Blog Posts Tagged with "Banking"

Af9c34417f8e5e0d240850bb353b5d40

I Hope Edo is Worth the Privacy Risk

May 16, 2012 Added by:Keith Mendoza

About a week ago, I read about this new daily deal service called edo that ties to your bank account, and the first thing that came to my mind is “uh oh, another attack vector into my bank info”. Here are a list of features that are those potential attack vectors...

Comments  (2)

37d5f81e2277051bc17116221040d51c

How Does Your Bank Protect Your Data?

May 15, 2012 Added by:Robert Siciliano

Financial institutions have established a layered security approach that includes multi-factor authentication, as well as doing due diligence when it comes to identifying customers as real people whose identities haven’t been stolen...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Manager of Phishing Ring Sentenced to Five Years in Prison

May 15, 2012 Added by:Headlines

A principal figure in the domestic arm of an international “phishing” operation that used spam e-mails and bogus websites to defraud American banks was found guilty of bank and wire fraud, identity theft, computer fraud, and money laundering and sentenced to five years in federal prison...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Consumer Banking Security Products and Services

May 10, 2012 Added by:Robert Siciliano

All the conveniences of digital banking have its set of risks which requires upgrades in card technologies and authentication. In response banks have provided numerous methods for protecting your personal information and also making your banking experience more secure...

Comments  (1)

4c1c5119b03285e3f64bd83a8f9dfeec

More on Banking 2.0 - Who Ya Gonna Trust?

May 01, 2012 Added by:Ben Kepes

Banks sit on a far higher level of the trust spectrum than do companies like Google and Apple – at least in consumers minds. A study commissioned in 2010 that found that telecoms were seen as the second most trusted group, after banks, for securing personal information...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

From Fraud to Infosec and Vice Versa... Part 2

April 23, 2012 Added by:Neira Jones

In my previous post I summarized fraud and how it relates to infosec. Key enablers used to defraud victims of all types cut across the landscape and often overlap, posing further challenges for quantifying their impact, but the classifications are nonetheless helpful...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iranian Bank Accounts Hacked: A Cyber Warfare Hypothesis

April 17, 2012 Added by:Pierluigi Paganini

Banking is a vital component of a country, it is considered in every cyber strategy as critical infrastructure. If a country is attacked so that its financial institutions fail it would produce an environment for other cyber and military operations, a typical cyberwar scenario...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Credit Unions and Small Banks Need Strong Security Relationships

April 05, 2012 Added by:Brent Huston

Smaller organizations need to leverage simple, effective and scalable solutions to achieve success. They simply won’t have the manpower to manage overwhelming alerts, too many log entries or some of the other basic mechanisms of infosec...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Update on the Visa - MasterCard - GPN Breach

April 03, 2012 Added by:Pierluigi Paganini

Global Payments' announced that Track 2 data was stolen, which is used by the bank. Track 1 data generally refers to the information reported on the front of a bank card. So if this information was stolen along with that contained in Track 2, it is possible to clone a card...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Visa and MasterCard Alert Banks of Massive Processor Breach

March 30, 2012 Added by:Headlines

"Visa Inc. is aware of a potential data compromise incident at a third party entity... Visa has provided payment card issuers with the affected account numbers so they can take steps to protect consumers through independent fraud monitoring and, if needed, reissuing cards..."

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

On PCI DSS Compliance Certificates

March 28, 2012 Added by:PCI Guru

All of you processors and acquiring banks that think the only proof of PCI compliance is some mystical PCI DSS Compliance Certificate, stop demanding them. They do not exist and never have. The document you need for proof of PCI compliance is the Attestation Of Compliance, period...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Bank Fraud Hacker Sentenced

March 26, 2012 Added by:Headlines

Hackers had used the Zeus Trojan, which would embed itself in victims’ computers and recorded their keystrokes as they logged into their online bank accounts, to steal money from small and mid-sized businesses throughout the United States...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Four Convicted for Roles in Massive Identity Theft Ring

March 23, 2012 Added by:Headlines

After a five week trial, four defendants have been convicted for their roles in one of the largest bank fraud and identity theft schemes in California history, with dozens of victims in four states and millions of dollars in losses...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Top Forty Banks Targeted by the SpyEye Trojan

March 21, 2012 Added by:Headlines

Researchers from F-Secure released a list of the top forty banks targeted by SpyEye, one of the more powerful data-sniffing Trojans ever developed. The release of the SpyEye source code last year meant a dramatic increase in its application became a very real scenario...

Comments  (0)

82ac4cd789b46af43c0cde730625317e

How to Protect Yourself from Skimmers

February 28, 2012 Added by:Christopher Rodgers

When you swipe your credit or debit card, are you handing over your personal information to criminals? Skimming is a process scammers use to steal credit or debit card information. Scammers use devices called skimmers to accomplish skimming in everyday transactions...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Email Intrusions Facilitate Wire Transfers Overseas

January 30, 2012 Added by:Headlines

The FBI has observed a trend in which cyber criminals are compromising the e-mail accounts of U.S. individuals and businesses and using variations of the legitimate e-mail addresses associated with the victim accounts to request and authorize overseas transactions...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »