Security experts are advising Google users to change their passwords in the wake of almost 5 million usernames and passwords surfacing on Russian cybercrime forums. But some of the stolen data may be several years old.
We'll start the 2014 Fraud Summit Toronto with a detailed review of BankInfoSecurity's latest "Faces of Fraud" survey, focused on the Canadian market. Receive insights and expert analysis on such topics as:
How are the areas of retail, payment card, in person, insider and mobile fraud evolving?
Which aspects of...
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do fraudsters conduct these...
Fraud Ecosystem
In June this year the "Ronald Reagan" batch of credit cards (potentially those stolen from PF Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. Featured on the popular Rescator card shop (stolen card data marketplace), with advanced features like money...
Information Security Media Group recently hosted a Twitter chat on the latest fraud trends featuring analyst Avivah Litan, director of research at Gartner, Read the entire transcript of the #ISMGprotalk Twitter chat.
No question, the information security community - and all of us at ISMG -- lost a friend with the untimely death of Terry Austin, CEO and President of Guardian Analytics.
A new impersonation scheme is taking aim at business executives to perpetuate ACH and wire fraud, says Bank of the West's David Pollino, who explains steps institutions should take now to protect their customers.
The use of smartphones, tablets, and other mobile devices to conduct online transactions has rapidly grown into a standard practice. A large percentage of these now-common mobile transactions are completed using mobile apps. Unfortunately, crime associated with their use has increased correspondingly, resulting in a...
In 2011, the FFIEC issued guidance requiring financial institutions to beef up their online authentication and fraud prevention efforts. Yet today, account takeover is more rampant than ever. Professional cybercrime crews easily circumvent common anti-fraud measures to steal millions from banks and credit...
If ever we could say banking institutions are mad as hell and not going to take it anymore ...
In the wake of the Target, Neiman Marcus and other retail breaches, banking/security leaders clearly feel abused and frustrated - and they want to see changes in how merchants conduct and process secure payments. This is...
One month after an international law enforcement effort targeted the Gameover Zeus banking Trojan, new versions of the malware are being distributed via spam campaigns.
Most organizations that enable users to perform Web transactions (e.g. banks and ecommerce sites) have implemented security controls to address online and mobile fraud. These controls fall into two buckets: transaction-focused intelligence, which looks for anomalous actions, and device-focused intelligence, which...
Remote Access Tools (RATs) allow an attacker to take control over a desktop and use it remotely, opening any application and operating the PC as if the fraudster was sitting next to it. Recently, RAT attacks have migrated from use in nation state and hacktivist operations to online banking fraud. Existing fraud...
Many banks are replacing traditional risk-based secret questions with out-of-band SMS authentication. Beyond the enhanced (perceived) security that comes with out-of-band authentication the major driver for adoption of these technologies is regulation (i.e. FFIEC Guidelines). However, with security and compliance...
Mobile banking continues to gain momentum, growing faster than any other delivery channel to date. Many financial institutions want to expand capabilities in the mobile channel, but are concerned about security. Given the evolving threats, mobile innovation has outpaced the industry's appetite for deploying new...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.