In the wake of the arrests of 11 hackers tied to the TJX data breach, security experts everywhere are warning of bigger, bolder threats to come.
So, what should banking institutions have learned from TJX-style breaches, and what can they do now to protect their customers and critical financial/informational...
To me, it was a given.
In the wake of recent news of IndyMac and other bank failures, it seemed safe to say that U.S. banking institutions were dealing with a bit of a crisis of confidence. I mean, I didn't imagine that line of anxious customers outside IndyMac, did I?
But then I got a recent note from a...
A former Countrywide Financial Corp. employee was arrested by the Federal Bureau of Investigation earlier this month in Los Angeles for stealing and selling sensitive personal information, including social security numbers on an estimated 2 million mortgage loan applicants from around the country for the last two...
Interview with Cyber Crime Expert Eric Fiterman
In the wake of the arrests of 11 hackers tied to the TJX data breach, security experts everywhere are warning of bigger, bolder threats to come.
So, what should banking institutions have learned from TJX-style breaches, and what can they do now to protect their...
As part of the Nov. 1 Identity Theft Red Flags Rule compliance deadline, financial institutions must step up efforts to train employees and customers alike to be more cognizant of Identity Theft and its symptoms.
The idea behind the education is simple: Increasing security awareness prevents the crime from happening....
Following is a list of the 26 red flags identified for financial institutions in the interagency Identity Theft Red Flags Rule. Institutions must comply with this rule by Nov. 1.
So, if last week's indictment of 11 hackers by the U.S. Department of Justice and the U.S. Attorney General's office was just the "tip of the iceberg" in terms of information security threats to financial institutions and merchants, then what's below the surface?
More breaches, say industry and security experts,...
With fewer than three months to go before the ID Theft Red Flags Rule compliance deadline, banking regulatory agencies this week are starting to unveil their new examination procedures.
The Office of Thrift Supervision (OTS) is the first agency to announce its exam procedures, presenting them today (Aug. 11) in a 2...
For financial institutions, data security is both an operational and regulatory imperative. A bank or financial services provider that fails to protect a customer's financial data faces the threat of losing customers, tarnishing their reputation and eventually losing competitive advantage.
Register for this...
This week's arrest of 11 alleged hackers accused of stealing more than 40 million credit and debit card numbers may be only the "tip of the iceberg," security experts say.
In the largest identity theft case ever prosecuted by the US Department of Justice, 11 alleged hackers from around the globe face up to life in...
Identity theft red flags, business continuity planning, vendor management - these topics all have received fresh attention from the regulatory agencies this year. And with more to come before year's end.
So, as a way to both reflect and project, we take a look at the Top 6 Regulatory Issues of 2008 - and identify...
In a month of bad news for banking (see recent stories about IndyMac Bank and other failures), our recent series of articles and insights on Gramm-Leach-Bliley Act (GLBA) compliance delivers a reassuring message: Banking institutions are making progress in safeguarding customer information.
A "progressive learning...
The recent release of a University of Michigan study on the security flaws of online banking websites brings attention to the often overlooked area of web application security.
In this exclusive interview, Jeremiah Grossman of WhiteHat Security shares his insights on the importance of web application security for...
More than 75 percent of bank webites in a recent survey have at least one design flaw that could make customers vulnerable to cyber thieves.
This according to a new University of Michigan study of online banking.
These design flaws stem from the flow and the layout of the websites, according to the study. Led...
It could be the draft of an important document that sits on the desktop of an employee's computer, or it could be the excel spreadsheet with sensitive information that an employee took home to work on, then copied onto their home PC. Documents such as these are hiding out in a financial institution as "unstructured...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.