Email security is an issue for businesses and agencies of all sizes. To tackle that challenge, BITS and eCert Inc. have just released a new paper entitled "Email Sender Authentication Deployment."
In an exclusive interview, Paul Smocer, VP of Security at BITS, discusses:
Top email security challenges facing...
For just over six months now, the banking regulatory agencies have examined institutions for compliance with the ID Theft Red Flags Rule, and they have just released a document addressing Frequently Asked Questions about the regulation.
Register for this exclusive webinar to hear from a former information security...
Email security is an issue for businesses and agencies of all sizes. To tackle that challenge, BITS and eCert Inc. have just released a new paper entitled "Email Sender Authentication Deployment."
In an exclusive interview, Paul Smocer, VP of Security at BITS, discusses:
Top email security challenges facing...
The Judicial Panel on Multidistrict Litigation in Louisville, KY on Wednesday issued its decision to consolidate the class action suits brought against Heartland Payment Systems (HPY).
The lawsuits will be heard in the Southern District Court of Texas in Houston by Judge Lee H. Rosenthal. The decision notes that...
Data and privacy protection - there's much that government, industry and consumers alike can do to improve information security. And the Federal Trade Commission (FTC) is at the heart of education and enforcement efforts.
In an exclusive interview, the FTC's Joel Winston discusses:
Top privacy risks facing...
The Heartland Payment Systems (HPY) data breach may be the fraud story of year (so far), but ATM and debit card thefts are growing steadily and frighteningly at financial institutions.
Here are the top ATM/debit card fraud trends
Electronic communication is at the heart of every organization, but one compromised e-mail can damage your corporate brand, compromise intellectual property or put you in non-compliance with laws and industry regulations. Privacy concerns, regulatory compliance, and corporate guidelines all need to be factored into...
In this issue...
10 Faces of Fraud
What does next year hold for fraud against financial institutions? Here are 10 of the new and old ways criminals will be looking to commit fraud.
The Insider Threat: 16 Tips to Protect Critical Data
Top Trends in ACH Fraud
What you need to know about payroll fraud, ACH...
Verizon Business investigated 90 major data breaches in 2008, including 285 million compromised records. Nearly ¾ of those breaches were external hacks, and 99.9 percent of the records were compromised via servers and applications.
These are among the findings of Verizon's new 2009 Data Breach Investigations...
Manhattan District Attorney Robert Morgenthau announced this week that his office has indicted 18 people from New York City for operating a bank fraud and identity theft scheme. The scheme resulted in the cashing of more than 1,000 counterfeit checks at several large banks.
While it's hard to get a handle on just how many consumers were affected by the Heartland Payment Systems (HPY) data breach, the total number of institutions now reporting card compromises is at 656.
The fraud fight is getting nastier by the minute, say experts familiar with the new schemes - and some old ones with new wrinkles -- being perpetrated by criminals against financial institutions and their customers. Here are 13 of the most prevalent ruses.
The Heartland Payment Systems (HPY) data breach has already cost the card processor millions in fines from Visa and MasterCard.
This news was revealed by CEO Bob Carr in Heartland's recent earnings call, wherein Carr said the much-publicized breach has already cost the company $12.5 million.
The federal judge who heard the collective civil claims filed against the Hannaford Bros. supermarket chain issued his opinion on the 21 claims on Tuesday in Portland, ME. All but one of the 21 civil claims filed against the supermarket giant for alleged failure to protect consumers during the company's network breach...
A sophisticated type of phishing, man-in-the-middle attacks occur when an attacker attempts to intercept communications between two parties, such as a customer and a financial organization, without their knowledge. By doing so, the attacker becomes "the man in the middle." Both parties are unaware of the attacker's...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.