Open source software is a game-changer in helping development organizations herd their application security risks. But it can also introduce risk when employed without adequate precautions. Recent evidence suggests that the presence of application vulnerabilities in open source software is a far more pervasive...
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the banking industry's greatest wire fraud worries. These schemes threaten to overshadow what the industry previously saw from commercial account takeover incidents.
In...
As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobile payments? Receive insights...
As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
Mobile banking security requires the combination of a secure application, running on a secure platform, over a secure communication channel, and then being able to gather and analyze data to make real-time, risk-based decisions that can protect against account takeover and prevent fraud.
In this paper, you'll learn...
Most financial institutions used to allow customers to log in to their accounts with a simple username and password. But passwords are notoriously insecure - many users choose weak passwords that can be easily guessed or cracked. In an effort to help strengthen security, large numbers of banks began using a second...
Attitudes about cyberthreat information sharing, as well as attack attribution, have dramatically changed in the last 18 months, says the FS-ISAC's Bill Nelson, a featured speaker at RSA Conference 2015.
Are you confident that only the right people are getting access to your sensitive business assets? Organizations have to be concerned about privileged insiders compromising security and about outsiders posing as authorized users but who really aren't. Putting effective defenses into place, as a result, requires...
Sophisticated cybercrimes and advanced persistent threats are occurring at an alarming rate. Aided by new attack techniques, increased financial support and the ease of exploiting social connections, attackers are having more success than ever before. Traditional security solutions are no longer sufficient to defend...
Recent months have seen significant innovation by cybercriminals in performing banking fraud. A combination of new tools and tactics have challenged traditional fraud controls.
In this live webinar we will review some of the latest threats and how they can best be mitigated:
Use of RATs (Remote Access Trojans)...
Learn how threats like malware and various social engineering techniques are used to commit fraud and create data breaches in the financial services market. You will also gain an understanding of the differences between passive and active defenses and how to select and deploy an active defense - all to stop the bad...
"More than one in four unsolicited SMS messages reported in 2014 attempted to steal the victim's personal or financial information" reported Cloudmark in their Annual Security Threat Report. Vishing (voice/phone scams) along with SMiShing (text message scams) continue to rise as fraudsters exploit the trust inherent...
The use of smartphones, tablets, and other mobile devices to sign up for new accounts or conduct other banking transactions has grown rapidly in the financial services market. Today over fifty percent of common banking transactions are completed using mobile apps. Unfortunately, crime associated with their use has...
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage...
Mobile banking continues to gain momentum, growing faster than any other delivery channel to date. Many financial institutions want to expand capabilities in the mobile channel, but are concerned about security. Given the evolving threats, mobile innovation has outpaced the industry's appetite for deploying new...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.