Credit and debit card fraud: It's the threat that keeps growing and evolving.
A year ago, many banks and credit unions were forced to cancel and reissue thousands of cards as a result of the TJX breach. More recently, banks located in Indiana saw accounts breached from ATM or debit card transactions. Indiana law...
Less than a month after TD BankNorth customers in New Hampshire were alerted by the bank that their Visa debit or credit cards may have been compromised comes news of a phishing email scam against the bank's customers. The bank, headquartered in Portland, ME, has $119 billion in assets and 1,100 locations on the east...
As of Oct. 1, U.S. banking institutions have just one month to come into compliance with the Identity Theft Red Flags Rule, which mandates new levels of ID Theft program management, training and awareness.
Register for this webinar to get your first glimpse at the new regulatory examination procedures for this...
Understanding the trends and patterns of the past is the key to understanding the future, and security is no exception. The following security threat trends for 2008 have been assembled as a result of their frequency during security audits performed last year. These common and fundamental security issues typically...
Phishing, vishing, whaling - there are a growing number of electronic social engineering threats to unsuspecting consumers and their identities. Financial institutions and their customers increasingly are targets of these attacks. But they're also fighting back.
Listen to this interview to hear:
What are the...
At A Time When Preserving Customer Trust Is Critical, Financial Institutions Bank On Technology Solutions
The credit crisis and security threats have pushed financial institutions to step up their efforts to secure personal data and ensure their customers' trust.
Download this white paper for case studies of...
Social engineering is the ultimate con - the bag of tricks employed by fraudsters who will lie, cheat and steal their way past your organization's security controls. Their goals: theft, fraud or espionage. Your best line of defense: Your people.
Fraud incidents are on the rise - especially in financial services and...
Interview with David Jevans, Director, Anti-Phishing Working Group
Phishing, vishing, whaling - there are a growing number of electronic social engineering threats to unsuspecting consumers and their identities. Financial institutions and their customers increasingly are targets of these attacks. But they're also...
More than 5,000 customer records from 40 international financial institutions were discovered last month on a computer server in Malaysia.
Dubbed a "crime server" by Finjan, the information security vendor that discovered it, this machine held more than 1.4 gigabytes of business and personal data stolen from...
Arizona Central Credit Union of Phoenix, AZ., was hit with a phishing attack via text message to its members in March. While the attack was distributed on a small scale and didn't have much impact, the incident did roust the credit union staff into quick action.
Sadly, such incidents are a familiar...
One midwestern credit union (which prefers to remain anonymous), with nearly $200 million in assets and more than 30,000 members, has been phished four times -- the most recent in 2006, with three of those incidents occurring within a 90-day period.
So what do you do if your financial institution's brand is...
Learn about the latest findings on the impact of identity fraud on your financial institution and your customers:
Why banking customers are shying away from the online banking channel
How stolen identities are used to defraud your customers and damage your brand
Which banking channels are most vulnerable to...
The best offense is a good defense, especially when it comes to fighting criminal hackers.
Dr. Markus Jakobsson, principal scientist at Palo Alto Research Center and an adjunct associate professor at Indiana University, and Zulfikar Ramzan, a Senior Principal Researcher in the Advanced Threat Research Group at...
From Second Life to former NY Gov. Eliot Spitzer, anti-money laundering has dominated the news in 2008. To gain new insights in the latest trends, threats and solutions, we interviewed veteran AML investigator Kevin Sullivan on:
What's new in BSA compliance;
How AML has evolved over the past decade;
What's most...
Risk management and the insider threat.
These are the two dominant themes emerging from the conversations and presentations at the RSA Conference in San Francisco this week.
From the keynote stage to the expo floor, with stops in between at the program sessions, information security experts, vendors and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.