Mobile banking technology may be one of the best retention tools available to banks...a differentiator. Mobile banking customers are 53 percent less likely to leave; and if customers use both mobile banking and bill pay the retention rate increases to 82 percent. The challenge banks face is increasing the security of...
The National Institute of Standards and Technology should use the cryptographic community to help vet the advice it gets from the National Security Agency when creating cryptography guidance, a panel of prominent experts recommends.
British police have worked with an international consortium of law enforcement agencies and information security firms to disrupt financial malware known as Shylock used to infect more than 60,000 PCs and steal millions of dollars.
One month after an international law enforcement effort targeted the Gameover Zeus banking Trojan, new versions of the malware are being distributed via spam campaigns.
Microsoft absolves dynamic DNS provider No-IP of being complicit in a malware campaign that infected millions of PCs and apologies to the 1.8 million customers who experienced outages.
Most organizations that enable users to perform Web transactions (e.g. banks and ecommerce sites) have implemented security controls to address online and mobile fraud. These controls fall into two buckets: transaction-focused intelligence, which looks for anomalous actions, and device-focused intelligence, which...
Oracle has stopped supporting XP, but promises the next update for Java 7 -- though not Java 8 -- will still run on XP. But for how long will this continue? Security experts chart XP's "downward spiral."
The developer behind a new banking Trojan is making an unusual offer: Discerning fraudsters can purchase his financial malware toolkit for just $1,500 - or $2,000 with all bells and whistles included.
The "Energetic Bear," a.k.a. "Dragonfly," hacking campaign targets U.S. and Western European energy firms. While the hackers appear to be backed by Russia, the purpose of their attacks remains unclear.
Microsoft launched a botnet-focused takedown effort that didn't just block small-scale campaigns tied to two pieces of malware, but also resulted in an estimated 4 million legitimate site names being disrupted.
Browser-based filesharing applications have made moving large files a very simple task for the masses. Large graphics files that cannot be sent via email due to size restrictions can now be transmitted using YouSendIt! or drop.box. These applications are easier to use than FTP and the risk of inadvertent sharing of...
The European cybercrime agency ENISA and the Europol police force will work more closely together to combat everything from the latest malware attacks to organized crime syndicates.
Using big data to fight fraud is a challenge for most organizations. Andreas Baumhof of ThreatMetrix explains how context-based authentication combines fraud and security to leverage the use of big data.
Target is the big name that draws attention to a growing challenge for banking institutions: Who ultimately is responsible for mounting retail fraud losses - the merchant whose systems are breached, or the card brands and issuing institutions whose payment cards are compromised?
It's a heated debate that has...
With many organizations pushing outsourcing to its limits, regulators and standards bodies (e.g., MAS, OCC, BaFin, FCA, FedRAMP, BITS, NERC, NEI, ISO, PCI Security Council, AICPA, and Cloud Security Alliance) are increasingly putting an emphasis on having a strong and effective supplier risk management framework....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.