The number of banking Trojans targeting users of mobile devices doubled in 2018. Cybercriminals are now investing more time and money than ever in attacking the mobile channel. To combat this, banks and FIs need to empower their mobile app developers with effective, efficient tools to apply proactive, client-side...
With the rapid shift to mobile, learn how location behavioral biometrics is providing a competitive edge for banks, fintech and mcommerce companies in the fight against fraud. Using each user's unique location behavior pattern, Incognia behavioral biometrics creates a dynamic location fingerprint, unique to each...
Digital and mobile banking are under attack - and the threats are increasingly faster, more sophisticated, and automated. Fraud managers and analysts face a round-the-clock battle as they try to identify and stop fraud before customers are affected.
To help financial institutions manage the risks without shifting...
From credit cards and deposit accounts to a wide range of lending products, cybercriminals spare no effort to turn a profit by exploiting weaknesses in the digital account opening process.
Download this e-book today to:
Uncover the financial and business impacts of new account opening fraud
Get tips on how to...
Designing Security as a User Experience
The ongoing battle between attackers and defenders have left valid users caught in the middle. Protecting user accounts with aggressive security policies leads to false positives and needlessly locks valid users out of their account, while lenient security policies lead to...
Users - One of the Weakest Links in Your Cybersecurity Strategy
They say 'it's all about who you know' - for cybersecurity, that's partially true. If a cyberattacker knows your users, there's a good chance they can get into your network. Why? Because they can take what they know - usually an email address or...
A key disconnect exists between awareness of financial services fraud schemes and mitigation, according to the latest "Faces of Fraud" survey sponsored by Appgate. Mike Lopez, vice president at the firm, describes some key findings.
Users - One of the Weakest Links in Your Cybersecurity Strategy
They say 'it's all about who you know' - for cybersecurity, that's partially true. If a cyberattacker knows your users, there's a good chance they can get into your network. Why? Because they can take what they know - usually an email address or...
Designing Security as a User Experience
The ongoing battle between attackers and defenders have left valid users caught in the middle. Protecting user accounts with aggressive security policies leads to false positives and needlessly locks valid users out of their account, while lenient security policies lead to...
Account Takeover is one of the biggest threats that banks are facing today. With 3.8 billion data records compromised worldwide in 2018, it is evident that despite implementation of cybersecurity measures, digital channels remain vulnerable. Adversaries have a variety of weapons at their disposal, which makes...
Faster payments are the new reality in more than 40 countries, and this innovation is benefiting consumers and businesses alike. Criminals are also enjoying the speed and non-refutable nature of these transfers, and in many deployments faster payments quickly translates to faster fraud.
This does not have to be the...
Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.
In this exclusive session, Eugene Liderman, Director of Mobile Security Strategy, Google, outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as...
The EU's second Payments Services Directive is alive and well. And although PSD2's Regulatory Technical Standards have technically been in place since September of this year, they won't actually be actively enforced or supervised for roughly one year. But where are financial institutions now re: compliance and...
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3-D Secure (also sometimes referred to as 3-D Secure 2.0) stand out? The big differentiator with EMV 3DS in emerging regulations and standards is that it's tied to law - not just recommendations.
Dowload...
From there to here, from here to there, types of fraud
are everywhere.
Fraud is responsible for billions of dollars of loss every year and accounts for 85 percent of all security breaches - and it can all start with a phishing email from a friendly prince, otherwise known as a 419 fraud.
In this children's book,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.