Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for...
Over the past three decades, we have witnessed great technological changes in the financial services world and we've seen regulators struggle to keep up with them. For example, electronic payment service
providers such as PayPal (later acquired by eBay) took on the challenge of facilitating global online payments....
How important is mobile? For most businesses, mobile represents a highly profitable channel, and one that is critical in attracting new customers, especially the millennial generation.
Where there is growth, there is fraud. The rise of advanced, PC-grade mobile malware, innovative fraud schemes, such as SIM swap...
Banking Trojans. Targeted attacks. Ransomware. These are among the latest manifestations of cybercrime. But who are the top cybercrime groups, and what security lessons can we derive from their latest attacks?
"This is definitely one of the most interesting years with regards to the criminal evolution," says Eward...
Over the past three decades, there have been a great number of technological changes in the financial services world and regulators have struggled to keep up with them. The following white paper discusses the evolution and consequences of the Payments Service Directive and how regulation has gotten more complicated as...
In online banking security, consumer endpoints are commonly considered the "weak link," and for good reason. Banks have no control over their customers' endpoints or the steps their customers take to reduce their risk. To make matters worse, fraudsters now regularly circumvent traditional endpoint protections, such as...
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today's virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking...
When evaluating and implementing fraud prevention technologies, most security professionals focus on only the fraud avoidance capabilities. They often overlook the potentially significant adverse impact on customers' experience and operational costs. Good fraud prevention solutions must be effective at identifying and...
IBM commissioned Forrester Consulting to conduct a Total Economic Impact study and examine the potential return on investment (ROI) enterprises may realize by deploying IBM Trusteer solutions. The purpose of this study is to provide readers with a framework to evaluate the potential financial benefit of IBM Trusteer...
Consumer-serving industries are under continual attack, as cybercriminals find that the interface between the customer and the retail outlet is where the money is. The assault is occurring on all fronts, be it through the physical point-of-sale or ecommerce gateway, the enterprise and its supply chain, or the customer...
Data breaches feed the market for fraudsters to steal identities, which challenges traditional approaches to identifying the genuine from the fraudster. We hear that knowledge-based authentication is dead. But trust in any single defense is flawed. No single route to "trust" should be applied. We should never lose...
The title of the new book is Understanding Social Engineering Based Schemes. And its mission is three-fold, Jakobsson says. He wants to profile today's most common schemes, forecast some future trends, and help organizations build effective countermeasures.
In an interview about the contents of his new book,...
IoT devices running the authentication protocol OpenSSH are being compromised and used as proxies in attacks that aim to take over accounts at popular web services, according to new research from Akamai.
Fancy Bear strikes again: the suspected Russian hacking group released confidential medical records for four U.S. Olympic athletes, falsely contending the documents prove illegal drug use by the Olympians.
Mobile has opened up many new ways for users to communicate and connect without being tied to a desk or a power outlet - and at the same time, it has presented hackers with many more opportunities to perpetrate fraud and carry out attacks that cannot be detected with traditional tools used to detect attacks in web...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.