Recent high-profile security breaches have shown how cyber criminals are actively exploiting expanded network perimeters and weak authentication implementations to drive successful account takeovers and fraud across financial services. The New York Department of Financial Services Report on the 2020 Twitter hack...
The ongoing lockdown may be complicating the path of Cupid's arrows. But as another Valentine's Day rolls around, authorities are warning that romance scammers - and other types of fraudsters - are alive and well and have been increasingly preying on unsuspecting victims around the world.
Bad bots are on every website with a login page. Even yours. Hackers and fraudsters use bots to validate sets of login credentials, gain access to credit card data, and sell personally identifiable information on the dark web They also use stolen account data to transfer money, purchase goods, or spread a specific...
SpyCloud has fresh research into account takeover trends and finds that attacks have recently spiked by 300%. Chip Witt explains the trends behind the stats and offers insight into what enterprises often are overlooking in their ATO prevention strategies.
The mobile channel saw great user adoption in 2020 - and it saw a corresponding increase in fraud incidents. Tim Dalgleish of BioCatch discusses mobile fraud trends and the role of behavioral biometrics in enhancing user authentication.
Brand impersonation – it isn’t just a marketing or reputational issue. It’s an InfoSec problem, says Shashi Prakash, CTO and co-founder of Bolster. He describes the growing problem and why security is best positioned to lead detection and response.
In this interview with Information Security Media Group,...
Why Start With Identity?
As more government organizations move their citizen services to mobile and cloud-based platforms, ensuring the validity of those benefits claims is more important than ever. Many are adopting an identity centric security model as a framework for prevention of risk and fraud.
IBM Trusteer reports that a hacking group is using mobile emulators to spoof banking customers' mobile devices and steal millions of dollars from banks in the U.S. and Europe.
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join us as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious...
Mitigation of identity fraud requires a combination of technologies that complement one another and are easy to manage. Adding a new solution requires looking beyond fraud management to the customer experience, including all stages of the customer lifecycle. It is critical to have safe and secure customer onboarding,...
Digital banking has become the single most effective channel for financial institutions to drive growth, increase revenue and attract new customers. Yet, it also introduces more risk, and cybercriminals are following the money right into the online account opening process.
Today, a staggering 85% of financial...
A Florida man has been sentenced to 37 months in prison after pleading guilty to a federal laundering money charge stemming from a $9 million business account takeover scheme, according to the Justice Department.
Watch this video featuring Analyst Amy DeMartine, VP Research Director at Forrester, along with Ido Safruti, CTO at PerimeterX, as they share their perspectives on the critical capabilities needed in a bot management solution to combat ATO.
Although the global financial industry has made strides in protecting its data from malware, including Trojans, cyberthreats such as network intrusion, ransomware and criminal gang cooperation are presenting fresh challenges, according to the Carnegie Endowment for International Peace.
In this report, Aite describes the current market environment of contact center fraud in financial institution contact centers, fraud activity in interactive voice response (IVR), and financial institution's technology investment plans to combat such fraud.
You will learn how FI's protect contact centers, where...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.