Access your Pro+ Content below.
Technologies to thwart online banking fraud
This article is part of the April 2010 issue of Information Security magazine
It is now a well-known, new-millennium adage that "every time an institution builds a higher wall to fight fraud, the criminals just get taller ladders." This phenomenon not only continues to be true, but in addition to building taller ladders, criminals are also building more of them and expanding their targets. Looking for every chink in the walls, seeking out the edges and in areas that aren't as solid as they should be, fraudsters are making it much more difficult for financial institutions to build individual walls as point defenses against fraud. Fortunately, there are technologies available in the online banking security market to create fortresses around vital assets. These new solutions are in part evolutionary versions of technology that has been around for a number of years, as well as new ways of looking at the problem of fraud through dynamic analysis, and even non-technology processes that turn those individual walls into gated communities. Read on for a closer look at these anti-fraud systems -- the benefits they ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Security experts say the Zeus botnet was slowed with the shutdown of Troyak, an ISP serving a large chunk of the Zeus botnet
Security teams will continue to focus on efficiency and alignment with business as the economy recovers
Endpoint security and control for devices like thumb drives, SIM cards and mobile devices can no longer be ignored.
Today's anti-fraud technologies create gated communities for online banking.
Columns in this issue
The information security profession took two steps backwards with the firing of Pennsylvannia's CISO because of his comments on a conference panel, which illustrates the continuing disconnect between management and information security.
Is outsourcing code development a threat to national security? Marcus Ranum and Bruce Schneier go head-to-head on this topic.
Lawyers have a lot of concerns about cloud computing services. Learn about cloud computing legal issues