Account takeover is becoming more prevalent and difficult to combat as data breaches increase and phishing scams continue to evolve. In this white paper, NuData Security examines the recent trends relating to account takeover and makes recommendations in protecting against this financially destructive fraud.
This...
Special Publication 800-101 Revision 1 is aimed to help organizations develop procedures to deal with the explosion of mobile devices and to prepare specialists to conduct forensically sound examinations.
Scientists are discovering ways to make quantum key distribution a more cost-effective and efficient way to securely share encryption keys, but there's still a long way to go before the methods can be practically applied.
Even with the latest disclosures of the efforts the National Security Agency goes through to decrypt Internet communications, enterprises can take specific steps to protect their information from prying eyes.
The FDIC is urging banking institutions to pay more attention to vendor management in light of recent breaches, such as one that compromised core processor Fidelity National Information Services.
The NSA, in a highly classified program code-named Bullrun, used supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine encryption, according to a news report.
Mobile devices - smartphones and tablets - are powerful computers that are increasingly used for commerce and financial transactions. Consumers will spend $235 billion through mobile transactions, making mobile devices a very lucrative channel and the next frontier for cybercriminals to exploit. The threats against...
Citi's settlement with two states over a breach that exposed 360,000 cards will likely set an example for other states. One expert says banking institutions will likely pay more damages when accounts are compromised.
International markets that have implemented EMV technology are seeing reductions in card fraud, but non-EMV markets are seeing dramatic upticks, says U.K.-based card fraud expert Neira Jones.
Fraud is increasing across the board, but attributing losses to certain types of fraud continues to pose challenges for many banking institutions, says Doug Johnson of the American Bankers Association.
"We've made the investments in our shields, they must work" - this statement must have been decried by legions of ancient soldiers as this age-old defense decayed before their eyes and they were crushed on the battlefield. In fact, the graveyard is littered with 'proven' defense strategies which, given time, have...
Iris scanning is becoming old hat for authenticating individuals entering secured facilities or crossing international borders, but it remains several years away for use in providing access to IT systems.
Online file sharing technologies are pervasive, as mobility and collaboration continue to increase. This means unprecedented exodus of organization's data through consumer file sharing services. But hackers have also begun to use services such as Dropbox and Box to exfiltrate sensitive data, or even as command and...
Account takeover fraud is growing globally, and it's not just banks that are suffering, says analyst Julie Conroy. Here, Conroy explains why fraudsters continually have the upper hand.
Many banking institutions have done a poor job of addressing call-center fraud, says IDC analyst Jerry Silva, who offers tips on addressing the challenge of balancing customer service with security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.