Banks and credit unions say losses linked to card-skimming are a growing concern. Why are skimming attacks successful, and what can be done to thwart the threats?
Many organizations realize they are at risk of insider attacks. But do they have evidence and capabilities to respond to these risks? That's the real challenge, says researcher Larry Ponemon.
Application security is driving demand for highly skilled consultants. It's a challenging profession, and I've broken out five key skills that will distinguish you in the field.
In Georgia, a man has pleaded guilty for his role in a $1.3 million phishing scheme. How did Bank of America and Chase help law enforcement agencies crack this alleged international fraud ring?
Are institutions making the right investments in anti-fraud technologies? As they conform to the FFIEC's updated Authentication Guidance, many could miss the mark, warns Aite's Shirley Inscoe.
Which security concerns should institutions be bracing for, as more consumers adopt mobile banking? BITS offers a collection of recommendations from some of the industry's top institutions.
BITS' new mobile research highlights six key areas of risk every banking institution must consider. Find out what security and fraud-mitigation strategies institutions should be implementing.
Organizations often do not detect intrusions until after they've been compromised, says Rob Lee of SANS Institute. So how should they improve their incident-response posture? Lee offers three tips.
The United Kingdom's Serious Organised Crime Agency, which recently took down 36 websites selling stolen credit and debit card data, was hit May 3 by a distributed denial-of-service attack.
A month after Microsoft announced its initiative to take down Zeus-related botnets, has it had a major impact? Supporters of Operation B71 say "yes." But how can they be so sure?
The web-services protocol developed by the National Institute of Standards and Technology allows desktops, laptops, e-tablets and smartphones to access sensors that capture biometric data such as fingerprints, iris and face images.
What steps can financial institutions take now to control and enhance the security of mobile banking? Brian Pearce and Amy Johnson of Wells Fargo share some of their bank's strategies.
States worry as much about responding to the hazards presented by cybersecurity attacks as they do hurricanes, according to a new report issued by the Federal Emergency Management Agency.
The information security profession is a 'war for talent' today, says recruiter Kathy Lavinder. But to win the war requires specialized skill sets. Here are today's top requirements.
Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.