A significant uptick in traffic linked to an Internet port known as "port zero" is likely among the first signs of a massive and targeted attack against remote servers and networks worldwide, one threat researcher says.
What are the distinct phases of the fraud lifecycle, and how can banking institutions intervene at each stage to prevent losses? Daniel Ingevaldson of Easy Solutions offers fraud-fighting tips.
Despite upticks in account takeover fraud, small business owners still aren't doing enough to enhance their ACH and wire fraud defenses, say Michelle Di Gangi and David Pollino of Bank of the West.
For years, researchers have studied malicious insider threats. But how can organizations protect themselves from insiders who make a mistake or are taken advantage of in a way that puts the organization at risk?
Responsible financial institutions understand the importance of improving security to protect their banking clientele. The key to implementing improved security effectively is to balance security with the overall user experience and streamline steps between initiating and completing transactions. One of the most...
A recent ATM skimming scheme linked to the theft of hundreds of thousands of dollars is an indicator of a coming surge in this type of fraud, experts say. Learn about the causes of this trend.
An arrest has been made in a major insider fraud case at a small banking institution in Ohio. One fraud-fighting expert says this scheme should never have flown under the radar of banking regulators.
Using "synthetic identities" to commit fraud is becoming easier, but it's increasingly difficult for organizations to detect this type of deception, says Claudel Chery of the U.S. Postal Inspection Service.
Rather than waiting until they're a breach victim, organizations should reach out to law enforcement officials to develop a good working relationship in battling cybercrimes, federal prosecutor Erez Liebermann says.
Sharing information about cyber-attacks is making a difference in the banking sector, helping bring criminals to justice and curbing fraud losses. Other sectors should learn from banking's example.
What is hostile profile takeover, and why does this emerging threat pose such a risk to smart phone users? Dave Jevans, CTO of Marble Security, describes this and other new mobile threats.
Banking institutions are becoming more comfortable with sharing information about cyber-attacks and fraud. And some threat-intelligence vendors are helping to pave the way for expanded collaboration.
What is hostile profile takeover, and why does this emerging threat pose such a risk to smart phone users? Dave Jevans, CTO of Marble Security, describes this and other new mobile threats.
The average insider scheme lasts 32 months before it's detected, says threat researcher Jason Clark, who suggests using a combination of the right technologies and the right processes is the key to improving detection.
Our inaugural Fraud Summit on Oct. 22 at the Meadowlands in New Jersey will feature an impressive lineup of information security leaders offering timely insights about practical risk mitigation strategies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.