In Australia, it can take as few as 15 minutes to steal someone's phone number, a type of attack known as SIM hijacking. Such attacks are rising, but mobile operators have no plans to change the authentication required around number porting, which can be set in motion online with minimal personal information.
The appropriate use of predictive analytics, going beyond a "set it and forget it" approach, could dramatically improve breach detection, says Teresa Grogan, CIO of the consultancy VertitechIT .
The solution providers in the fraud solution industry offer logic
designed to track users and prevent malicious activity by
capturing and analyzing behavioral characteristics across
the entire session, from login to check out and everything in
between. These solutions compare known customer behavior
in the case...
What are the biggest privacy and security concerns in healthcare when it comes to the use of big data and data analytics tools? Attorneys Elizabeth Mann and Brad Peterson explain what organizations need to know before they dig in.
Companies offering cybersecurity products are using the terms "artificial intelligence" and "machine learning" in many different ways. But the real meanings of the terms are far more nuanced than marketing hyperbole would lead us to believe, says Grant Wernick of Insight Engines.
An unusual breach notification issued by health insurer Humana shows how some organizations are identifying anomalous behaviors of voice technology users to detect potential fraud.
One of the leading mobile-based financial services targeted at millennials approached Simility to help fight fraud. Simility provided an end-to-end solution which included customized models for their specific needs.
Fraudsters were using the company's customer accounts to funnel money via stolen identities. But...
For over a decade, a crucial part of fraud detection has been assigning an identity to every laptop, tablet, and mobile device that accesses a website or app. Such a fingerprint is a representation of hundreds of different device-specific values taken from an end user's device.
Today's device fingerprinting...
Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
As account opening continues to transition from physical to digital channels, financial institutions and other organizations must optimize the digital experience of applicants in order to compete. At the same time, fraud is on the rise thanks to some of the same digital channel benefits enjoyed by consumers:...
How can we future-proof against fraud? Keith Carlson, general manager of payments and fraud prevention at Amazon Web Services, discusses the people, skills and technologies necessary to prevent fraud - and prepare for the unexpected.
Armed with stolen personal data, cybercriminals can easily bypass conventional identity authentication methods. So how can organizations strengthen authentication without harming customer experience? Shaked Vax of IBM Security shares insights.
Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
Fraud losses have reached staggering amounts - an estimated $20 billion last year. Moreover, this very lucrative crime is here to stay. How can businesses bounce back after being victimized? Sadly, many cannot. This makes prevention, identification and isolation imperative to business operations. This session focuses...
Fraudsters are increasingly enhancing their schemes to make detection by traditional fraud models more difficult, and these shifting fraud patterns ultimately result in institutions continuously having to allocate additional resources. Furthermore, Fraud operations and investigations are faced with a constant flux in...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.