Disruption continues to reshape the financial services industry. Time-proven products and services have been rendered obsolete in the blink of an eye, rewriting the banking landscape and leaving it scattered with new challenges.
Online banking and faster payments have been embraced by customers, but money launderers...
Protecting your enterprise from breaches and account takeovers has never been a bigger challenge. New tools make it possible for even unsophisticated actors to perform advanced, widespread attacks that put your organization at risk. According to the 2019 Verizon Breach Report, stolen credentials are the leading attack...
Adapting fraud systems from desktop to mobile is no simple task. Retailers may misinterpret legitimate shopping behavior as 'risky' due to the nature of cellular connections (e.g. a mobile carrier may shift your browsing to another location).
To deal with the increase in mobile usage, organizations must also make...
The digitalization of business processes and advent of
mobile computing have given rise to the next generation
of fraud. Cybercriminals have a variety of tools and
techniques - as well as opportunities to steal money and
services. Furthermore, traditional fraud prevention tools often
fail to stop this fraudulent...
Account takeover is the fastest growing fraud vector in retail banking. It's lucrative. It's a service you never want to provide.
Motivated fraudsters attack from every angle, limiting the effectiveness of the best one-dimensional defenses.
iovation offers the most secure, seamless, and comprehensive solution....
FIN8, a hacker group that targeted POS devices in the hospitality and retail sectors, is back on the scene with new malware, including the Badhatch backdoor that's designed to steal payment card data, according to researchers with Gigamon's threat detection unit.
In today's digitally dependent business operations, an organization's IT infrastructure is a
crucial asset. This asset can be a competitive advantage, but it can also be a disadvantage
based on how well the organization evolves and utilizes its suite of IT assets relative to its
current and future competitors bent...
The reason social media platforms are so successful is because they tap into the human sense of needing to connect with others.
Depending on your organization's policies, there is a high likelihood your employees may be tapping into several social platforms throughout the workday, which can increase attack...
Business email compromise scams are surging, and they're costing U.S. companies a total of more than $300 million a month, according to a recently released analysis by the U.S. Treasury Department. The report pinpoints which sectors are hardest hit by this type of fraud.
A Texas-based healthcare system says hackers unsuccessfully tried to divert employee payroll direct deposits through a phishing attack that also potentially exposed patient data. The incident illustrates how business processes can help avert theft.
The Internal Revenue Services' internal financial reporting systems and IT infrastructure have 14 new security vulnerabilities, along with a long list of previously unresolved deficiencies, according to a U.S. Government Accountability Office audit.
At a Senate committee hearing on Tuesday, lawmakers grilled a Facebook executive about the company's plans to launch a cryptocurrency. One Democratic senator said Facebook "does not respect the power of the technologies they are playing with - like a toddler who has gotten his hands on a book of matches."
In the run-up to Amazon Prime Day, some of the company's customers were being targeted by a phishing kit called 16Shop, according to McAfee researchers. The campaign is similar to an earlier attack that focused on Apple users.
It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.
So, how can...