We'll start the 2014 Fraud Summit Toronto with a detailed review of BankInfoSecurity's latest "Faces of Fraud" survey, focused on the Canadian market. Receive insights and expert analysis on such topics as:
How are the areas of retail, payment card, in person, insider and mobile fraud evolving?
Which aspects of...
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do fraudsters conduct these...
Fraud Ecosystem
In June this year the "Ronald Reagan" batch of credit cards (potentially those stolen from PF Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. Featured on the popular Rescator card shop (stolen card data marketplace), with advanced features like money...
Call center data and logs can help banks predict account-takeover attempts across multiple banking channels, says fraud expert Matt Anthony, a presenter at ISMG's upcoming Fraud Summits in Toronto and London.
Information Security Media Group recently hosted a Twitter chat on the latest fraud trends featuring analyst Avivah Litan, director of research at Gartner, Read the entire transcript of the #ISMGprotalk Twitter chat.
Internet hygiene is not up to par, say cybersecurity experts Tom Kellermann and Rod Rasmussen, who explain why bad hygiene has led to increased botnet traffic and malware infections.
A Tennessee utility has sued its bank after a $327,000 account takeover incident. This new case shows why institutions must go above and beyond when it comes to detecting and thwarting fraud losses.
No question, the information security community - and all of us at ISMG -- lost a friend with the untimely death of Terry Austin, CEO and President of Guardian Analytics.
A new impersonation scheme is taking aim at business executives to perpetuate ACH and wire fraud, says Bank of the West's David Pollino, who explains steps institutions should take now to protect their customers.
Choice Escrow is seeking a bench review of a recent appellate court ruling, which favored its former bank in an ACH fraud dispute. The firm argues the court set a bad precedent for future disputes by limiting Uniform Commercial Code protections.
One month after an international law enforcement effort targeted the Gameover Zeus banking Trojan, new versions of the malware are being distributed via spam campaigns.
Most organizations that enable users to perform Web transactions (e.g. banks and ecommerce sites) have implemented security controls to address online and mobile fraud. These controls fall into two buckets: transaction-focused intelligence, which looks for anomalous actions, and device-focused intelligence, which...
Remote Access Tools (RATs) allow an attacker to take control over a desktop and use it remotely, opening any application and operating the PC as if the fraudster was sitting next to it. Recently, RAT attacks have migrated from use in nation state and hacktivist operations to online banking fraud. Existing fraud...
Many banks are replacing traditional risk-based secret questions with out-of-band SMS authentication. Beyond the enhanced (perceived) security that comes with out-of-band authentication the major driver for adoption of these technologies is regulation (i.e. FFIEC Guidelines). However, with security and compliance...
Consumers see the advantage of accessing banking capabilities from their mobile device. However, today's mobile devices lack security to stay ahead of the evolving mobile threat landscape. Cyber criminals will continue to target the mobile channel with sophisticated attack techniques and new emerging techniques in the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.