Apple and Google have stopped distributing a popular messaging app marketed to English and Arabic speakers called ToTok. The New York Times has reported that U.S. intelligence agencies believe ToTok was developed by the United Arab Emirates government to spy on its citizens. The government bans rival offerings.
Google's Android is the most popular mobile operating system in the world, powering over 2.5 billion devices.
In this exclusive session, Eugene Liderman, Director of Mobile Security Strategy, Google, outlines Android's multi-layered security strategy, which includes hardware and software protections, as well as...
The EU's second Payments Services Directive is alive and well. And although PSD2's Regulatory Technical Standards have technically been in place since September of this year, they won't actually be actively enforced or supervised for roughly one year. But where are financial institutions now re: compliance and...
One of the largest fines to date for violating the EU's General Data Protection Regulation has been announced by Germany's federal privacy and data protection watchdog, the BfDI, against 1 & 1 Telecommunications, in part for inadequate authentication mechanisms. The company plans to appeal.
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3-D Secure (also sometimes referred to as 3-D Secure 2.0) stand out? The big differentiator with EMV 3DS in emerging regulations and standards is that it's tied to law - not just recommendations.
Dowload...
From there to here, from here to there, types of fraud
are everywhere.
Fraud is responsible for billions of dollars of loss every year and accounts for 85 percent of all security breaches - and it can all start with a phishing email from a friendly prince, otherwise known as a 419 fraud.
In this children's book,...
The new 5G mobile networks are coming, and with them comes the promise of people, industries and things connecting on an unprecedented scale. And also with 5G come significant security concerns about secure infrastructure, connected devices and a new multifaceted attack surface. Telecommunications giant Huawei is one...
Securing user accounts from both bots and human attackers has become one of the most fundamental challenges of delivering modern applications and services. Attackers continuously develop ever more sophisticated techniques for taking over user accounts.
Aggressive security policies lead to false positives and...
To maximize success, eCommerce merchants need to be familiar with the unique shopping behavior and fraud trends of the holiday season. We've identified six key 'sub-seasons' and insights pertaining to geographies, channels and shipping methods - to give actionable tips to ensure a safe and profitable season.
This...
The enterprise has embraced the public cloud. But tension and misalignment between CloudOps and business stakeholders impedes your organization from achieving all that it can.
Moreover, customers expect speed, scale and business agility from the cloud. CloudOps require continuous governance of security,
compliance...
Application fraud continues to be a significant problem for FIs across the U.S. As identity crimes continue to grow, it is increasingly difficult for FIs to determine who they are dealing with in all delivery channels.
Download this whitepaper to learn the effects of online application fraud in the banking industry...
The mobile and online channels are the future; being able to authenticate returning customers and determine who new applicants really are will be essential to successfully expanding product offerings in high-risk digital channels.
Download this whitepaper which explores:
How payment innovation is impacting fraud...
123456, password, password1: These are a few of the top passwords used by Fortune 1000 employees whose passwords and personally identifiable information have been exposed in third-party breaches. While the dangers of easy-to-guess passwords are well-known, even employees at top companies are guilty of bad password...
To explore how credential stuffing attacks and brute force attacks differ, we need to understand what they are and how they operate. Here is a quick summary.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing gdpr.inforisktoday.com, you agree to our use of cookies.