Police in Nigeria this week arrested a 37-year-old man who's been charged with masterminding "a criminal syndicate tied to massive business email compromise and phishing campaigns," Interpol reports. But with known BEC losses last year exceeding $2.4 billion, will the arrest have a noticeable impact?
With the rising number of digital identity fraud cases in Asia Pacific, understanding the types of fraud and exploring ways to prevent it while ensuring a smooth and seamless experience plays an important role in your business.
While there’re no foolproof ways in stopping fraud completely, early detection and...
In the today’s digital world, when so much of our lives are online, identity verification and authentication are critical to addressing fraud-related risk management challenges. To prevent fraud and protect your business and your customers, you must be certain the people you are dealing with are who they represent...
Apple, Google and Microsoft are joining forces to back a standard that will allow websites and apps to offers passwordless sign-ins across devices and platforms. The three OS and browsing giants have put their weight behind a common passwordless sign-in standard created by the FIDO Alliance.
A federal jury has ordered NortonLifeLock to pay Columbia University $185.1 million after finding the company infringed on two patents. Jurors decided Monday that NortonLifeLock's use of emulators to monitor programs for malicious behavior intentionally infringes upon Columbia's patents.
A recent study shows that 85% of customers would avoid using a brand after losing trust. There is also an emotional impact to identify theft. As a security leader, you do not want that pain associated with your brand.
From login to purchase, it’s critical to know who the person is behind the OTP and know if they...
In 2021 alone, fraudulent accounts increased by 70% and synthetic identity fraud losses grew to $20B.
From onboarding and answering product questions to providing ongoing support, customers expect and deserve safe and secure communications. Every communication carries the potential for building trust and...
Today’s sophisticated cyberattacks combine multiple tactics that include social engineering, zero-day malware and 3rd party OAuth app abuse. Threat actors employ tactics across email, cloud and web that target specific people in your organization to breach your environment and access sensitive data. Hybrid work...
As human beings, one of our fundamental identifiers is our voice, which can allow us to quickly and privately connect to, enter, and unlock our technology-filled world. In today’s context, allowing people to unlock those worlds safely and privately is a challenge.
This report will look at:
How those systems that...
Released as part of Auth0's inaugural State of Secure Identity report, this infographic reveals the top 3 attacks that threaten identity security.
Released in June, 2021, the Auth0 State of Secure Identity Report reveals insights from their own trends and analysis to help define the identity security space, clarify...
Skyrocketing attack rates, double and triple extortion, increasing ransom demands… cybercriminals are inflicting pain in every way imaginable when it comes to today’s ransomware attacks. And you need to be prepared to protect your network, NOW.
Find out the steps you need to take to minimize damage to your...
Expectations for AML Responsible Officers and their operational teams are increasing in response to the combination of new techniques for money laundering, organised crime, geopolitical issues and new actors. To meet these increased expectations, operational resilience and sustainability using intelligent analytics...
Identity experts urge the Biden administration to accelerate the deployment of mobile driver's licenses and ensure identity theft victims get direct assistance. These are among the four items experts say must be added to an upcoming executive order focused on preventing and detecting identity theft.
In order to keep pace with the card fraud threat landscape, financial institution CISOs must continually refresh their awareness and understanding of card fraud tactics, techniques, and procedures (TTPs). Even for the novice cybercriminal, there are few barriers to entry and near-infinite resources in illicit forums...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.