Since the major DDoS attacks of 2012, the threat landscape for financial institutions has dramatically evolved. Banks are now facing a whole host of problems including credential abuse, account takeover, and fraudulent money movements.
Download this interview transcript with Rich Bolstridge of Akamai Technologies...
Score another one for social engineering: A phishing campaign used a bogus "Google Docs" app to trick people into surrendering full access to their Google accounts and contacts. Before Google squashed the campaign, up to 1 million of its users may have fallen victim.
In the global panorama of financial cybercrime, one year might bring little change, with the same types of malware continuing to target the same geographies, while the next can be very active. That was certainly the case 2016, with some countries seeing a marked rise in the attention of cybercriminals.
Download...
Thousands of high-profile Twitter accounts have been spewing swastikas and spam following the hack of a popular third-party Twitter service called Counter. Sites tied to Amnesty International, the BBC and even tennis star Boris Becker were affected.
Who are the top cybercrime groups, and what security lessons can we derive from their latest attacks and attack vectors?
Download this interview to explore:
The evolution of cybercrime groups;
The latest attacks, including ransomware and account takeover;
Fox-IT's latest threat intelligence on who the...
Most organizations that enable users to perform online transactions have implemented security measures to address fraud. Currently, one of the most common safeguards used in a wide array of products/services is two-factor authentication (2FA).
In recent years, 2FA has become employed by global tech leaders like...
Behavioral biometrics has been getting a lot of attention recently due to its ability to uniquely address the challenges posed by social engineering, account takeovers and malware. It is already considered the third most popular biometric technology (after finger and face) and tied with iris.
Nonetheless, as an...
As mobile devices eclipse computers and laptops as the preferred method of going online, fraudsters have followed users, porting their modus operandi -account takeover, social engineering, and malware based remote control attacks - to the mobile arena. Thus, hackers have many more opportunities to perpetrate fraud and...
Many IT professionals use remote administration tools to troubleshoot and fix PC problems remotely, just as if they were sitting behind the keyboard themselves. But these tools are also used for different purposes today. Both nation states and hacktivists use modified these tools, creating Remote Access Trojan's...
An overlooked security setting on Twitter may have allowed a hacker to guess the password-reset email addresses tied to accounts used by President Donald Trump, first lady Melania Trump, Vice President Mike Pence plus a top adviser. What's the risk?
How important is mobile? For most businesses, mobile represents a highly profitable channel, and one that is critical in attracting new customers, especially the millennial generation.
Where there is growth, there is fraud. The rise of advanced, PC-grade mobile malware, innovative fraud schemes, such as SIM swap...
Over the past three decades, we have witnessed great technological changes in the financial services world and we've seen regulators struggle to keep up with them. For example, electronic payment service
providers such as PayPal (later acquired by eBay) took on the challenge of facilitating global online payments....
Banking Trojans. Targeted attacks. Ransomware. These are among the latest manifestations of cybercrime. But who are the top cybercrime groups, and what security lessons can we derive from their latest attacks?
"This is definitely one of the most interesting years with regards to the criminal evolution," says Eward...
Over the past three decades, there have been a great number of technological changes in the financial services world and regulators have struggled to keep up with them. The following white paper discusses the evolution and consequences of the Payments Service Directive and how regulation has gotten more complicated as...
In online banking security, consumer endpoints are commonly considered the "weak link," and for good reason. Banks have no control over their customers' endpoints or the steps their customers take to reduce their risk. To make matters worse, fraudsters now regularly circumvent traditional endpoint protections, such as...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.