A new study details the psychological games and other tactics cyber criminals use in social engineering scams propagated through junk email. In a recently released study titled "Mind Games," Dr. James Blascovich, Professor of Psychology at the University of California,
Are you a trusting person? When dealing with people you don't know, don't give them sensitive information unless you're sure who they are, and can prove that they are who they say they are. You'll want to ask yourself if they should have access to the information.
Itâ€™s going to be a long hot summer for many U.S. financial institutions when it comes to online attacks. The RSAâ€™s Anti-Fraud Command Center issued its monthly online fraud intelligence report for May, and the statistics point to attacks on U.S. nationwide banks account for 33 percent of all attacks on...
A financial institution's customers don't always know what's available to them. Your job is to help them. Did you know that everyone is entitled to receive one free credit file disclosure every 12 months from each of the nationwide consumer credit reporting companies - Equifax, Experian and TransUnion. This once a...
When it comes to cracking into computers and networks, one of the most indispensable tools is â€œsocial engineeringâ€ and it has little to do with modern computing technologies. In the popular lexicon that predates today's computing technologies, a social engineer might have been called a flimflam man,...
Learn in detail the current financial scams in circulation from phishing and lottery scams, ATM and credit card skimming, among many others.
Learn proactive defenses to prevent consumers and employers from falling victim.
Phishing -- Itâ€™s not a matter of if it will occur at your institution -- expect phishing to happen at your institution. Phishers are not dumb. They head toward where the money is â€“ in the customer accounts at banks and credit unions.
So what does a typical attack look like? First, they swoop in, throw...
A phishing incident response plan for financial institutions isnâ€™t written just for good business practice, itâ€™s also a regulatory requirement too.
While it is a challenge to put an incident response plan that meets your regulatorâ€™s minimum requirements, you also want to have a well thought out...
Given the high cost of containing information security breaches, financial institutions have invested lots of time and money into developing incident response programs. But how do they know if their program is working properly?
In this webinar, you will be privy to the following topics of discussion:
Describe malware, crimeware intrusions and how they relate to phishing;
Overview of current attacks and help to anticipate likely trends;
Describe different ways clients are attacked, understanding of proactive defenses;
â€¢ Latest news on the crimeware and phishing fronts
â€¢ Why average users canâ€™t always sniff out those phishy emails
â€¢ Other cybercrime that financial institutions should be worried about
â€¢ Strong authentication - is it helping? What needs to be done further
> Listen to...