The mobile channel saw great user adoption in 2020 – and it saw a corresponding increase in fraud incidents. Tim Dalgleish of BioCatch discusses mobile fraud trends and the role of behavioral biometrics in enhancing user authentication.
In this interview with ISMG, Dalgleish discusses:
Mobile adoption and fraud...
Account takeover occurs when criminals use stolen login credentials to gain access to another person’s account. Once inside, they make unauthorized transactions, siphon funds, and steal corporate data or personally identifiable information (PII) to use for other purposes, or simply to sell to other attackers on the...
The ongoing lockdown may be complicating the path of Cupid's arrows. But as another Valentine's Day rolls around, authorities are warning that romance scammers - and other types of fraudsters - are alive and well and have been increasingly preying on unsuspecting victims around the world.
SpyCloud has fresh research into account takeover trends and finds that attacks have recently spiked by 300%. Chip Witt explains the trends behind the stats and offers insight into what enterprises often are overlooking in their ATO prevention strategies.
The mobile channel saw great user adoption in 2020 - and it saw a corresponding increase in fraud incidents. Tim Dalgleish of BioCatch discusses mobile fraud trends and the role of behavioral biometrics in enhancing user authentication.
Contact centers in the US alone spent
over $10.2B1 on caller authentication while
suffering through $14B1 worth of fraud
Analysts predict that digital businesses providing great
customer experience during identity corroboration will
earn 20% more revenue than comparable businesses with
Websites advertising pirated and cracked software are being used to deliver an updated version of the DanaBot banking Trojan, which can steal individuals' online banking credentials, according to Proofpoint.
Fraud in the interactive voice response channel was growing before the pandemic. Since? IVR fraud has become "a fraudsters' playground," says Mark Horne, CMO of Pindrop. He shares a new account-centric defensive solution.
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join us as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious...
Mitigation of identity fraud requires a combination of technologies that complement one another and are easy to manage. Adding a new solution requires looking beyond fraud management to the customer experience, including all stages of the customer lifecycle. It is critical to have safe and secure customer onboarding,...
Digital banking has become the single most effective channel for financial institutions to drive growth, increase revenue and attract new customers. Yet, it also introduces more risk, and cybercriminals are following the money right into the online account opening process.
Today, a staggering 85% of financial...