Another organized cyber-attack and subsequent cash-out scheme illustrates increasing risks to the U.S. payments chain. One fraud expert says this trend "is of grave concern" for banking institutions and their accountholders.
Financial fraud expert Joe Rogalski explains why card issuers are ultimately responsible for losses linked to ATM cash-out schemes, like the $45 million worldwide cyberheist that made headlines last month.
A recent ATM cash-out scheme that netted $45 million puts a spotlight on the need for preventive measures, says John Buzzard of FICO's Card Alert Service. He offers several fraud mitigation tips.
When it comes to mobile banking and payments, security risks are similar globally. But Western institutions can learn from innovative solutions now offered in the East, says fraud expert Tom Wills.
How could global fraudsters steal $45 million from banking institutions without being detected or stopped? It was a process breakdown, not a technology failure, says fraud expert Avivah Litan of Gartner.
It isn't just a financial services issue. Organizations of all types are victimized by data security breaches and fraud schemes that compromise payment card data. What can be done to help ensure better security and PCI compliance?
When President Obama comes face to face with China's President Xi Jinping, don't expect the American commander in chief to present an ultimatum over Chinese cybersecurity assaults on critical U.S. IT systems.
Attacks aimed at mobile devices are progressing much more rapidly than any attacks ever waged against PCs. Organizations are in danger if they don't pay attention, says anti-phishing expert Dave Jevans.
One banking association is lobbying to have merchants held more accountable for attacks against their networks and systems that breach card data. But will their efforts convince Congress?
Gary Warner, a computer forensics researcher at the University of Alabama at Birmingham, says malware aimed at POS systems isn't likely to affect ATMs. But others say the threat to ATMs is viable.
In this exclusive interview, Tim Horton of First Data explains how the nation's largest credit card processor is helping financial institutions and merchants mitigate risks posed by malware and DDoS attacks.
Providers of technologies employees acquire through unconventional channels that could bypass their employers' supply-chain controls are known as "shadow suppliers." Here's why you should care about them.
In the aftermath of an international $45 million cyberheist and ATM cash-out scheme, experts say pinpointing the source of such a massive breach can be difficult. Why?
Malware attacks against retailers are becoming more common. Many breaches linked to these attacks could be prevented, experts say, if merchants took more steps to lock down networks and point-of-sale devices.
Why are ATM cash-out schemes expected to increase - especially in the U.S.? John Buzzard of FICO's Card Alert Service offers insights, based on federal investigators' most recent global fraud bust.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.