Roman Seleznev, the son of a Russian lawmaker who earlier this year received one of the longest sentences ever handed down in the U.S. for computer-related crimes, has been slammed with two more 14-year sentences. He was a key figured in the infamous Carder.su fraud marketplace.
Join us to learn about the new Directive on Payment Services (PSD2), and the impact it has on European banks and financial service providers. This new regulation is expected to change the way we interact and consume digital banking.
Are you going to check the box? Or are you going to leverage the directive to grow...
With a rise in incidents of omnichannel financial fraud globally, financial institutions need to enhance their ability to detect fraud - while also reducing technical complexity. Maxim Shifrin of IBM Trusteer discusses new solutions.
In a world of constant data breaches, where all consumer PII data is exposed, financial institutions are seeking innovative ways to authenticate customers, verify identity and prevent account takeover. This is leading to investment in a world of innovative authentication methods but that also means FIs find themselves...
In the wake of recent massive data breaches, such as the Equifax hack, a flood of stolen data is leading to a whole new wave of account takeover crimes, says Emma Mohan-Satta of Kaspersky Lab. How can organizations refine their defenses?
Global hotel chain Hilton has reached a $700,000 settlement agreement with New York and Vermont over two separate data breaches discovered in 2015 that exposed more than 360,000 payment card numbers.
Security probes into IoT vulnerabilities too often swerve into creepy territory. Take security researchers at Check Point who discovered they could seize control of an internet-connected LG vacuum cleaner's camera, allowing them to turn a roving robotic cleaner into a spy cam.
Banks worldwide must consider the business and technical strategies necessary to remain relevant in the age of open banking. With new innovations and regulations entering the market at a rapid pace, the banks that can deliver both security and a seamless user experience are the ones that will thrive.
In this...
For the second time in two years, Hyatt Hotels suffered a payment card data breach after attackers infected payment card processing systems with malware. The latest breach lasted for over three months and affected 41 Hyatt hotels across 11 countries.
As the use of stolen data and fraudulent cards becomes more difficult, criminals are shifting their focus to access customer payment transaction data. To stay ahead, merchants and institutions need tools that are specifically designed to address evolving challenges.
In this session, you will learn:
Data-centric...
Upscale supermarket chain Whole Foods Market says it's investigating a payment card breach affecting dozens of taprooms and an unspecific number of restaurants located inside its stores. But it says no point-of-sale systems at checkout lanes were compromised.
Fast-food chain Sonic Drive-In is investigating a potential breach involving customers' payment card data. Its alert follows a large, potentially related batch of stolen card data appearing for sale on a cybercrime "carder" marketplace called "Joker's Stash."
It's the age of "open banking," and that means changes for banking institutions and their customers - as well as for the fraudsters. Shaked Vax of IBM Security Trusteer talks about new vulnerabilities and anti-fraud strategies.
Summit Credit Union of Wisconsin is seeking class-action status for a lawsuit against credit bureau Equifax. The credit union contends it will have to bear the fraud costs resulting from Equifax exposing a massive amount of U.S. consumer data in one of the worst data breaches ever seen.
In an increasingly digital world, where players from virtually all sectors are racing to innovate, the risk of data theft is very real. The payment card industry has defined standards for protecting cardholder account data. But what about other data types? And what can be learned from payment card industry standards?...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.