Fraud

November 17, 2015

The Dark Art of Buying Back Stolen Credit Card Data

There are many potential buyers of stolen bank account data, including the banks themselves. But fraudsters are increasingly reluctant to sell their data back to its […]
November 12, 2015

Are Banks Failing to Educate Consumers About EMV?

With the EMV liability shift having just passed, banks and merchants alike are scrambling to comply with the card network-imposed deadline.  According to one recent poll, […]
October 27, 2015

New EMV Credit Cards Causing Problems for Some

Millions of Americans are getting new credit and debit cards with more secure chip technology, and that’s already leading to headaches for companies that rely on […]
October 19, 2015

Banks Plan to Spend More on Tech in 2016

Driven by the need to secure computer systems, develop analytic capabilities and enhance customer-facing platforms, most banks are planning substantial increases in spending across a wide […]
October 14, 2015

Experian Data Breach Affects 15 Million People

A server containing sensitive consumer information at Experian was breached on October 1, with the records of as many as 15 million T-Mobile customers stolen.  There […]
October 6, 2015

Cyber-Extortionists Target Financial Sector

It sounds like a movie plot, but it’s all too real: a group with the handle DD4BC tries to hold corporations hostage, threatening distributed denial-of-service attacks […]
October 1, 2015

What You Need to Know About EMV Cards

There’s a chicken-and-egg problem with today’s deadline for consumers and retailers to switch to new chip-enabled credit cards.  A majority of consumers still haven’t received their […]
September 30, 2015

Cyber Attacks Could Threaten Bank Credit Ratings

Banks with weak cybersecurity controls could be downgraded even if they haven’t been attacked, said Standard & Poor in a recent report.  While it hasn’t yet […]
September 24, 2015

Could Your Smartphone Be a Financial Risk?

The smartphone can add significant security to payments, but it is also a tool that fraudsters can exploit. Researchers and scammers have already found several unique […]