KBA and simple password authentication are antiquated in the age of the data breach.
With rapid global growth in online and mobile banking - and the rise of worldwide real-time payments - financial institutions are implementing innovative authentication methods aimed at improving customer experience while securing...
In the wake of recent SWIFT-related interbank payment heists, more banks are monitoring transactions for anomalous behavior in an attempt to catch fraud in real time, says Andrew Davies, a fraud prevention expert at core banking services provider Fiserv.
Until we get to a stage where we can guarantee the confidentiality of static identity reference data, such as names, addresses, emails and favorite cat colors, we must move away from relying on knowledge-based authentication.
Truly massive amounts of this information are stolen on a regular basis, proving we are...
A short chat with the alleged seller of the LinkedIn and MySpace data begs more questions about how the services were compromised and if there are more large breaches to come.
With rampant password, patch management and data missteps, it can feel like information security déjà vu all over again as security professionals fight so many of the same battles as 10 or 20 years ago, says white hat hacker Cris Thomas, a.k.a. "Space Rogue."
Dropbox is keeping a close eye on the latest news reports of big-name, big-data breaches, but says the reported hackers are bluffing when claiming to have compromised and obtained the web storage service's data.
Asking how many different technologies consumers will tolerate when it comes to paying for their goods and services is a bit like asking how many more superheroes moviegoers will countenance in the latest "Avengers" film.
Despite understanding the need for multifactor authentication, many financial institutions struggle with the complexity of implementing effective solutions.
"Let's talk about what this complexity looks like...The average MFA initiatives have been ongoing for six years. On average, four point solutions are deployed...
The integration of technology within the
healthcare sector continues to create seismic
changes in how individuals receive medical
care. Yet in their rush to adopt technology
designed to improve the consumer's
experience, organizations within the healthcare
industry face the very real threat of sensitive
patient...
With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.
Fraudsters are a smart group. With each identity proofing or fraud prevention method that's introduced, they figure out ways to work around it. Organizations must be careful when using techniques that fraudsters may have compromised, but that doesn't mean throwing everything out and starting from scratch. With...
Russian email service Mail.Ru says its users' credentials contained in data leaked to Hold Security are 99.982 percent invalid, leading it to slam the security firm for stoking "media hype." But Hold Security's CISO contends the leak contains valid email addresses that could be used for phishing and spam.
A security firm claims to have obtained from a young Russian hacker a data set that includes 272 million unique credentials for Hotmail, Gmail and Yahoo email addresses, among others. But there's no reason to panic, security experts say.
Five new payment card data security requirements for third-party service providers are among the most significant changes included in version 3.2 of the PCI Data Security Standard released April 28, says Troy Leach of the PCI Security Standards Council.
While the Social Security Administration's 2011 decision to randomize Social Security Number (SSN) issuance made the identifier less susceptible to fraudsters, it also caused a series of unintended consequences for organizations that rely on the number's sequencing as a key part of identity-verification and fraud...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.