What Is the Way Ahead for Derivatives Clearing and Prime Services?

Derivatives clearing and prime services providers face many new challenges, including intensifying regulatory requirements and legacy systems that can’t keep up with evolving business models.

The post What Is the Way Ahead for Derivatives Clearing and Prime Services? appeared first on Security Intelligence.

Continue reading What Is the Way Ahead for Derivatives Clearing and Prime Services?

Q1 2018 Results: Gozi (Ursnif) Takes Larger Piece of the Pie and Distributes IcedID

Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018.

The post Q1 2018 Results: Gozi (Ursnif) Takes Larger Piece of the Pie and Distributes IcedID appeared first on Security Intelligence.

Continue reading Q1 2018 Results: Gozi (Ursnif) Takes Larger Piece of the Pie and Distributes IcedID

Open Banking: Tremendous Opportunity for Consumers, New Security Challenges for Financial Institutions

New security standards around open banking focus on multifactor authentication and monitoring of transactions but largely ignore device security.

The post Open Banking: Tremendous Opportunity for Consumers, New Security Challenges for Financial Institutions appeared first on Security Intelligence.

Continue reading Open Banking: Tremendous Opportunity for Consumers, New Security Challenges for Financial Institutions

Bringing Digital Transformation to Insurance

Insurance providers can build trust — and win over crucial market segments — by embracing digital transformation.

The post Bringing Digital Transformation to Insurance appeared first on Security Intelligence.

Continue reading Bringing Digital Transformation to Insurance

Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware

Cybercriminals are emulating PC malware to develop mobile banking Trojans that leverage malicious miners to steal cryptocurrency and deliver it to attacker-controlled wallets.

The post Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware appeared first on Security Intelligence.

Continue reading Mobile Banking Trojans as Keen on Cryptocurrency as PC Malware

IBM Identity Study Shows Security May Be Financial Services Firms’ Best Defense Against Disruption

According to the “IBM Future of Identity Study,” consumers are beginning to prioritize security over convenience, making trust a crucial competitive advantage for financial institutions.

The post IBM Identity Study Shows Security May Be Financial Services Firms’ Best Defense Against Disruption appeared first on Security Intelligence.

Continue reading IBM Identity Study Shows Security May Be Financial Services Firms’ Best Defense Against Disruption

TrickBot’s Cryptocurrency Hunger: Tricking the Bitcoin Out of Wallets

TrickBot is getting in on the cryptocurrency gold rush, expanding its operations to target digital wallets and exchanges using serverside injections and other malicious tactics.

The post TrickBot’s Cryptocurrency Hunger: Tricking the Bitcoin Out of Wallets appeared first on Security Intelligence.

Continue reading TrickBot’s Cryptocurrency Hunger: Tricking the Bitcoin Out of Wallets

How Cybercriminals Use Money Mule Accounts to Profit From Online Fraud

As cybercriminal tactics evolve, banks must employ fraud detection solutions that leverage artificial intelligence to evaluate new registrations for signs of money mule activity.

The post How Cybercriminals Use Money Mule Accounts to Profit From Online Fraud appeared first on Security Intelligence.

Continue reading How Cybercriminals Use Money Mule Accounts to Profit From Online Fraud

How Cybercriminals Use Money Mule Accounts to Profit From Online Fraud

As cybercriminal tactics evolve, banks must employ fraud detection solutions that leverage artificial intelligence to evaluate new registrations for signs of money mule activity.

The post How Cybercriminals Use Money Mule Accounts to Profit From Online Fraud appeared first on Security Intelligence.

Continue reading How Cybercriminals Use Money Mule Accounts to Profit From Online Fraud

Minimizing the Encryption Blast Radius

The only way to reduce the encryption blast radius is to keep moving forward and embrace the advancements the technology has undergone over the years.

The post Minimizing the Encryption Blast Radius appeared first on Security Intelligence.

Continue reading Minimizing the Encryption Blast Radius