Since the summer of 2009, financial institutions and their corporate customers have been defrauded by increased incidents of account takeover. These incidents have pitted banks and customers against one another in court, and they were a key impetus behind the release of the new FFIEC Authentication Guidance. So, how...
Fraud is winning in the fight against cybercrime. Why? Because financial institutions continue to rely on ineffective technology and controls, says fraud analyst Tom Wills says.
Layered security is one of the core tenets of the new FFIEC Authentication Guidance - and it's perhaps the most effective strategy for detecting and preventing banking fraud schemes. But what are some of today's most mature approaches to layered security, and how are banking institutions employing them to detect and...
Today, financial institutions offering internet-based and mobile-banking services face increasing pressure to provide enhanced consumer protection against phishing, sophisticated malware and other fraudulent activities. The FFIEC's guidance for financial institutions took a strong stance in support of the deployment...
Anomaly detection and behavioral monitoring are minimum requirements or mitigating online risks, and the newly-issued supplement to the FFIEC Authentication Guidance highlights why banks and credit unions should be doing more, says Terry Austin of Guardian Analytics.
Now that the FFIEC's updated online authentication guidance is out, banking institutions need to move forward in preparation for 2012 compliance, says Julie McNelley, banking fraud analyst for Aite Group.
RSA customers who feel victimized by last March's breach of the security vendor's computers have viable options that include continued use of the SecurID authentication tokens, those offered by competitors, or something entirely different: biometrics.
For many, the lack of security on mobile devices is a major inhibitor to their adoption of mobile banking. As banks look to address these issues and capitalize on the opportunities of the mobile environment, they are also challenged by the need to bolster customer confidence in online banking. With Entrust's...
This TowerGroup Research Note addresses the growing issue of targeted attacks by
cybercriminals on business banking customers. As the sophistication of cybercriminal organizations has developed, they have begun attacking businesses with techniques such as phishing and "man in the middle" Trojan horses, techniques...
The proliferation of mobile devices and mobile services engenders both threats and opportunities in the financial services market. Because they recognize the opportunity to find vulnerabilities in this nascent technology, cybercriminals are turning their focus to the mobile channel to launch new attacks. Yet, both...
When it comes to hot topics, they don't get hotter than authentication, cloud computing and IT governance - all of which I've discussed at length in recent interviews with industry thought-leaders. Let's review some highlights from these conversations.
The non-standardized collection device is responsible for 13 percent of the biometric records maintained by DOD, representing some 630,000 DoD records that cannot be searched automatically against FBI's database of about 94 million records.
The latest Verizon Data Breach Investigations Report is out, and the good news is: The number of compromised records is down. The troubling news is: The number of breaches is up. Bryan Sartin, one of the report authors, explains why.
The explosion in task-specific applications for mobile devices has gone
hand-in-hand with the growth in cell phones and other computing
tablets. Financial institutions are no exception to the pressure to extend their
services to the mobile channel.
In this whitepaper, readers will learn about:
The...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.