Account takeover techniques are getting more sophisticated; new "account checkers" are helping hackers automate their processes. The trend is just one more reason why we need advanced forms of authentication.
Because mobile payments are so new, banking institutions worldwide are still trying to understand which threats to address first, says payments fraud expert Neira Jones.
A year after LinkedIn confirmed its network had been breached, reportedly exposing 6.5 million hashed passwords, the social media company is offering users the option of adopting two-factor authentication.
Attacks aimed at mobile devices are progressing much more rapidly than any attacks ever waged against PCs. Organizations are in danger if they don't pay attention, says anti-phishing expert Dave Jevans.
At the outset of the BYOD trend, mobile security was about protecting devices. Today, mature organizations are focused more on protecting data and ensuring proper identity and access management.
In this exclusive session, a sequel to Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices, Malcolm...
A 143-point drop in the Dow Jones Industrial Average proves the power of social media and the havoc it can cause when an account gets hacked. It's time for social media companies to tighten the authentication process.
Call center fraud is becoming a bigger problem for banks and credit unions, and one new scheme identified by a community bank in Georgia illustrates how scams are getting more difficult to detect.
Authenticating appropriate network administrators and employees has become increasingly challenging, especially for healthcare organizations and regional banking institutions, says Tim Ager of Celestix.
In notifying customers of a breach, the online archiving service Evernote might have confused some customers by sending them an e-mail that contained a clickable link to be used to reset passwords - despite warning against using such links.
The growth in cloud computing and mobility is creating a need for a streamlined, centralized process for managing user authentication, says Sarah Fender of PhoneFactor.
Security leaders know their old perimeter-based security models are insufficient. But what new model is best? And how can it reduce reliance on passwords for authentication? Julian Lovelock of HID Global offers insight.
Call center fraud is increasing, and it's not just financial institutions feeling the pain, says Pindrop Security's Matt Anthony. Now, a database of phone numbers aims to help organizations mitigate risks.
Banking institutions have spent the last two years enhancing authentication to conform to regulatory mandates. Organizations in other sectors can learn important authentication lessons from the banking industry.
The Gozi Trojan variant known as Prinimalka is expected to target 30 banking institutions in spring 2013. Now McAfee researcher Ryan Sherstobitoff says new research sheds light on how to prepare.
In this newest banking fraud scheme, fraudsters use the customer service chat feature within the online banking platform to schedule fraudulent wires. How can institutions detect and prevent this scam?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.