With at least 20 billion new consumer devices set to be internet-connected by 2020, initiatives in the U.K. and California are trying to ensure that as many IoT devices as possible will be out-of-the-box secure, for starters by not shipping with default passwords.
Banks are working harder than ever to address the threats posed by money launderers, fraudsters and cyber attackers. Often, these three groups are one and the same.
Wouldn't it make sense for the teams in your bank facing these threats to work together more closely? We think the answer lies in an intelligence-led...
Heathrow, the U.K.'s largest airport, has been fined by the country's privacy watchdog for a series of data security missteps that led to a USB memory drive containing highly sensitive information being lost by an airport security trainer on a London city street, where it was found by a passerby.
There is greater awareness to the proliferation of mobile threats, and yet many organizations still underestimate their own vulnerabilities. Brian Duckering of Symantec discusses the rise and maturity of mobile threat defense.
There is greater awareness to the proliferation of mobile threats, and yet many organizations still underestimate their own vulnerabilities.
Mobile security should be taken just as seriously - if not more so - as traditional endpoints. Every employee behind a desktop computer also has at least one mobile device...
Businesses MUST address the proliferation of mobile devices in the workplace, whether authorized or not. For every laptop, there is a mobile phone, literally doubling the attack surface for hackers to breach your business and cause harm to you and/or your customers. While protection for traditional devices has long...
If you hold, share or have access to important information, you should assume your smartphone has already been hacked.
Unprotected smartphones could pose the greatest security risks to governments, enterprises and individuals. Consider what's at stake and prevent hackers from capitalizing on your...
Smartphones present a uniquely large attack surface that has been repeatedly exploited by threat actors, making it risky to trust these devices with important data. Inherent limitations in the mobile architectures of
these devices - especially in a world of chip-based attacks - mean that organizations must find new...
In Australia, it can take as few as 15 minutes to steal someone's phone number, a type of attack known as SIM hijacking. Such attacks are rising, but mobile operators have no plans to change the authentication required around number porting, which can be set in motion online with minimal personal information.
Over the past year, financial services organizations have seen an 87% increase in credential leakage, 149% increase in stolen credit cards, 151% increase in cyber-attack indications, and a 48% increase in fake social media accounts. In addition, state-sponsored APT groups with little to no financial motivation have...
The evolving industry regulations, such as adherence
to the FinCEN CDD final ruling and the 4th EU antimoney
laundering directive, have put additional
pressure on financial institutions when screening
new applicants and existing customers.
Download this report to learn more about:
Enhancing your KYC / CDD...
Has your financial institution recently been
through a regulatory audit or thematic review
where weaknesses were identified with your audit
processes? This is now an increasingly common
scenario for Chief Anti-Money Laundering Officers
(CAMLO), Bank Secrecy Act Officers (BSA Officers),
or other similar positions...
As the number and complexity of regulations increase, so does the cost
of compliance, with an increasing volume of alerts, more extensive
investigations, and greater scrutiny on compliance practices. Regulators
increasingly lean on institutions not only to justify the rationale behind
AML model changes, but also...
Air Canada is forcing 1.7 million mobile app account users to reset their passwords after it detected unusual login behavior that it says may have exposed 20,000 accounts, including passport information. But the company is enforcing password complexity rules that experts advise against.
It's déjà vu "FBI vs. Apple" all over again, as Reuters reports that the Justice Department is seeking to compel Facebook to build a backdoor into its Messenger app to help the FBI monitor an MS-13 suspect's voice communications.