Blog Posts Tagged with "Financial"

48062676f7b2fc521b0b32a3c6494469

What Is Digital Currency

October 31, 2012 Added by:gaToMaLo r. amores

Bitcoins are being blamed as EVIL – but Swiss Banks account, Bermuda Shell Games, Luxemboug Shelter, The Cayman Cash or IRA tax-free, tax-exempt, lower Tax rates- tax-free trust – there are all kinds of tricks for the bankers to shelter their money...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Expect New Wave of Cyber Attacks Against Banking

September 26, 2012 Added by:Pierluigi Paganini

A possible Iranian cyber offensive against US banks has been discussed recently, and immediately denied by government of Teheran. Financial institutions are targets for a cyber attacks, as the banking system is a critical asset for a nation and its paralysis could damage economic activities...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Banks Should Promote EMV

September 04, 2012 Added by:Robert Siciliano

“EMV transactions require an authentic card validated either online by the issuer using a dynamic cryptogram or offline with the terminal... EMV transactions also create unique transaction data, so that any captured data cannot be used to execute new transactions...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Operation High Roller Reveals Sophisticated Automated Attacks

July 02, 2012 Added by:Headlines

"With no human participation required, each attack moves quickly and scales neatly.This operation combines an insider level of understanding of banking transaction systems with both custom and off the shelf malicious code and appears to be worthy of the term 'organized crime,'" the report states...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

Underground Financial Networks

June 26, 2012 Added by:gaToMaLo r. amores

Greendot and other Reloadable debit cards are not a safe means of conducting anonymous financial transfer. The financial networks created by these cards are very prone to network analysis. There is an unacceptable amount of cross network contamination for vendors...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Ever More Sophisticated Malware Targets Online Banking

June 21, 2012 Added by:Pierluigi Paganini

Automatic Transfer Systems (ATSs) have been introduced in some variants of the infamous SpyEye and ZeuS Trojans, the nightmares of the banking world. The ATSs are parts of WebInject files known to be a collection of scripts implemented to steal online banking, email, and financial account credentials...

Comments  (0)

48062676f7b2fc521b0b32a3c6494469

Cyber Black Market: The Underground Economy

June 18, 2012 Added by:gaToMaLo r. amores

On April 24 the FBI released a report on Bitcoin. At that time Bitcoins were going for $4.25. As of June 17 they were trading at $6.26. Traders will be taking a look at Bitcoin, and once they get a whiff of the virtual money, they will strike... and it looks like the commercial criminals are already doing it...

Comments  (1)

37d5f81e2277051bc17116221040d51c

How Does Your Bank Protect Your Data?

May 15, 2012 Added by:Robert Siciliano

Financial institutions have established a layered security approach that includes multi-factor authentication, as well as doing due diligence when it comes to identifying customers as real people whose identities haven’t been stolen...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

FBI on Bitcoin: Cybercrime, Opportunity and Digital Choice

May 11, 2012 Added by:Pierluigi Paganini

The real danger of digital money, above the vulnerabilities in its processes, is the inability of governments to exert control over finances, which could lead to a distortion of the main mechanisms of economic control and taxation, bringing total chaos to the market...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Financial Organizations Struggle with Out of Band Authentication

May 09, 2012 Added by:Brent Huston

Financial organizations have been working on implementing out of band authentication (OOBA) mechanisms for specific kinds of money transfers such as ACH and wires. While this authentication method does add some security to the process, it does not come without its challenges...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Online Banking vs. Mobile Banking

May 03, 2012 Added by:Robert Siciliano

Mobile banking can offer additional security by enabling text-backs, as a second form of authentication. If you use your smartphone to access your bank’s website directly, it may recognize that you are using a mobile browser and automatically offer you a dedicated application...

Comments  (1)

4c1c5119b03285e3f64bd83a8f9dfeec

More on Banking 2.0 - Who Ya Gonna Trust?

May 01, 2012 Added by:Ben Kepes

Banks sit on a far higher level of the trust spectrum than do companies like Google and Apple – at least in consumers minds. A study commissioned in 2010 that found that telecoms were seen as the second most trusted group, after banks, for securing personal information...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iranian Bank Accounts Hacked: A Cyber Warfare Hypothesis

April 17, 2012 Added by:Pierluigi Paganini

Banking is a vital component of a country, it is considered in every cyber strategy as critical infrastructure. If a country is attacked so that its financial institutions fail it would produce an environment for other cyber and military operations, a typical cyberwar scenario...

Comments  (0)

5556cc7a08173e4db1ee0687e015df68

Assurance : Don't Worry, I've Got This...

April 06, 2012 Added by:Jon Long

There is nothing that changes faster than technology, and if you are not ahead of it, you are ancient history. Within the category of technology, security is at the forefront of rapid change, and there is nothing more critical to ensure that we understand as auditors...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Financial Institutions – Your Time is Coming

April 04, 2012 Added by:PCI Guru

Most financial institutions purchase their software applications from third party development firms. With all of the regulatory changes going on in the financial institution industry, these software firms have been focused on those regulatory changes and not PCI compliance...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

What do Credit Card Companies do with Your Personal Info?

March 23, 2012 Added by:Allan Pratt, MBA

The types of personal information companies collect and share depends on the product or service you get from them. This info can include: Social Security number and income, account balances and employment details, and credit history and transaction history...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »