Access "Technologies to thwart online banking fraud"
This article is part of the April 2010 issue of Combatting the new security threats of today's mobile devices
It is now a well-known, new-millennium adage that "every time an institution builds a higher wall to fight fraud, the criminals just get taller ladders." This phenomenon not only continues to be true, but in addition to building taller ladders, criminals are also building more of them and expanding their targets. Looking for every chink in the walls, seeking out the edges and in areas that aren't as solid as they should be, fraudsters are making it much more difficult for financial institutions to build individual walls as point defenses against fraud. Fortunately, there are technologies available in the online banking security market to create fortresses around vital assets. These new solutions are in part evolutionary versions of technology that has been around for a number of years, as well as new ways of looking at the problem of fraud through dynamic analysis, and even non-technology processes that turn those individual walls into gated communities. Read on for a closer look at these anti-fraud systems -- the benefits they offer as well as some of their... Access >>>
Premium Content for Free.
ISP shutdown slows Zeus botnet
Security experts say the Zeus botnet was slowed with the shutdown of Troyak, an ISP serving a large chunk of the Zeus botnet
Removable storage device endpoint security and control
by Lisa Phifer, Contributor
Endpoint security and control for devices like thumb drives, SIM cards and mobile devices can no longer be ignored.
- ISP shutdown slows Zeus botnet
Economic recovery strategies for information security professionals
Security teams will continue to focus on efficiency and alignment with business as the economy recovers
Technologies to thwart online banking fraud
by Jerry Silva
Today's anti-fraud technologies create gated communities for online banking.
- Economic recovery strategies for information security professionals
Information Security Profession Takes Two Steps Backward
The information security profession took two steps backwards with the firing of Pennsylvannia's CISO because of his comments on a conference panel, which illustrates the continuing disconnect between management and information security.
Schneier-Ranum Face-Off: Should the Government Stop Outsourcing Code Development?
Is outsourcing code development a threat to national security? Marcus Ranum and Bruce Schneier go head-to-head on this topic.
Cloud computing legal issues
Lawyers have a lot of concerns about cloud computing services. Learn about cloud computing legal issues
- Information Security Profession Takes Two Steps Backward
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.