Layered security is one of the core tenets of the new FFIEC Authentication Guidance - and it's perhaps the most effective strategy for detecting and preventing banking fraud schemes. But what are some of today's most mature approaches to layered security, and how are banking institutions employing them to detect and...
A California judge handed down a 12-year prison sentence to a phisher who stole financial details from more than 38,000 online accountholders. Observers say the sentence signals a changing attitude about the severity of cybercrimes.
The fight against cyberattacks is a top priority for financial institutions, and industry insiders are optimistic about President Obama's plan to thwart cyberattacks that lead to corporate account takeover and other forms of fraud.
Between March 2010 and April 2011, 20 incidents of wire fraud hit small and mid-sized U.S. businesses. All of the transactions involved payments routed to Chinese economic and trade companies located near the Russian border.
EastNets' Paul Buelens says fraud-fighting is an international concern, as old schemes abound and new threats emerge. Fraud risks are some of the most challenging banks have ever faced.
"More and more consumers are using PIN debit at the pumps, so this makes for a rich harvest for the criminals," says John Buzzard of FICO's Card Alert Service.
"Today's risk management professionals really need to take a strategic view of managing risk to be relevant in achieving the organization's expected outcome," says Philip Alexander of Wells Fargo Bank.
Speculation about the pending update to online authentication guidance has been circulating around water coolers for months now. "A [disclosure] like this could make it more challenging for the regulators," says attorney David Navetta.
2011 is the 20th anniversary of the RSA Conference, and the theme is "Giants Among Us," celebrating the luminaries who founded information security.
Here at ISMG, we've been around for about one-quarter of RSA's annual events, and we easily could declare 2011's theme as "Giant Challenges to Tackle." From the...
When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.
"Many institutions only know about fraud when they get notified by the customer, and that is not indicative of an industry that is really trying to address the problem." George Tubin, TowerGroup
How should the United States respond as global competitors expand their influence over the Internet and build cyber capabilities? An analysis of the Internet in 2020 shows that the United States must develop a strategy that focuses on more than technology to retain its cyberpower status. Read this white paper and...
The Avalanche crime group, the world's most prolific phishing gang, has moved from using conventional phishing to solely propagating Zeus, the most famous and stealthy password-stealing malware, say security researchers in a new report.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.