Trusteer has been protecting customers against cybercrime since 2006. Based on our accumulated experience with hundreds of customers and millions of protected endpoints, we have created a framework that includes 7 key requirements for selecting a cybercrime prevention solution.
This document highlights:
Why...
Malware has become the primary attack tool used by cybercriminals to execute account takeover and initiate fraudulent transactions, and has been able to stay undetected by most security controls implemented by financial institutions. By preventing anomalous transactions generated by malware-infected machines,...
From smart phones to tablets, laptops to USB devices, consumer technologies are ubiquitous in the workplace - and so is the 'bring-your-own-device' (BYOD) practice of allowing employees to conduct work on their own personal electronics.
But how do these consumer technologies change organizations' approaches to...
Bank of America blames a suspected breach of credit card data on an unidentified third party. What happened, and what can other institutions do to better protect themselves and their customers?
When Canadian police raided the homes of 12 suspects, they found stunning evidence of a major payment card skimming scheme involving ATMs and pay-at-the-pump gasoline terminals in Greater Toronto.
In the wake of the latest high-profile hacktivist attacks against banking institutions, industry experts offer these tips to bolster online security, customer awareness and the corporate image.
"The misfortune here for the banks is that they can have the best fraud-detection systems out there ... but it all breaks down when they call the 'hacker' to verify the transaction," says Gartner's Avivah Litan.
Citigroup has confirmed its consumer banking sites were temporarily offline Friday because of what a bank spokesman referred to as temporary outages. Hackers with Anonymous have claimed to be behind the attacks.
Although insider-threat incidents within organizations tend to be different case-by-case, says Carnegie Mellon University's Dawn Cappelli, there are similarities and patterns that organizations can look for when mitigating their risks. What are some of the common characteristics among insiders, and how can...
IT security provider Symantec says it identified multiple publisher identifications on the Android Market that are being used to push out Android.Counterclank, which it characterizes as a bot-like threat that can receive commands to carry out certain actions, as well as steal information from the device.
Chuck Groat, VP of bankcard risk management at Zions Bank, says his department has spent the New Year just trying to keep up with compromises - including the latest pay-at-the-pump attacks.
The privacy risks involved in using social media in healthcare can be minimized through innovative staff education, says risk management expert Paul Anderson.
"It's a crime like no other crime," says James Ratley, president of the ACFE, describing fraud. "There was not a gun involved, there was not a knife; there was in many cases a ballpoint pen or a computer."
Losses linked to debit fraud now exceed losses connected to check fraud, according to a new survey by the American Bankers Association. How are banks responding to the threat?
When it comes to employee-owned mobile devices, many organizations want to run away from the security risks of the bring-your-own-device-to-work trend. Intel chose to run toward them.
In an exclusive case study, Intel CISO Malcolm Harkins details the security challenges and business opportunities of BYOD. And he...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.