New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam

Since March 11, IBM X-Force has observed a more than 6,000 percent increase in COVID-19 spam, with lures ranging the full gamut of challenges and concerns facing individuals.

The post New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam appeared first on Security Intelligence.

Continue reading New Study Shows Consumers Could Be Vulnerable to COVID-19 Spam

Internal Fraud Surging During COVID-19

With employee ranks thinning due to economic cutbacks stemming from COVID-19, fraud is on the rise. Here’s what to look out for Companies are scrambling to adjust and protect their businesses during the COVID-19 crisis. Even the largest enterpri… Continue reading Internal Fraud Surging During COVID-19

It Takes Two to Tango

Cooperation between fraud and risk departments and information security departments is essential. After all, these are two sides of the same coin: the failure to address cyber risk invariably leads to fraud.
The post It Takes Two to Tango appeared firs… Continue reading It Takes Two to Tango

How Authentication and Identification Work Together to Build Digital Trust

Building trust in an online or mobile user requires both identification and authentication.

The post How Authentication and Identification Work Together to Build Digital Trust appeared first on Security Intelligence.

Continue reading How Authentication and Identification Work Together to Build Digital Trust

Can Authentication Negatively Impact the User Experience?

To improve the user experience without compromising security, organizations should evolve their risk-based authentication (RBA) strategy to one of trust-based authentication.

The post Can Authentication Negatively Impact the User Experience? appeared first on Security Intelligence.

Continue reading Can Authentication Negatively Impact the User Experience?

Ramnit Malware Makes a Return with New Tricks

The developers of the Ramnit Trojan have continued to evolve its capabilities for nearly a decade. It has returned again with changes in functionality, targets and methods of distribution. Yet, Ramnit isn?t the only malware to evolve and adapt to expl… Continue reading Ramnit Malware Makes a Return with New Tricks

How Will Strong Customer Authentication Impact the Security of Electronic Payments?

Reading Time: 3 minutes The EU’s updated Payment Services Directive, PSD2, will introduce a new technical standard that regulates strong customer authentication (SCA).

The post How Will Strong Customer Authentication Impact the Security of Electronic Payments? appeared first on Security Intelligence.

Continue reading How Will Strong Customer Authentication Impact the Security of Electronic Payments?

Why Fraudsters Are Flying High on Airline Loyalty Programs

Reading Time: 6 minutes While the value of airline loyalty programs and the customers they serve is well-established, protecting these assets with security controls needs to be more than an afterthought.

The post Why Fraudsters Are Flying High on Airline Loyalty Programs appeared first on Security Intelligence.

Continue reading Why Fraudsters Are Flying High on Airline Loyalty Programs

Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need?

Reading Time: 6 minutes Instead of just throwing money at increasingly complex security issues, organizations should embrace fraud detection and user authentication tools that flex to match risk appetite and business goals.

The post Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need? appeared first on Security Intelligence.

Continue reading Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need?

Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution

Reading Time: 3 minutes Going live with your fraud protection solution should be a strategic process that enables smooth transitions and positive outcomes.

The post Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution appeared first on Security Intelligence.

Continue reading Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution