A review of the top news items you should be paying attention to this week, including:
$500 million money laundering bust;
Reg E reform discussed in D.C.;
Cyber crime threats.
Be sure to listen to this overview, and check out all of the week's news and views on BankInfoSecurity.com
When will federal regulators draft long-awaited privacy and security rules for personal health records? So far, officials at the Department of Health and Human Services are being tight-lipped on the subject. Asked about the status of the rules, which, under the HITECH Act, were due in February, an HHS spokesman would...
Want to know if a prospective loan customer is lying? Watch their eyes. And their breathing. And especially whether they move their lower lip.
These are the tips from Robert Nolan, a former mortgage banker, and Genie Laborde, an author and speaker, who have teamed up to offer training for banking institutions...
To start this week, I want to take a look at some of the numbers that caught my eye.
Trojans, ATM fraudster plea and home foreclosure rates are some of the stories that should mean something to everyone.
As the final chapter of the TJX data breach draws to a close with the sentencing of the last hacking conspirator, security experts say greater international cooperation is necessary to prevent future incidents.
The Securities and Exchange Commission (SEC) charged Goldman Sachs with defrauding investors of $1 billion by leaving out key facts and misstating information when the housing bubble was getting ready to pop back in 2007.
Increasingly, consumers long for a simple payment solution that allows them to send money to family and friends via email or text message.
Boeing Employees Credit Union (BECU), Washington's largest credit union, is at the forefront of the person-to-person (P2P) payments revolution. And in an exclusive interview,...
Interview with Robert Richardson, Director of CSI
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview...