Rank
CEO
re: Cyber security solutions underused
chanj0   4/30/2013 11:33:30 PM
NO RATINGS
Call rerouting and CSR legitimacy may be a concern. With the current PSTN, I would not be worried too much. However, re-routing and spoofying of VoIP call may be a challenge to security expert. I can't imagine what hackers can do if they hack into a SDN network.

old account Frank Eory
User Rank
Rookie
re: Cyber security solutions underused
old account Frank Eory   4/30/2013 5:20:04 AM
NO RATINGS
Credit & debit card fraud detection departments at banks can take this paranoia too far at times. I recently had a card voided and a new one reissued after the bank said a store where I had recently used the card had a network security breach and my card number may or may not have been taken, although there were no suspicious transactions. I appreciate that the bank doesn't want the liability of reimbursement if there were some fraudulent use, but preemptively cancelling cards that may or may not have been compromised seems a bit ridiculous. It's costly for the bank and a huge pain for the consumer who has multiple automatic payments attached to that card number. To add insult to injury, it can take up to 10 business days for the new card to arrive, and this kind of thing seems to happen several times a year.

Duane Benson
User Rank
Blogger
re: Cyber security solutions underused
Duane Benson   4/28/2013 9:30:02 PM
NO RATINGS
One of the big challenges is that often, legitimate business look exactly like scam business. The scammers copy legitimate businesses. The security experts tell users what not to do, then the legitimate businesses do exactly what the security experts tell us not to do. Case in point, credit cards. On the one hand, their fraud detection is pretty amazing. I've had a credit card company, send a voice call, text message and email all within minutes of some scam-worthy activity. That's great. What's not so great is that they immediately pepper you with personal questions of the sort that a scammer would be asking. In that case, the second level of security is to not answer any of their incoming correspondence and make an outbound call to the number on the back of the credit card. A phantom third level of security are the laws and policies that limit a card owners liability in the event of theft, but that's pretty much plugging the wrong side of the dike.

DrQuine
User Rank
CEO
re: Cyber security solutions underused
DrQuine   4/28/2013 3:50:41 AM
NO RATINGS
Bleeding edge security is in a continuous arms race with social engineers and hackers. If the social engineering is convincing enough, even digital security code cards can be defeated. Finally, we're going to need to develop better means for authentication of the "customer support representatives" (CSR) as well. Even routine calls for telephone or Internet service require the customer to reveal private information to confirm ownership of the account. How do we know the CSR is really legitimate .. or has the phone line been rerouted?

elizabethsimon
User Rank
CEO
re: Cyber security solutions underused
elizabethsimon   4/26/2013 9:41:12 PM
NO RATINGS
I'm in favor of multi-factor identification but would prefer something that did NOT require me to give Facebook, Google or Yahoo my mobile number. I only give that number to a small select group that I can trust not to spread it to the world.

EREBUS0
User Rank
Rookie
re: Cyber security solutions underused
EREBUS0   4/26/2013 8:05:53 PM
NO RATINGS
I agree, the biggest problem with on line security is that few use or even know about better ways to do business. There are many ways to set up secure communications between users and it is only a little effort to make it more difficult for the criminals to use the links. Unfortunately, most people will not bother until they have been victims, but by then it is too late. Just my opinion.



Most Recent Comments
Top Comments of the Week
Flash Poll
Like Us on Facebook

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EE Life
Frankenstein's Fix, Teardowns, Sideshows, Design Contests, Reader Content & More
Max Maxfield

Recommended Reads From the Engineer's Bookshelf
Max Maxfield
2 comments
I'm not sure if I read more than most folks or not, but I do I know that I spend quite a lot of time reading. I hate to be idle, so I always have a book or two somewhere about my person -- ...

Aubrey Kagan

Have You Ever Been Blindsided by Your Own Design?
Aubrey Kagan
37 comments
I recently read GCHQ: The uncensored story of Britain's most sensitive intelligence agency by Richard J. Aldrich. The Government Communication Headquarters (GCHQ), Britain's equivalent of ...

Martin Rowe

No 2014 Punkin Chunkin, What Will You Do?
Martin Rowe
2 comments
American Thanksgiving is next week, and while some people watch (American) football all day, the real competition on TV has become Punkin Chunkin. But there will be no Punkin Chunkin on TV ...

Rich Quinnell

Making the Grade in Industrial Design
Rich Quinnell
15 comments
As every developer knows, there are the paper specifications for a product design, and then there are the real requirements. The paper specs are dry, bland, and rigidly numeric, making ...

Special Video Section
The LT8640 is a 42V, 5A synchronous step-down regulator ...
The LTC2000 high-speed DAC has low noise and excellent ...
How do you protect the load and ensure output continues to ...
General-purpose DACs have applications in instrumentation, ...
Linear Technology demonstrates its latest measurement ...
10:29
Demos from Maxim Integrated at Electronica 2014 show ...
Bosch CEO Stefan Finkbeiner shows off latest combo and ...
STMicroelectronics demoed this simple gesture control ...
Keysight shows you what signals lurk in real-time at 510MHz ...
TE Connectivity's clear-plastic, full-size model car shows ...
Why culture makes Linear Tech a winner.
Recently formed Architects of Modern Power consortium ...
Specially modified Corvette C7 Stingray responds to ex Indy ...
Avago’s ACPL-K30T is the first solid-state driver qualified ...
NXP launches its line of multi-gate, multifunction, ...
Doug Bailey, VP of marketing at Power Integrations, gives a ...
See how to ease software bring-up with DesignWare IP ...
DesignWare IP Prototyping Kits enable fast software ...
This video explores the LT3086, a new member of our LDO+ ...
In today’s modern electronic systems, the need for power ...