Posted on 17 February 2012 by Thales
In early nineteenth century England, members of the ‘Luddite’ movement protested against the onset of the industrial revolution by destroying the machinery which they believed was jeopardising their careers as skilled tradesmen. Since then the term has become synonymous with all of those who shun technological progress in favour of more antiquated methods. There is […]
Posted on 20 September 2011 by Thales
Recently, @briankrebs highlighted a Trojan attack which showed quite how sophisticated some cyber attacks are now becoming. The case in question is being investigated by German police, and involves a new piece of malware which convinces online banking customers to willingly transfer their own money into the accounts of criminals. This particular case shows that, sometimes, even a layered […]
Posted on 12 February 2011 by Jennifer Dean
This year the RSA Conference in San Francisco coincides with the Mobile World Congress resulting in a busy week for Gemalto’s Telecom and Enteprise Security teams.
Posted on 04 October 2011 by Thales
Remember a few weeks ago when I applauded Visa for announcing plans to accelerate the migration to EMV chip technology and the adoption of mobile payments? Since then, I have been struck by a few stories in the news that really drive home what this migration will mean for the United States. First, this story […]
Posted on 06 November 2012 by Thales
Change is happening. We are in the process of electing a new leader here in the US, which will have global ramifications and it’s an election that is being very closely watched and followed, including on social media. However, it’s not the only important appointment that is being made – remember last month when Neville […]
Posted on 28 November 2011 by Thales
Today we’re using our smartphones the same way we use our computers – to surf the Web, make financial transactions, conduct business, and download software. Increasingly, we’re also using the same device for personal and business use. So why aren’t we protecting our phones the same way we do our computers? With rising threats of […]