Eight defendants have been charged in an alleged identity theft fraud scheme involving the theft of personal information from a call center for use in unauthorized wire transfers and to obtain payment cards.
Mobile devices - smartphones and tablets - are powerful computers that are increasingly used for commerce and financial transactions. Consumers will spend $235 billion through mobile transactions, making mobile devices a very lucrative channel and the next frontier for cybercriminals to exploit.
The threats against...
A new consortium is attempting to pave the way for wider use of more sophisticated forms of authentication, with a goal of reducing reliance on passwords. Will this effort to build standards succeed?
Mobile devices - smartphones and tablets - are powerful computers that are increasingly used for commerce and financial transactions. Consumers will spend $235 billion through mobile transactions, making mobile devices a very lucrative channel and the next frontier for cybercriminals to exploit. The threats against...
It's been two years since the FFIEC issued updated guidance for online-banking transactions. But how effective have banks' conformance strategies actually been at curbing fraud? Experts weigh in.
Mobile attacks are on the rise, and banking institutions need stronger authentication and better defenses against out-of-band compromises. But what else should banks be doing in 2013? Experts weigh in.
Protecting a customer's personal and financial information requires a fraud prevention solution that is customer friendly, cost-effective and able to provide protection across a bank's entire range of products and services.
Read the white paper and learn:
Why customer expectations regarding their online security...
A breach at a Texas credit union shows how fraudsters target financial institution employees to gain access to sensitive information. Why are institutions proving to be soft spots for compromise?
The bring-your-own-device phenomenon has swept global businesses, and the challenge only intensifies with every new wave of smart phones, tablets and portable storage devices. It's no longer a question of whether organizations will allow employees to use their own mobile devices. That's already happening. The real...
As the growth in mobile devices creates new opportunities for consumers and businesses alike, new threats are emerging. iovation's mobile fraud detection white paper will help you understand the evolving mobile landscape, the business and technical decisions that you may soon have to make regarding fraud risk and how...
Malware and Trojans are now spreading faster than ever, with Zeus deployed on millions of PCs and mobile devices capable of man-in-the-browser attacks. Learn to stop cybercriminals and their malware, before they can do damage, while letting your good customers breeze on through.
Aite Group, an independent...
The bring-your-own-device phenomenon has swept global businesses, and the challenge only intensifies with every new wave of smart phones, tablets and portable storage devices.
It's no longer a question of whether organizations will allow employees to use their own mobile devices. That's already happening.
The...
Have corporate account takeover incidents abated? Are banking institutions ready to conform to the FFIEC Authentication Guidance? These questions are posed by the Faces of Fraud Survey. Take the survey now.
Anomaly detection and behavioral monitoring are minimum requirements or mitigating online risks, and the newly-issued supplement to the FFIEC Authentication Guidance highlights why banks and credit unions should be doing more, says Terry Austin of Guardian Analytics.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.