As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobile payments? Receive insights...
Amy McHugh, a former FDIC IT examination analyst, says banking regulators will soon scrutinize C-level executives and boards of directors to gauge their cybersecurity awareness in the wake of the FFIEC's pilot cyber-risk assessment program.
This white paper is based on data collected in two separate research efforts. In the first, Aite Group surveyed fraud executives at 36 large U.S. merchants from March to May 2014 to understand points of pain and planned solutions. Aite Group also interviewed card executives from payment networks and 18 of the top 40...
Today's flood of digital data-flowing from hundreds of millions of devices and contained in billions of online transmissions and transactions-often presents organizations with more raw information than they are able to absorb.
Even more worrisome, this data deluge provides cyber criminals with a means to hide...
As part of their breach response strategies, organizations need to establish clear guidelines in advance so they know when it's appropriate to offer victims free credit monitoring or ID theft protection services.
Online banking provides great conveniences to end users and its usage is increasing daily. Fraudsters are constantly developing new attacks for this service, so the security of this sensitive information it provides access to is constantly being put to the test. Brazil is often the testing ground for new fraudster...
Part 1 - Fraud Ecosystem
In June this year, the "Ronald Reagan" batch of credit cards (potentially those stolen from P.F. Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. These cards were featured on the popular Rescator card shop (stolen card data marketplace), which...
Part 1 - Voice Biometrics in the Call Center
See how the detailed analysis of millions of voice-based transactions has produced a "signal in the noise." From large-scale analysis, clear patterns emerge of how stolen payment card information is actually qualified, updated and adapted for monetization. This process...
Payment card fraud remains a top challenge for financial institutions. The latest wrinkle: Breached retailers such as Target and Home Depot, whose compromises led to wholesale card fraud. Card issuers absorb increasing losses linked to debit and credit fraud, yet they have little control over the third-party points of...
This session provides a detailed review of BankInfoSecurity's "Faces of Fraud" survey focused on the European market. Receive insights and expert analysis on topics such as:
How are the areas of retail, payment card, in person, insider and mobile fraud evolving?
Which aspects of the new Canadian legislation are...
Session Preview:
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do...
Security experts are advising Google users to change their passwords in the wake of almost 5 million usernames and passwords surfacing on Russian cybercrime forums. But some of the stolen data may be several years old.
We'll start the 2014 Fraud Summit Toronto with a detailed review of BankInfoSecurity's latest "Faces of Fraud" survey, focused on the Canadian market. Receive insights and expert analysis on such topics as:
How are the areas of retail, payment card, in person, insider and mobile fraud evolving?
Which aspects of...
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do fraudsters conduct these...
Fraud Ecosystem
In June this year the "Ronald Reagan" batch of credit cards (potentially those stolen from PF Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. Featured on the popular Rescator card shop (stolen card data marketplace), with advanced features like money...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.