The FFIEC warns U.S. financial institutions that they're at increased risk from attacks that are designed to harvest large amounts of credentials, as well as from destructive "wiper" malware attacks.
Sophisticated cybercrimes and advanced persistent threats are occurring at an alarming rate. Aided by new attack techniques, increased financial support and the ease of exploiting social connections, attackers are having more success than ever before. Traditional security solutions are no longer sufficient to defend...
Recent months have seen significant innovation by cybercriminals in performing banking fraud. A combination of new tools and tactics have challenged traditional fraud controls.
In this live webinar we will review some of the latest threats and how they can best be mitigated:
Use of RATs (Remote Access Trojans)...
Learn how threats like malware and various social engineering techniques are used to commit fraud and create data breaches in the financial services market. You will also gain an understanding of the differences between passive and active defenses and how to select and deploy an active defense - all to stop the bad...
"More than one in four unsolicited SMS messages reported in 2014 attempted to steal the victim's personal or financial information" reported Cloudmark in their Annual Security Threat Report. Vishing (voice/phone scams) along with SMiShing (text message scams) continue to rise as fraudsters exploit the trust inherent...
The use of smartphones, tablets, and other mobile devices to sign up for new accounts or conduct other banking transactions has grown rapidly in the financial services market. Today over fifty percent of common banking transactions are completed using mobile apps. Unfortunately, crime associated with their use has...
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage...
Mobile banking continues to gain momentum, growing faster than any other delivery channel to date. Many financial institutions want to expand capabilities in the mobile channel, but are concerned about security. Given the evolving threats, mobile innovation has outpaced the industry's appetite for deploying new...
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals' continued success is...
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today's virtual world, the
scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online...
With the rise of mobile usage and increased mobile banking functionality, cybercriminals are targeting the mobile channel with advanced malware, cross channel attacks across online and mobile and social engineering that have typically been seen on the PC.
Read this white paper to learn more about the emerging...
Cybercriminals rely upon increasingly sophisticated techniques to steal the credentials of online banking customers, and then reuse them to take over the victim's account and perform fraudulent transactions such as transferring money to new destinations. IBM Security Trusteer solutions offer multiple layers of...
ID fraud reported by U.S. consumers dropped 3 percent in 2014 - the first decline since 2010, according to Javelin. But analyst Al Pascual says the decrease should have been much greater.
Most fraud involves the use of false or anonymous identities. Banks are fighting back with tools and solutions designed to verify identity or at least raise red flags before fraud occurs. Neustar sponsored a survey with American Banker of over 230 top senior financial executives, within fraud mitigation and risk...
It only takes one stolen laptop, one employee's USB stick, one hacker, one virus, or one careless error to compromise your company's reputation and revenue. The threat of data breach is real and it's critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.