The much ballyhooed arrival of EMV (Chip and PIN) credit cards is now well under way, and most, if not all, major U.S. banks have already swapped out their customers' old credit cards for those with EMV chips. As background, the
Eighty thousand Kindle users. Sixty-five million Tumblr users. What do they have in common? Both groups had their login credentials breached, courtesy of hackers. While these attacks didn't directly target financial
Despite what many believe to be a major inconvenience, multi-factor identification has long been recognized as an effective method of lessening the impactof a potential breach on end users.
Earlier this year, our Detect Monitoring System team was faced with increased attacks across our customer base. This aligns with the Anti Phishing Working Group’s (APWG) findings
We often say no product or solution is a “silver bullet” for fraud. In order to fend against the rich mosaic of cyberattacks threatening organizations, multi-factor
There’s a sucker born every minute. And for each sucker there are hundreds of scammers waiting to take advantage of them.Now, with the Olympic Games
This article is a continuation of a previous post entitled “Evaluating a Fraud Detection Using Cost-Sensitive Predictive Analytics.”
New Attack Channels on the Rise – How Search Engine Ads, Social Media and Apps Are Used to Perpetrate Fraud
It’s much easier for fraudsters to trick victims into divulging sensitive information than it is to hack usernames and passwords.
A recent report showed how we can gain a better understanding of phishing attacksand attackers by using cluster analysis.Subsequently, in a recent post we showed how
Since HOTP and TOTP algorithms are the technological backbone of a wide variety of tokens used as a second authentication factor, they are very effective at creating unpredictable one-time passwords.