RICHARD SWART: Could you tell us a little bit more about your role in the FDIC and could you explain how the FDIC is tracking cyberfraud? DAVID NELSON: Sure. Recently, I have become more of an analyst. Before, I was an examiner, as you well know, but now, I've turned into more of an analyst, where I review a lot of...
How a person handles their personal information during everyday tasks could heighten (or lower) their chances of being a victim of identity theft. Here are some tips you can share with your customers for them to use and remember to help lower their “identity theft quotient.â€
Social Security Number...
It’s often said that the biggest problem with information security is the space that is filled between the chair and the keyboard. While many of us in information security at financial institutions will shake our heads in agreement with that statement, the need for education of our customers is a pressing issue.
When it comes to phishing, the smaller institutions out there that aren’t prepared for a phishing attack to hit their brands are playing “Russian Roulette†with their brand and reputation, says one leading security solutions firm.
“Smaller institutions should not be complacent. Brand and...
The Federal Trade Commission’s second summit on Spam in the last four years addressed the growing problem of unsolicited emails that is creating costs for businesses and consumers alike.
FTC Chairman Deborah Platt Majoras addressed the summit held July 11-12 in Washington, D.C. “The volume of spam...
Evolution of identity fraud techniques, including man-in-the-middle
The authentication solution landscape for financial institutions - what are some of the choices banks have to fight fraud (e.g., risk-based authentication, strong authentication, PKI, OTP, smart cards)
Life in the trenches - Implementing FFIEC...
With the recently discovered “plug and play†phishing kit, a relatively “non-technical†person with the right information could launch a phishing attack against any financial institution.
Research from McAfee’s Avert Labs shows threats including phishing web sites are on the rise, as expected. But other pests such as remote-controlled bots show unpredicted signs of decrease.
A new study details the psychological games and other tactics cyber criminals use in social engineering scams propagated through junk email. In a recently released study titled "Mind Games," Dr. James Blascovich, Professor of Psychology at the University of California,
Are you a trusting person? When dealing with people you don't know, don't give them sensitive information unless you're sure who they are, and can prove that they are who they say they are. You'll want to ask yourself if they should have access to the information.
With the headlines announcing almost on a weekly basis another data breach at businesses, educational institutions and medical facilities, a recent study shows consumers are modifying their purchasing behavior, including online buying, out of concern for the security of their personal information.
The "2007 Consumer...
It’s going to be a long hot summer for many U.S. financial institutions when it comes to online attacks. The RSA’s Anti-Fraud Command Center issued its monthly online fraud intelligence report for May, and the statistics point to attacks on U.S. nationwide banks account for 33 percent of all attacks on...
As with any information security threat, your institution needs to plan for them, and social engineering from outside of your institution needs to be expected.
A financial institution's customers don't always know what's available to them. Your job is to help them. Did you know that everyone is entitled to receive one free credit file disclosure every 12 months from each of the nationwide consumer credit reporting companies - Equifax, Experian and TransUnion. This once a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.