Banking institutions have spent the last two years enhancing authentication to conform to regulatory mandates. Organizations in other sectors can learn important authentication lessons from the banking industry.
The Gozi Trojan variant known as Prinimalka is expected to target 30 banking institutions in spring 2013. Now McAfee researcher Ryan Sherstobitoff says new research sheds light on how to prepare.
Smart phones that give many IT security managers headaches in developing security policies are being used in increasing numbers to help safeguard systems and applications, thanks to more muscular biometric features, says Steve Vinsik of Unisys.
In this newest banking fraud scheme, fraudsters use the customer service chat feature within the online banking platform to schedule fraudulent wires. How can institutions detect and prevent this scam?
The evolution of threats and rise of mobility are leading organizations to improve user authentication. What are the new strategies and solutions security leaders in all sectors will employ this year?
Peer-to-peer, near-field communications and barcode scans are revolutionizing mobile payments. What unique risks do these emerging technologies pose to banking institutions? Two FDIC executives offer insights.
To mitigate the top threats for 2013, organizations need to understand the motivations of potential attackers so they can adequately defend their networks and systems. Experts describe risk management strategies for the year ahead.
The PATCO Construction fraud settlement still leaves open the question of what responsibilities commercial customers bear when a bank's security procedures are deemed commercially unreasonable.
Karen Scarfone, who coauthored NIST's encryption guidance, sort of figured out why many organizations don't encrypt sensitive data when they should. The reason: they do not believe they are required to do so.
As the recent PATCO case shows, fraud litigation is moving away from just establishing damages. The key legal question now is: What is reasonable security? Attorneys discuss the 2013 fraud legal landscape.
"While these two priorities - sharing and safeguarding - are often seen as mutually exclusive, in reality they are mutually reinforcing," President Obama says in the introduction to the strategy.
The arrest of 10 individuals allegedly tied to a global phishing scheme that exploited Facebook is good news. But experts say banking institutions need to push stronger security and authentication to protect accounts.
Eurograbber got banks' attention after compromising out-of-band authentication in Europe. But researchers say it's the knowledge of the hackers behind the attack, not the Trojan, that's most concerning.
Eurograbber is more than just another banking Trojan. It's an exploitation of fundamental online banking authentication practices that could strike any institution, says Check Point's Darrell Burkey.
Absent a uniform method, the NIST interagency report investigates credential revocation, focusing on identifying missing requirements, and suggests a model for credential reliability and revocation services that addresses those missing requirements.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.