Hackers allegedly trafficking in personally identifiable data have reportedly breached the computers of three major data aggregators, raising doubts about knowledge-based authentication as a tool to verify identity.
NIST awards a total of $7 million in grants to five organizations to develop and pilot reliable and easy-to-use identity credentials that could help build trust in online commerce and boost the economy.
Banks have a critical role to play in helping other industries with DDoS mitigation, as DDoS targets are expected to shift. Attacks against U.S. banks are proving increasingly ineffective because banks have enhanced their defenses.
Citi's settlement with two states over a breach that exposed 360,000 cards will likely set an example for other states. One expert says banking institutions will likely pay more damages when accounts are compromised.
Fraud is increasing across the board, but attributing losses to certain types of fraud continues to pose challenges for many banking institutions, says Doug Johnson of the American Bankers Association.
A new cross-device malware strain that has been linked to last year's High Roller attacks is defeating dual-factor authentication. Experts explain why banking institutions worldwide should be on alert.
Account takeover techniques are getting more sophisticated; new "account checkers" are helping hackers automate their processes. The trend is just one more reason why we need advanced forms of authentication.
Microsoft touts new security features built into the Windows 8.1 Enterprise operating system. But are they enticing enough to win over organizations that are reluctant to upgrade from older OS versions?
Electronic banking fraud is as rampant as ever because of the failure to address one of the core problems, says security specialist Tom Wills, who describes why focusing only on technology to defeat Trojans will never work.
A new precedent in ACH and wire fraud liability could be set if Choice Escrow is successful in its appeal to have a lower court's ruling overturned. Legal experts explain why this could prove to be the new benchmark.
As they develop mitigation strategies, organizations must keep in mind that all cyber-attacks, ranging from DDoS to phishing, ultimately aim to compromise data - and they virtually all are advanced and persistent.
A year after LinkedIn confirmed its network had been breached, reportedly exposing 6.5 million hashed passwords, the social media company is offering users the option of adopting two-factor authentication.