How to Tell Safe Advertisements From Dangerous Malvertising

With malvertising on the rise, how can users and organizations tell the difference between safe advertisements and malicious ones that threaten personal or company data?

The post How to Tell Safe Advertisements From Dangerous Malvertising appeared first on Security Intelligence.

Continue reading How to Tell Safe Advertisements From Dangerous Malvertising

How Authentication and Identification Work Together to Build Digital Trust

Building trust in an online or mobile user requires both identification and authentication.

The post How Authentication and Identification Work Together to Build Digital Trust appeared first on Security Intelligence.

Continue reading How Authentication and Identification Work Together to Build Digital Trust

Clone or Swap? SIM Card Vulnerabilities to Reckon With

SIM card vulnerabilities leave organizations exposed to SIM swapping and SIM cloning attacks. IBM X-Force findings from dark web analysis suggest these threats are not slowing down anytime soon.

The post Clone or Swap? SIM Card Vulnerabilities to Reckon With appeared first on Security Intelligence.

Continue reading Clone or Swap? SIM Card Vulnerabilities to Reckon With

Leading Magecart Group Targeting Captive Wi-Fi Users via L7 Routers

According to IBM X-Force IRIS, Magecart Group 5 is likely testing malicious code designed for injection into benign JavaScript files loaded by commercial-grade L7 routers.

The post Leading Magecart Group Targeting Captive Wi-Fi Users via L7 Routers appeared first on Security Intelligence.

Continue reading Leading Magecart Group Targeting Captive Wi-Fi Users via L7 Routers

Can Authentication Negatively Impact the User Experience?

To improve the user experience without compromising security, organizations should evolve their risk-based authentication (RBA) strategy to one of trust-based authentication.

The post Can Authentication Negatively Impact the User Experience? appeared first on Security Intelligence.

Continue reading Can Authentication Negatively Impact the User Experience?

How Will Strong Customer Authentication Impact the Security of Electronic Payments?

Reading Time: 3 minutes The EU’s updated Payment Services Directive, PSD2, will introduce a new technical standard that regulates strong customer authentication (SCA).

The post How Will Strong Customer Authentication Impact the Security of Electronic Payments? appeared first on Security Intelligence.

Continue reading How Will Strong Customer Authentication Impact the Security of Electronic Payments?

Why Fraudsters Are Flying High on Airline Loyalty Programs

Reading Time: 6 minutes While the value of airline loyalty programs and the customers they serve is well-established, protecting these assets with security controls needs to be more than an afterthought.

The post Why Fraudsters Are Flying High on Airline Loyalty Programs appeared first on Security Intelligence.

Continue reading Why Fraudsters Are Flying High on Airline Loyalty Programs

Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need?

Reading Time: 6 minutes Instead of just throwing money at increasingly complex security issues, organizations should embrace fraud detection and user authentication tools that flex to match risk appetite and business goals.

The post Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need? appeared first on Security Intelligence.

Continue reading Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need?

Why Deepfake Audio Technology Is a Real Threat to Enterprise Security

Reading Time: 3 minutes Deepfake audio technology has already begun wreaking havoc on the business world. Is your enterprise prepared for this next-generation threat?

The post Why Deepfake Audio Technology Is a Real Threat to Enterprise Security appeared first on Security Intelligence.

Continue reading Why Deepfake Audio Technology Is a Real Threat to Enterprise Security

Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution

Reading Time: 3 minutes Going live with your fraud protection solution should be a strategic process that enables smooth transitions and positive outcomes.

The post Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution appeared first on Security Intelligence.

Continue reading Digital Identity Trust Life Cycle: Implementing Your Fraud Protection Solution