Card Not Present Fraud , Enterprise Mobility Management / BYOD

Boosting Mobile Banking Security

Kaspersky Lab's Klimek on Preventing Fraud in a Changing Threat Landscape

As banking customers migrate to mobile channels, criminals are developing inventive new ways to commit fraud, says Peter Klimek of Kaspersky Lab.

See Also: Improving Security Compliance in The Financial Industry With Data Privacy Regulations

For example, hackers have created new malware techniques that hijack mobile devices through root and jailbreak exploits, he says in a video interview at Information Security Media Group's recent 2015 Fraud Summit New York.

Klimek addresses the changing threat landscape, the rise of device-centric malware and ways enterprises and individuals can improve cybersecurity. He also discusses:

  • Why using multiple forms of breach detection and response is essential;
  • How forced patching and automatic updates can help ensure individuals and organizations stay safe from cyber threats; and
  • Why many Internet of Things devices are at risk of being hijacked because of a lack of security protocols.

As a security expert with the fraud prevention division at Kaspersky Lab, Klimek helps organizations understand the mobile threat landscape. Before joining Kaspersky Lab, he was responsible for architecting the application security program for Transunion, one of the largest brokers of consumer financial data.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.