Following 33 arrests, police in Europe say they have dismantled a Romanian-led crime gang that used phishing attacks, online scams and fake invoices to steal more than $9 million from victims in Spain, including individuals as well as organizations ranging from hospitals to government agencies.
To secure India's growing digital payments ecosystem, it's vital to have comprehensive regulatory guidelines as well as a threat sharing platform, according to a new report by the Data Security Council of India and PayPal.
The fraud landscape in Asia varies considerably, but in many countries, fraud costs are rising. Among the key factors are the growth in cashless transactions as well as mobile apps, says Greg Russell, head of IBM Trusteer APAC.
Leading the latest edition of the ISMG Security Report: Years of massive data breaches have fueled an increase in synthetic identity fraud, in which fraudsters combine real and bogus details to create more effective fake identities. Plus, has "The Dark Overlord" hacking group finally met its match?
Mexican officials are investigating a series of technical glitches that may have been a prelude to a large cyberattack affecting at least five banks, according to news reports. While the full scope of the incidents remains unclear, up to $20 million may have been stolen.
With the changing shift in fraud these days, a fraud risk manager really needs to look at the landscape holistically, from the perspective of the customer, with regards to fraud losses and operational expenses. The task then falls on these managers to address these challenges in a way that provides a frictionless...
Since mobile banking usage is set to grow exponentially, banks must overcome structural challenges and
reconcile consumers' appetite for ease of use with the desire for greater security.
There are a growing number of fintech startups that have been able to overstep the legacy cost structures
For over a decade, a crucial part of fraud detection has been assigning an identity to every laptop, tablet, and mobile device that accesses a website or app. Such a fingerprint is a representation of hundreds of different device-specific values taken from an end user's device.
Today's device fingerprinting...
Compliance comes down to behavior. Ask yourself: are your users utilizing protected data sets in an appropriate manner? While most organizations focus on establishing security controls around access, the true test of compliance revolves around visibility into what users do after accessing data.
In the financial...
At its core, compliance for HIPAA is simply about maintaining patient privacy by ensuring your users appropriately access and use of patient data by your users. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed. The challenge, however, is the lack of visibility into what...
When it comes to fraud, enterprise data has a story to tell, and it's up to security and fraud leaders to know how to interpret that story. Jim Apger of Splunk discusses reading and reacting to these stories.
Payments are getting faster, and so is payments fraud. A robust fraud management strategy focusing on strong authentication, customer education and scalable responses can be instrumental in minimizing payment fraud risk.