Cyber Monday 2018: 5 Best Practices to Protect Consumer Data

Cyber Monday 2018 is just around the corner, and customers and malicious actors alike are gearing up. Is your retail security ready to tackle e-commerce fraud and improve consumer data protection?

The post Cyber Monday 2018: 5 Best Practices to Protect Consumer Data appeared first on Security Intelligence.

Continue reading Cyber Monday 2018: 5 Best Practices to Protect Consumer Data

3D Secure 2.0: Be Ready to Make It Work to Your Advantage

EMV 3-D Secure (aka, ?3-D Secure 2.0?) is about to become a reality, bringing with it a frictionless consumer experience and the technology for more secure transactions. That?s good news if you?re a card issuer?as long as you?re prepared for the change… Continue reading 3D Secure 2.0: Be Ready to Make It Work to Your Advantage

Dialing Up Deception: The New Vishing Scam

While vishing accounts for less than one percent of total phishing-type attacks, it remains a very real threat, as evidenced by its recent evolution. Traditionally believed to originate from an inbound call, vishing is now being deployed in reverse whe… Continue reading Dialing Up Deception: The New Vishing Scam

Beyond Your Bank Account: Ten Astounding Finds Uncovered by Financial Malware

Financial malware is prevalent and capable of stealing more than your bank account number. Across many cybercrime investigations, RSA intelligence analysts have uncovered astounding finds stolen by financial malware. It is an alarming trend that shou… Continue reading Beyond Your Bank Account: Ten Astounding Finds Uncovered by Financial Malware

Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience

Advanced authentication solutions can help mitigate the risk of fraud by detecting malicious activity without adding unwanted speed bumps to the online user experience.

The post Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience appeared first on Security Intelligence.

Continue reading Why You Need Advanced Authentication to Protect Identities Without Compromising User Experience

How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud

Shir Levin used to report on government and law, but her journalism career wasn’t data-driven enough for her. She now uses her experience in news, psychology and statistics to fight identity fraud.

The post How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud appeared first on Security Intelligence.

Continue reading How Shir Levin Uses Her Nose for News to Sniff Out Identity Fraud

Supporting the Shift to Passwordless Authentication With FIDO

IBM is embracing FIDO authentication across its offerings as part of its effort to shift the industry toward a standardized approach to authentication and the eventual end of passwords.

The post Supporting the Shift to Passwordless Authentication With FIDO appeared first on Security Intelligence.

Continue reading Supporting the Shift to Passwordless Authentication With FIDO

Ready or Not, Here Comes the Next Big Digital Attack

The recent ATM hack that netted cybercriminals $13.5 million from a bank in India happened just days after the FBI warned it was coming. Consider this the latest reminder about the importance of being ready for attacks before they happen, not after the… Continue reading Ready or Not, Here Comes the Next Big Digital Attack

RSA Report: Rogue Mobile Apps Account for 28 Percent of Fraud Attacks

Rogue mobile apps accounted for 28 percent of fraud attacks observed by RSA in the second quarter of 2018 and over 70 percent of fraud transactions originated in the mobile channel. Learn more about the current state of global cybercrime and how to co… Continue reading RSA Report: Rogue Mobile Apps Account for 28 Percent of Fraud Attacks