The evolving industry regulations, such as adherence
to the FinCEN CDD final ruling and the 4th EU antimoney
laundering directive, have put additional
pressure on financial institutions when screening
new applicants and existing customers.
Download this report to learn more about:
Enhancing your KYC / CDD...
The solution providers in the fraud solution industry offer logic
designed to track users and prevent malicious activity by
capturing and analyzing behavioral characteristics across
the entire session, from login to check out and everything in
between. These solutions compare known customer behavior
in the case...
Financial organizations currently subject to the FinCEN SAR eFiling will soon have to make major changes to comply with the new rules by January 1, 2019. The suspicious activity types that need reporting have been updated, new fields have been added, and the ASCII format is being updated just to mention a few things...
If 2017 was the year of ransomware innovation, 2018 is well on its way to being known as the year of cryptocurrency mining malware. Numerous studies have found that the most seen malware attacks today are designed for cryptojacking. But while ransomware campaigns may be down, they're far from out.
What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
The global eCommerce market is booming and consumer electronics are leading the way. This year, online consumer electronics sales are expected to reach $108.4 billion in the US alone. Online sales present new challenges, including a rise in Card Not Present (CNP) fraud.
Download this infographic which aims to help...
In January 2018, Financial Crime Enforcement Network (FinCEN) announced changes to the Suspicious Activity Report (SAR) form. Financial organizations currently subject to the FinCEN SAR eFiling will soon have to make major changes to comply with the new rules by January 1, 2019. The suspicious activity types that need...
While most online businesses recognize the importance of preventing chargebacks, there is less emphasis on merchant's ability to dispute and overturn certain chargebacks, to protect their hard-earned revenue.
This guide on chargeback disputes provides actionable tips for identifying candidates for dispute, gathering...
Leading the latest edition of the ISMG Security Report: An analysis of how distraction tactics were used during a $10 million SWIFT-related hack at Banco de Chile. Also, a wrapup of Infosecurity Europe.
South Korean cryptocurrency exchange Coinrail says hackers stole 30 percent of all of the cryptocurrency tokens it was storing, but many have been successfully frozen or recalled. Security experts say cryptocurrency exchanges remain poorly secured, so they're popular targets for hackers.
Although all the major credit card brands have dropped the requirement for obtaining signatures to verify point-of-sale transactions made with EMV payment cards, they're not pushing strongly for using PINs instead, leaving that authentication decision to card issuers, says Linda Kirkpatrick of Mastercard.
The alluring promise of gold inspired almost half-a-million to risk it all and rush to California in the mid-20th century in hopes of striking it rich. Although gold mining was fruitless for the most part, cunning opportunists profited off of desperate '49ers by selling synthetic gold or mines of no real value. A...
Experts have long warned that bitcoin is not as private as it appears. The very design of bitcoin, as well as some other virtual currencies, can lend a surprising amount of information about the groups using it to transact. In fact, it's sometimes easier to track than if criminals used the banking system.
Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.