A House committee is seeking answers from the Federal Reserve Bank of New York about the $81 million theft from the central bank of Bangladesh and its implications for U.S. financial services firms.
Hackers reportedly stole $250,000 from Bangladesh's Sonali Bank in 2013, in what's now the fourth case involving malware attacks and injecting fraudulent money-transfer requests into the SWIFT interbank messaging network.
Officials in several nations are probing the security of the SWIFT interbank messaging system in the wake of recent hacker attacks. Can the bank-owned cooperative better police members, secure access to its network as well as spot emerging hack attacks and fraud?
Another series of SWIFT-enabled hack attacks against a bank has come to light, following the theft of $81 million from the central bank of Bangladesh and SWIFT warning that other banks are also being targeted.
Banks and regulators have begun reviewing SWIFT-related information security practices and requirements following the online heist of $81 million from Bangladesh Bank. Authorities say much of that money is still missing.
Amidst finger-pointing over responsibility for the $81 million online theft from Bangladesh Bank, SWIFT has issued its first-ever information security guidance to banks, telling them that they're responsible for securing their own systems.
The online heist of $81 million from Bangladesh Bank involved custom malware that hacked the database used by the bank's SWIFT software, allowing attackers to transfer money and hide their tracks, according to BAE Systems Applied Intelligence. SWIFT will issue software updates and security guidance to all customers.
The massive "Panama Papers" data leak apparently was enabled by a law firm failing to have the right information security defenses in place. The breach calls attention to the need for all organizations to encrypt sensitive data, use access controls as well as monitor access patterns for signs of data exfiltration.
If you cast the Panama Papers leak in terms of class warfare, this isn't the first time that a faceless few have acted for what they perceive to be the good of the proletariat, in a bout of hacker - or insider - vigilantism.
Financial crime control is a chief priority for most financial institutions around the world, as they continuously evaluate the best ways to safeguard their systems, their data and, ultimately, their clients. Indeed, fraud and cyber security are on the formal management committee agendas at least quarterly for 80...
Growing worries about the use of the U.S. financial system to launder funds for terrorists has spurred proposals for new state and federal regulations aimed at tightening money-laundering controls. Attorney Lauren Resnick explains steps banks are taking to help detect suspicious activity.
Synthetic identity fraud is more pervasive than most people are aware. Synthetic identities are used to obtain financial services, medical benefits, insurance and rental housing, among other things. Additionally, organized crime and terrorist groups are realizing the benefits that the anonymity of synthetic identities...
After nearly a generation of prodding, not a week goes by without the continued assertion that banks have failed to respond to digital-savvy customers demanding anytime, anyplace, anywhere services through digital and mobile channels. But how can banks respond to the digitized offerings from "born in the cloud"...
Financial crimes are growing in frequency and complexity with advances in technology providing malicious insiders and organized criminals more opportunity to commit crimes. Furthermore, the drumbeat to remain compliant continues. New regulatory guidelines continue to arise with increased scrutiny and complexity, so...
The use of Bitcoin poses big cybersecurity and money-laundering concerns for banks. But the transaction infrastructure used by cryptocurrencies offers many features that banks should put to use, says former FBI Special Agent Vince D'Agostino.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.