Phishing schemes, like the one claiming to be from the Better Business Bureau, target consumers who have concerns about troubled accounts or account breaches. And social engineering is used more often to acquire financial and personal information.
BITS president Paul Smocer says banks can expect an uptick in cybersecurity-focused legislation in 2012. What impact will changes from Capitol Hill have on requirements for data breach notification, information sharing and critical infrastructure?
Authorities in New York have indicted 28 suspects for their alleged connection to a skimming scheme that targeted AmEx cardholders. What did the take-down expose about growing innovations in insider fraud?
The number of banks listed on the FDIC's "problem list" dropped again this quarter, a sign of improving conditions for U.S. institutions. But one former regulator says it's not time to breathe a sigh of economic-recovery relief.
Banking institutions are focused on preparing for 2012 and their first examinations on conformance with the FFIEC Authentication Guidance. But beyond the exams, what are the fraud trends they need to prepare to face?
The FFIEC Authentication Guidance has resulted in a cottage industry of anomaly detection solutions. But look carefully before you buy - separate myth from reality - says Terry Austin, CEO of Guardian Analytics.
Another myth is that it's easy to do the math and spot the anomalies. But, in fact, this process...
A wave of security breaches serves as a catalyst for all types of organizations to assess the need for cyber insurance. Here's the story of one institution that saw the threat and took out a $10 million policy.
Most organizations remain uncomfortable in letting their employees use their own mobile devices to access their IT systems. Yet, in many instances, those charged with securing their enterprises' IT understand that it's just a matter of time before they must grant workers permission to employ those devices.