Russian criminals operating online who want to stay out of jail need only to follow a few simple rules, the primary one being: Never target Russians. So it's surprising that security researchers have uncovered a new, ransomware-wielding gang of Russian speakers that includes Russian victims on its hit list.
What will be the impact of the leak of investigatory documents from FinCEN - the U.S. Treasury Department's Financial Crimes Enforcement Network? For starters, experts warn that FinCEN reports may reveal sensitive information tied to banks and law enforcement agencies' investigatory tools and tactics.
Nowadays, companies are striving to provide their customers with the easiest, fastest, and secure user signing experience in the channel or device of their choice.
How do you build an optimal user experience across all channels, while ensuring compliance?
Download this white paper and discover best practices to...
Financial Institutions (FIs) need strong security to combat fraud, but they cannot negatively impact the user experience.
To solve this challenge, FIs are increasingly turning to the emerging technology of behavioral biometrics.
Download this whitepaper to learn:
What are Behavioral Biometrics?
What are the...
Fraudsters' methods of attack are evolving. Download this guide to learn how to detect account takeover attacks with adaptive MFA, risk analytics, and machine learning.
In this eBook, you will learn:
6 fraud techniques that lead to account takeover attacks;
How to help prevent attacks on the login process,...
A flaw in how contactless cards from Visa - and potentially other issuers - have implemented the EMV protocol can be abused to bypass PIN verification for high-value transactions, ETH Zurich researchers warn. But Visa says the exploits would be "impractical for fraudsters to employ" in real-world attacks.
Ransomware continues to pose a "significant" threat, and email remains one of the top attack vectors being used by both criminals and nation-states, Australia's Cyber Security Center warns in its latest "Cyber Threat Report," which urges organizations to improve their defenses.
European banks are not ready to meet the Dec. 31 deadline to comply with the PSD2 regulation, which requires strong customer authentication when providing API access to banking platforms, says Dr. Steven J. Murdoch, a principal research fellow at University College of London.
The need for enhanced business agility and secure remote access to support digital transformation has led to the adoption of the security access service edge, or SASE, model, says Rajpreet Kaur, senior principal analyst at Gartner.
The rise of digitalization and increasing amounts of data creates both opportunity and risk for banks.
View this infographic to learn about:
The dark side of digitalization including the uptick in fraud attempts;
Providing a superior and seamless user experience with high-level security and streamlined enablement...
Digital identity will be a dominant technology trend over the next decade, within the financial services industry, and more broadly in our digital economies. But banks can't take their prime position in digital identity for granted. Even in countries where banks have already driven the digital identity agenda,...
In the past five years, banks of all shapes and sizes have invested significantly in streamlining their processes so that KYC and AML can be met while minimizing the number of postal and in-branch interactions required for establishing identity and product suitability. Likely, this process can be done 100% digitally...
It's little wonder financial services is such a targeted sector considering the massive shift those organisations have made in digital transformation. But, the strive to create an agile enterprise by placing more applications and workloads into most likely, a hybrid cloud environment, comes at a price - complexity....
The U.K.'s privacy watchdog is probing banking giant Barclays over its use of employee monitoring tools after the bank in February reportedly shifted from anonymized tracking to giving managers the ability to view data for individual employees.
How many different shades of bizarre is the data breach notification issued by software vendor Blackbaud? Over the course of three paragraphs, Blackbaud normalizes hacking, congratulates its amazing cybersecurity team, and says it cares so much for its customers that it paid a ransom to attackers.