Criminals in Europe are annually laundering at least $4 billion - and growing - via cryptocurrencies, warns Europol. The agency is calling on regulators and legislators to regulate cryptocurrencies to help battle money laundering and protect consumers.
Australia is the latest country to roll out real-time payments, where funds from an account at one bank reach an account at another bank in seconds. While convenient, the system poses fresh fraud challenges and consumer protection concerns.
Illegal transactions on the internet have long been conducted in the cryptocurrency bitcoin. But underground vendors are accepting new kinds of virtual currency that may be safer to store and offer more privacy protections, according to a new study of 150 dark web markets and forums.
The adoption of e- and m-commerce has created new opportunities for fraudsters to falsify identities and defraud merchants, consumers, and banks out of millions.
However, preventing fraudulent transactions with fewer instances of false positives is possible by leveraging shared transaction data from a consortium of...
As banks in the U.S. and Australia grapple with how to effectively launch faster payments, more will turn to big data and machine learning to help better manage expected upticks in fraud, says cybersecurity specialist John O'Neill Jr. of DarkTower.
Today, consumers are using millions of devices to buy whatever, whenever, wherever. This rapid evolution of e- and m-commerce has created a target for fraudsters to falsify identities and defraud merchants, consumers, and banks out of millions.
Taking advantage of the wealth of data maintained by banks is...
The booming interest and sometimes surging values of cryptocurrencies are drawing the interest of cybercriminals on a scale never seen before - including attacks aimed at trying to steal computing power to mine cryptocurrency.
Fraud is a pervasive and insidious attack on all. Financial service organizations, retailers, insurers, healthcare providers, governments - they all bear the burden. What can be done to more effectively reduce this scourge?
In this session, Art Coviello, former CEO of RSA Security, draws on his decades of security...
With the explosive growth of the internet of things, and the increasing threat posed by botnets that leverage IoT, more must be done to ensure IoT devices include security by design, says David Holmes, principal threat researcher at F5 Networks, who offers a strategy.
An analysis of FBI Director Christopher Wray's comments about how encryption poses complications for law enforcement officials leads the latest edition of the ISMG Security Report. Also featured: The former CISO of the state of Michigan sizes up cybersecurity forecasts.
Accidentally careless employees are the biggest cause of incidents involving data loss, responsible for almost 25 percent of all breaches.
Given that employees are the first line of defense against socially engineered schemes, such as account takeover, new account fraud and other crimes, doesn't it make sense to...
The Equifax breach, which affected more than 143 million individuals, proves breaches are not trending downward.
A lot has been said about the ways that criminals use stolen data. In this session, BioCatch discusses the current state of account openings online and what fraudsters are doing to circumvent security...
Since the U.S. adoption of EMV chip-and-signature for payment card security, incidents of card-present fraud have been reduced. But there has been a corresponding (and predicted) rise in card-not-present fraud, as well as check fraud and new real-time fraud, resulting from new forms of payments.
This session...
Every day, financial institutions face an onslaught of automated attacks on their web and mobile applications by all types of fraudsters. Some test millions of stolen credentials on login applications to commit account takeover; others create thousands of accounts on account registration applications to validate...
Dave DeWalt, former CEO of McAfee and FireEye, identifies the next generation of cybersecurity threats in the latest edition of the ISMG Security Report. Also featured: an analysis of the recent news of the Meltdown and Spectre microprocessor flaws and the POS malware attack on retailer Forever 21.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.