Bank fraud has evolved over the last several years, but some classic variations keep financial institutions busy.
Here are six old fraud tricks that are back with new twists to bedevil fraud departments and information security professionals.
It's "tweet" time! Information Security Media Group (ISMG) has just registered with Twitter.com to start providing regular updates to audience members who also are enjoying the tweet life.
OK, so I know some of you out there are still kinda dying to know, but don't dare to ask - what is Twitter?
OK, so it's April 15, and everyone's mind turns to taxes and filing returns.
Me? I'm thinking of the pace of failed banking institutions we've seen so far this year - and wondering just how much we're taxing the FDIC's insurance fund.
OK, so here's a reaction I never expected.
We've talked a lot about the banking crisis over the past year - the differences between Wall Street and Main Street, and how all financial institutions are impacted in one way or another by fallout from the industry's "3 B's," Bailouts, Bernie and Bonuses.
When is an outsider really an insider? That is the question every financial institution has to answer when reconciling security issues and the use of third-party service providers.
At Central Bank, Lexington, KY, Chris Schum, IT Security Manager, Technology Services, says the bank uses port lockdown software to...
Every day I'm driving to or from work -- or even on the weekends - it seems like I hear about some new urgent priority that I must be aware of, whether it be the flailing economy, President Obama's directives, data breaches, or any number of other news-worthy items. But I love the news - so I don't mind!
Clearing my desk and my head this morning...
Interesting nuance in the Heartland Payment Systems breach this week. Did you read the article about Visa and the security update it's presenting to its network of processors? In one part of this presentation, Visa discusses myths and facts about PCI DSS compliance, and...
We all know the risk of the insider threat is high, but what are the specific vulnerabilities for which organizations should be particularly vigilant?
In an exclusive interview, Randy Trzeciak of Carnegie Mellon's CERT program discusses recent insider threat research, including:
Patterns and trends of insider...
On Thursday morning in a packed courtroom in New York City, former Wall Street financier Bernard Madoff, now the face of greed in our distressed economy, pleaded guilty to 11 charges in what may be the biggest Ponzi scheme ever pulled. Afterward, he was immediately placed in handcuffs and led off to jail amid the...
On Thursday, Bernard Madoff will plead guilty to fraud charges in what is being called the largest Ponzi scheme in U.S. history, said his lawyer Ira Sorkin in a New York court on Tuesday.
Is 2009 the Year of the Insider Threat?
Last August's arrest of a Countrywide employee in California illustrates the potential impact of a single insider with access to sensitive information. The FBI charged the former employee with taking 2 million names and personal information from the mortgage bank and selling...
Most of us deal with the ubiquitous spreadsheet at least once a day in our daily work. Whether it is creating or updating reports for senior management or keeping track of equipment inventories - or the hundreds of other uses for spreadsheets - financial institutions depend on these workhorses to retain and create...
How is it that Heartland doesn't remain front and center in the mainstream media?
I made the mistake of popping open a browser today and loading my preferred news website, and it was sort of like the ultimate one-two punch that hit me with concussive force.
Spring time in Washington D.C. used to be marked by the pink and white splashes of color of the cherry trees that line the Potomac and the Tidal basin.
Now I suspect this spring (or possibly even sooner) we're going to see some color of a different kind in D.C. - the color red.
We all know the risk of the insider threat is high, but what are the specific vulnerabilities for which organizations should be particularly vigilant?
In an exclusive interview, Randy Trzeciak of Carnegie Mellon's CERT program discusses recent insider threat research, including:
Patterns and trends of insider...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.