All Posts (6122)

Sort by

What is Catphishing?

What is catphishing? It certainly isn’t Garfield lazily sitting in a canoe holding a fishing rod. Catphishing is when a fraudster fabricates an identity and tricks someone via cyber communication into a phony emotional or romantic relationship—usually for financial gain to the scammer—because eventually he’ll hit the victim up for money.

But another reason for catphishing is to lure someone into having a “relationship” with the scammer—to either ultimately publically humiliate them with this info

Read more…

I've blogged before about how firms should find a way to let employees be themselves at work. Although, as one kind reader pointed out, that doesn't further the inclusion agenda if being yourself means working in a way that excludes others! Fair point. I buy into this vision. After all, it's one I created, spearheaded and have very publicly sponsored both within my firm and externally. But recently I got to thinking. If I care about inclusion (and I do) and I am passionate about disruption (whic

Read more…
$200 Trillion in debt, and we’re still pushing on a string
(c) Ecqua Associates DMCC

 

“Neither a borrower nor a lender be”[1] is a line from Shakespeare that has summed up society’s attitudes towards debt for much of our history. A report from consulting firm McKinsey & Co. [2] illustrates how far we’ve moved away from that credo.

Let’s take a look at some numbers highlighted in the report. As of 2014, global debt stood at $200 trillion[3]. Total debt has actually increased $57 Trn since 2007, and

Read more…
Views: 171
Comments: 5

Mobile Apps Failing Security Tests

It’s been said that there are over a million different apps for the smartphone. Well, however many may exist, know that not all of them are passing security tests with flying colors.

You may already be a user of at least several of the 25 most downloaded apps And what’s so special about the top 25? 18 of them flunked a security test that was given by McAfee Labs™ this past January. And they flunked the test four months after their developers had been notified of these vulnerabilities.

App creators

Read more…

15 Top Facebook Privacy Tips

You wouldn’t have to worry about privacy issues on Facebook if you didn’t post sensitive, private information on Facebook…such as information that one day can be used against you. And really, you should share only what you consider “professional” information, even with family. Just stop with the nonsense.

At any rate, it’s important to know how to use Facebook’s privacy features, which change from time to time. Here are useful tips.

  1. Go to Start, then Account, then Privacy Settings, then Edit Your
Read more…

The Security Costs of being too Social

One of the arguments against being very virtually social is that nobody is SO important that everyone wants to know, for instance, that this person is going to be at the local sports bar watching the Super Bowl (or almost nobody; sad to say, some celebrities have half the world following them).

Another argument, however, against tweeting and posting your every move is that this tells burglars when you’ll be away from your house.

So, you’re important enough to post every detail of your life on Face

Read more…

What happens when a Bank Account is hacked?

Who’d ever think that 50 years ago, your money was safer in your bank account than it is today in this “modern” age: remote theft. If you bank with a large or small bank, your account may be at risk by hacking rings.

However, most of the time, but not always, if your account is drained by a cyber thief, the bank will cover it for you.

The latest information is that a big attack is planned in the spring, but it’s the “It’s easier to get one dollar from a million people than it is to get a million b

Read more…

This article from the Wharton University of Pennsylvania titled Confidence Games: Why People Don’t Trust Machines to Be Right highlights the issue of placing trust in our own judgement even though the facts tell us otherwise.

In the article, Wharton professor Cade Massey and doctoral student Berkeley Dietvorst explain that once we use a predictive algorithm that makes a mistake, most of us no longer trust it.  We would prefer our own judgement even though the facts point to the algorithm being ri

Read more…
Views: 76
Comments: 0

What is a Remote Administration Tool (RAT)?

Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT.

A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access to your system, just as if they had physical access to your device. With this access, the person can access your files, use your camera, and even turn on/off your device.

RATs can be used legitimately. For example, when you have

Read more…

Nowadays investing in the stock market seems to be all about competing over pennies at sub-millisecond speed, requiring huge upfront investments in low-latency technology, in what is known as High-Frequency Trading. At the other end of the extreme, ordinary people are using mobile investing apps to simply automatically invest small amounts in passive index funds. Little attention however is going to approaches that actually aim to predict market movements by taking advantage of fundamental marke

Read more…

10 Skeevy Scams to watch

You may think you’re not dumb enough to fall for scams, but consider that someone you care deeply about is naïve enough to be conned. Besides, some scams are so clever that even those who think they’re scam-proof have actually been taken for a ride.

Sometimes fraudsters pose as an authority figure. Some claim you won a prize, while others claim you’re in trouble. Some even claim they’re a family member (needing money) and have figured out a way to convince you of this.

Some scams are done via e-ma

Read more…

Online Data less safe than ever

It’ll get worse before it gets better: online data safety. It’s amazing how many people think they’re “safe” online, while one huge business or entity after another keeps getting hacked to the bone.

And “safety” doesn’t necessarily mean the prevention of your computer getting infected with a virus, or falling for an online scam that results in someone getting your credit card information. It’s also a matter of privacy. While targeted advertising (based on websites you’ve visited) may seem harmle

Read more…

Deadbolt, gotta gotta have It

Deadbolts aren’t hyped up; they really are superior to regular knob locks. Though we keep shaking our head in amazement whenever yet another news story comes out about a burglar or rapist who waltzed through an unlocked door and committed mayhem, it remains a hard fact that many criminals gain entry via physical force.

Yes, what you see in movies and TV shows is true: People CAN kick open a locked door—that’s either missing a deadbolt, has a faulty one or simply because a door jamb itself is jus

Read more…

 8028231468?profile=originalLow interest rates, new regulations and an unstable economic situation have impacted revenues and profits of retail deposits in North America.   Therefore, the upcoming GFMI 3rd Edition Retail Deposit Optimization & Strategic Management Conference comes at a very important and optimal time for banks.

 

Silvio Stroescu, Managing Director, Investments & Deposits at Tangerine Bank recently spoke with GFMI about key topics to be discussed at this upcoming meeting, scheduled to take place April 27-29,

Read more…

Interview with Alejandro Arauzo Romero, Managing Director, Cash Management at Banorte Ixe

For banks, cash management represents a reliable revenue stream. However, the regulatory diversity of LATAM makes the region one of the most complex and restrictive markets for cash management, mainly due to the currency restrictions imposed in certain countries. Banks are in need of a clear solution to optimise their cash management offering.

Mr. Arauzo, Managing Director, Cash Management at Banorte Ixe, rec

Read more…
Views: 77
Comments: 0

How to build up or rebuild your Credit

After taking all the necessary steps to Fixing a Credit Report after being hacked, it is then tome to rebuild your credit. Bad credit is bad credit no matter how it happens. No matter how responsible you are with your money, you won’t get a loan if there’s no evidence of this. The evidence comes from having credit. You need to show lenders you can be trusted.

  • Every time you apply for a credit card, this puts a dent in your credit score. In other words, it can negatively affect your scores especi
Read more…

A recent study says that people are more mindful of online safety issues than what experts had previously believed. An article on phys.org says that Nitesh Saxena, PhD, wanted to know what goes on in users’ brains when they come upon malicious websites or malware warnings.

Saxena points out that past studies indicated that users’ minds are pretty much blank when it comes to malware signs. Saxena and colleagues used brain imaging (functional MRI) for their study.

Study subjects were asked to tell t

Read more…

Over the last decade, automated or algorithmic trading has taken the markets by storm. This does not come as a complete surprise, since enormous technological advances have created the possibility to trade at higher speed and frequency and recognize patterns faster than a human trader could ever dream.  Unfortunately, (or luckily if you are in the risk management business) this trading system does not come risk-free.

 

For those unfamiliar with automated trading systems: these are electronic platf

Read more…

Dubai Networking

Dear Risk Community!

Who would be up for some networking next week (16-20 February) in Dubai?

It would be nice to know some other risk & finance managers!
Especially in the energy/banking/trading sector, but open for others!

Cheers

Emanuele

Read more…
Views: 82
Comments: 0

How to Spot a Splog

I really enjoy reading blogs. And since you are here, reading my blog post, I’m guessing you do too. Blogs are a great way of gaining information and learning about different perspectives on a wide variety of topics. Unfortunately, spammers have tainted this medium with splogs.

The word splog is a combination of the words spam and blog (from my perspective, it could easily be called blam as well). And that’s exactly what it is, a blog full of spam. Splogs are blogs that usually have plagiarized c

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead