Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals' continued success is...
Card fraud, account takeovers, business email compromises and emerging cybersecurity regulations and risks have kept, and continue to keep, plenty of CEOs and CISOs up at night. While it's impossible to focus time, energy and resources on all of today's fraud and cybersecurity risks, wise banking executives have...
With the barrage of connected devices, new technologies like cloud computing, and a continuous wave of sophisticated threats, managing security is becoming increasingly complex - security needs to adjust to new operational realities.
Organizations that possess consolidated security simplify complex environments,...
Historically, innovation within the financial services industry has moved at a glacial pace. A combination of factors limited institutions such as compliance obligations, dependence on complicated infrastructure, and a riskaverse approach to security. An environment was created where innovation was perceived as risky...
Digital transformation offers financial institutions the
potential to reinvent themselves and meet
heightened customer expectations. Those that
embrace digitization as not simply a defensive
strategy against bank and non-bank competitors,
but as a way to increase revenue through improved
consumer insights and...
Twitter has issued its first-ever alerts to some users that they may have been "targeted by state-sponsored actors." Some cryptographers, software developers and security experts say they have received the alerts.
Most businesses use the cloud for at least some applications - collaboration, email, backups and disaster recovery. And many more plan to in the next 12 months. According to "Orchestrating Security in the Cloud," a SANS survey, 40 percent of businesses store or process sensitive data in the cloud. But is it safe from...
Fraudsters are increasingly using global brands, including Apple, to fool consumers into providing personal and financial information that can be used to compromise financial accounts. Experts offer insights on the latest trends and how to respond.
Distributed-denial-of-service attacks on banks are more powerful than ever, but we hear less about them than we did three years ago. How have attackers changed their tactics, and why should we be even more concerned about their strikes?
Much of the currently used statistical-based fraud detection methodology is creating significant challenges for both organizations and end users. These statistical models generate high false positive rates and provide a risk score that does not effectively distinguish between legitimate and malicious activity.
With...
Today's cybercriminals are aware of the fraud prevention technologies deployed by most financial institutions, and they design attacks to circumvent these controls. Transaction anomaly detection and device ID approaches can be highly inaccurate, generating a large number of false positive alerts that can overwhelm IT...
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
In this session, we will explore...
Using Big Data Analytics to discover, track and prevent fraud is becoming an important tool in the security arsenal. For instance, experts predict that mobile banking will soon be the dominant banking and payments channel -- offering another avenue for fraud. As the identity and fraud threat landscape evolves,...
As recent incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking institutions. How does the impact of these crimes compare to that of account takeover, check fraud, insider crimes and the emerging realms of virtual and mobile payments? Receive insights...
The landscape of corporate and retail payments across channels such as mobile and online, and including emerging products such as Apple Pay provide both customer convenience and satisfaction. Yet, these new channels and technologies also create opportunities for fraudsters to exploit. In this session we'll present...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.