Almost 20 years later I’m in San Francisco again, immersed in the artificial atmosphere of the Moscone Center at RSA Conference 2016. For the first day I’ve chosen a set of introductory talks, the Security Basic track, to get the feeling of it and start from the beginning. The first speaker confirms it is the right …
With TouchID, biometric authentication is becoming mainstream. Fingerprint authentication has shown quick adoption as one of the most convenient biometric factors,
Last month, Microsoft ended support for embedded Windows XP in ATMs. This Windows XP operating system is still used in the majority of ATMs that deliver cash to customers around the world.
A credit card fraud detection algorithm consists in identifying those transactions with a high probability of being fraudulent based on historical fraud patterns.
The printing press was one of the earliest steps towards democratization of knowledge, allowing the acquisition and spread of knowledge among the masses, and not just the privileged elite.
As I discussed in a recent blog post, the U.S. Federal Financial Institutions Examination Council (FFIEC) issued an alert in early November around
The more things change, the more they stay the same. This age-old adage can certainly be applied to the realm of IT security where hackers continuously evolve their techniques to compromise their targets.
It should come as no surprise that 2016 will be yet another ever-changing and complex year for those fighting electronic fraud. Attacks are getting more sophisticated, some will start to use
Recently, the Federal Financial Institutions Examinations Council (FFIEC) provided a new joint statement notifying financial institutions of the increasing frequency
At the ISMG Fraud Summit in London last week, ISMG’s Tom Field, Vice President of Editorial, offer attendees a preview the yearly Faces of Fraud survey, which looks at how the impact of rising retail point-of-sale