How Can Financial Institutions Drive Better Risk Assessment?
Developing a strategic vision for securing online relationships with customers means making security choices that will address today’s requirements and can adapt to help meet tomorrow’s challenges. To realize this vision, it is necessary to carefully assess an institution’s online transactions and the level of risk presented by each type of transaction or user group. [Read More...]
U.K.’s Financial Policy Committee Prepping Banks for Advanced Cyber Attacks
The U.K. is currently taking active measures to prepare its financial sector with solutions for dealing with massive cyberattacks. Recently, banks have requested to conform to new guidelines imposed by the U.K.’s Financial Policy Committee (FPC), a government group in charge of monitoring both the Bank of England as well as the economy. On Oct. [Read More...]
Ransomware: This is a Digital Hold Up
Avoiding nefarious CryptoLocker, Reveton malware Imagine this frightening scenario: You attempt to log on to your computer, but instead of seeing the normal login gateway meant for entering credentials, you see a black screen with the words “YOUR COMPUTER HAS BEEN LOCKED.” Next to the words are an intimidating FBI window and a warning that [Read More...]
What is Spear phishing?
Recently, a form of identity theft known as spear phishing has been making headlines. While the method isn’t new, thieves are using it more and more to break into networks and steal data. Spear-phishing is a highly targeted, fraudulent attempt to enter into a network by gaining unauthorized access to secure information. The purpose of [Read More...]
Not All Multifactor Authentication Techniques are Equal
This fact seems to be lost on some who are responsible for security architecture. One of my reflections on this past summer is that not everyone is aware of the difference between weaker and stronger forms of multifactor authentication. You have likely read about multifactor authentication, have used it with your social networking websites, or [Read More...]
Thomson Reuters Latest Casualty of Twitter Account Hacks
For quite awhile now, we have been following several stories related to the hacking of Twitter accounts. And this week, the newsfeed is inundated with information that the hackers have indeed struck again. And yet again, it’s the Syrian Electronic Army causing social media mischief. While the Associated Press was a major victim of social [Read More...]
Twitter Login Verification Announced
In case you hadn’t seen the news, Twitter login verification was announced yesterday. While I certainly don’t want to praise Twitter for implementing second-factor authentication login long after they knew a problem existed, it does remain a solid step in the right direction.
Inside a Twitter Attack: How Hijacked Twitter Accounts are Falling Victim to Digital Theft, Influencing Global Markets
Recently, we have seen a rash of high-profile takeover attacks on Twitter accounts. These Twitter attacks are targeting Western news organizations, but some organizations outside of the news realm (e.g., Burger King) have also come under attack.
Malvertising and Other Online Mischief
Malvertising — or malicious advertising — is getting a bit more attention as of late. In essence, it’s just another method by which criminals attempt to infect user PCs with some form of malware — albeit a very scary form as it can reach so many users so easily. The important point is that criminals [Read More...]
Mobile Devices Empower Customers in Fight Against Fraud
Mobile, when implemented correctly, has the power to deliver unmatched security and user convenience, while also enabling new business processes that actually lead to delighting customers and engaging them in the fight against fraud.