Point-of-sale retail breaches are the rage, but they are just one cyber-crime trend on the mind of RSA researcher Uri Fleyder. What are the malware and mobile threats that organizations should monitor?
Security experts say the new alliance between IBM and Apple could lead to broader use of iPhones and iPads at banking institutions if the partnering companies demonstrate adequate security and scalability.
Mobile banking brings new opportunities to institutions and customers alike - but also a host of new security risks. Jim Anderson of BAE Systems Applied Intelligence discusses the emerging landscape.
Recent high-profile retail breaches could help increase interest in the adoption of mobile payments to lessen the likeliness of fraud at the point of sale, says Aite Group analyst Thad Peterson.
Mobile banking brings new opportunities to institutions and customers alike - but also a host of new security risks. Jim Anderson of BAE Systems Applied Intelligence discusses the emerging landscape.
Could too much regulatory oversight hinder cyberthreat information sharing, rather than encourage it? That's an increasing concern for bankers, who argue regulators could bog down progress in cybersecurity.
Users' fear of data loss on personal devices must be balanced with an organization's need to protect sensitive information, says ZixCorp's Nigel Johnson. He explains the evolution of mobile device management.
Does BYOD really stand for Bring Your Own Disaster? JD Sherry of Trend Micro discusses the latest mobile security trends and threats, including the evolution of ransomware and the Internet of Things.
Thefts of iPhones in New York, San Francisco and London declined after Apple added a remote-disabling feature. Now Google and Microsoft have promised to offer the feature in their mobile operating systems.
If the NSA's meddling in NIST cryptography standards soiled the reputation of the National Institute of Standards and Technology, an amendment approved by the House of Representatives could help restore it.
Kentucky is now the 47th state to enact a breach notification law. While a national law superseding the widely varying state statutes is long overdue, the primary election defeat of House Majority Leader Eric Cantor makes passing such a bill tougher.
Consumer rights advocates have applauded Apple's preview of iOS 8 privacy changes, including randomizing MAC addresses to help block retail analytics and unauthorized forms of device tracking.
When NIST issued "Guidelines on Cell Phone Forensics" in May 2007, Apple's introduction of the iPhone was a month away. Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."
We've been talking about shifting away from legacy mag-stripe technology and a move toward EMV chip cards for the last decade in the U.S. So is it too late, or is there still hope for EMV?
"Banks can play offense, to use mobile in a justifiable way to engage customers into their security," says Jim Van Dyke of Javelin Strategy & Research. He outlines a strategy for using mobile devices to enhance fraud detection.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.