If you think the only way your network and devices can be compromised via email is phishing, think again!
A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms,...
Digital transformation and the rapid rise of fintech companies have rapidly changed the behaviour of merchants and consumers alike, resulting in a huge rise in digital payment methods and remote channels. But with greater convenience and speed comes risk. Retail and e-commerce businesses are seeing a rise in fraud,...
Solving this conundrum can be a challenge and some banks struggle to deploy technology environments enabling them to capitalize on data.
Fraud knows no boundaries, so organizations must also keep a constant watch on the threat landscape. But automation, and technology, alone cannot solve this problem: insights can...
The FBI is warning the U.S. higher education sector about compromised sensitive credentials and network access information advertised for sale across various public and dark web forums. The agency states that this access to credentials could potentially lead to a cyberattack.
Police in Nigeria this week arrested a 37-year-old man who's been charged with masterminding "a criminal syndicate tied to massive business email compromise and phishing campaigns," Interpol says. But with known BEC losses last year exceeding $2.4 billion, will the arrest have a noticeable impact?
The Financial Services industry has seen a 1000%+ increase in the amount of ransomware attacks hitting their organizations. It is also one of the most targeted verticals out there. We know why this is a favored target; because that’s where the money is. The question to be answered is identifying the attack vector...
With the rising number of digital identity fraud cases in Asia Pacific, understanding the types of fraud and exploring ways to prevent it while ensuring a smooth and seamless experience plays an important role in your business.
While there’re no foolproof ways in stopping fraud completely, early detection and...
In the today’s digital world, when so much of our lives are online, identity verification and authentication are critical to addressing fraud-related risk management challenges. To prevent fraud and protect your business and your customers, you must be certain the people you are dealing with are who they represent...
In the today’s digital world, when so much of our lives are online, identity verification and authentication are critical to addressing fraud-related risk management challenges. To prevent fraud and protect your business and your customers, you must be certain the people you are dealing with are who they represent...
Apple, Google and Microsoft are joining forces to back a standard that will allow websites and apps to offers passwordless sign-ins across devices and platforms. The three OS and browsing giants have put their weight behind a common passwordless sign-in standard created by the FIDO Alliance.
A federal jury has ordered NortonLifeLock to pay Columbia University $185.1 million after finding the company infringed on two patents. Jurors decided Monday that NortonLifeLock's use of emulators to monitor programs for malicious behavior intentionally infringes upon Columbia's patents.
Today’s sophisticated cyberattacks combine multiple tactics that include social engineering, zero-day malware and 3rd party OAuth app abuse. Threat actors employ tactics across email, cloud and web that target specific people in your organization to breach your environment and access sensitive data. Hybrid work...
A recent study shows that 85% of customers would avoid using a brand after losing trust. There is also an emotional impact to identify theft. As a security leader, you do not want that pain associated with your brand.
From login to purchase, it’s critical to know who the person is behind the OTP and know if they...
In 2021 alone, fraudulent accounts increased by 70% and synthetic identity fraud losses grew to $20B.
From onboarding and answering product questions to providing ongoing support, customers expect and deserve safe and secure communications. Every communication carries the potential for building trust and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.