Inadequate authentication is among the greatest security challenges for online payments, says Scott Dueweke of Booz Allen Hamilton, who suggests biometrics needs to play a bigger role.
What are the distinct phases of the fraud lifecycle, and how can banking institutions intervene at each stage to prevent losses? Daniel Ingevaldson of Easy Solutions offers fraud-fighting tips.
Despite upticks in account takeover fraud, small business owners still aren't doing enough to enhance their ACH and wire fraud defenses, say Michelle Di Gangi and David Pollino of Bank of the West.
Article 4A of the Uniform Commercial Code, which deals with reasonable security measures for banks, needs a major update, says attorney Dan Mitchell, who represented PATCO Construction in a high-profile account takeover dispute.
What is hostile profile takeover, and why does this emerging threat pose such a risk to smart phone users? Dave Jevans, CTO of Marble Security, describes this and other new mobile threats.
An insurer has dropped its lawsuit aimed at avoiding covering damages suffered in the Schnucks retail breach. But attorney Dan Mitchell says this case shows why more companies need cyber-insurance.
What is hostile profile takeover, and why does this emerging threat pose such a risk to smart phone users? Dave Jevans, CTO of Marble Security, describes this and other new mobile threats.
Our inaugural Fraud Summit on Oct. 22 at the Meadowlands in New Jersey will feature an impressive lineup of information security leaders offering timely insights about practical risk mitigation strategies.
Fraudsters are using DDoS to distract banks during account takeover attempts, says fraud prevention expert Avivah Litan, who highlights DDoS trends to watch in 2014 and reviews how attack techniques have evolved in the last year.
Banking institutions and merchants are fighting back against cyber-attacks by sharing information and assisting law enforcement investigations, says Julie Conroy of Aite, which has issued a report about account takeover and cyberfraud trends.
Face-to-face and over-the-phone social-engineering schemes are increasingly used to perpetrate fraud, highlighting the need for more education and real-time transaction monitoring, says Gartner's Avivah Litan.
Despite the recent lull in al-Qassam Cyber Fighters' DDoS attacks against U.S. banks, the ABA's Doug Johnson and FS-ISAC's Bill Nelson warn banks to avoid complacency, noting that DDoS attacks pose an ongoing threat.
Knowledge-based authentication is no longer reliable, says fraud expert Avivah Litan, an analyst at Gartner. She explains why so-called behavioral authentication is the only reliable way to verify users.
Communication is key in the wake of a cyber-attack, says Dennis Simmons of SWACHA, who explains how simulated attack drills will help banks overcome their information sharing challenges.
The United States should be prepared for a dramatic increase in card-not-present fraud as cards using the EMV standard are widely deployed, says card fraud prevention expert Julie Conroy of Aite, who describes the reasons why.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.