As the technology sector moves further into biometric authentication different vulnerabilities are introduced. After all, a stolen phone or password is different than a stolen iris or thumbprint.
By Elena Mesropyan for LTP
Since the borders of AI application across industries have not been discovered yet, let’s look at a matter of fighting sophisticated crime schemes, in particular, money laundering. The economic effects of money laundering are vast and highly destructive since money laundering is a problem not only in the world’s major financial markets and offshore centers, but also for emerging markets – any country integrated into the international financial system is at risk. (more…)
By Elena Mesropyan for LTP
Last year, >$1.2 billion was invested in InsurTech startups – six times the amount invested in 2010, making the insurance industry one of the most exciting areas of innovation with the highest disruption potential for tech-powered startups. According to a 2015 report from WEF, “The most imminent effects of disruption will be felt in the banking sector; however, the greatest impact of disruption is likely to be felt in the insurance sector.” (more…)
In the light of a recent heist of the Bangladesh Bank account from the New York Federal Reserve that resulted in cybercriminals making off with $81 million, many in investment banking are questioning whether there is a need to review financial software to improve cybersecurity measures within their institutions. (more…)
Money has been the most instrumental tool invented by humans till date and it has seen big developments in the last couple of years through technological advancement with respect to money transfers. While globalization and innovation in technology have helped in facilitating large sums of money quickly, it has also helped in rapid money laundering which amounts to between 2–5% of global gross domestic product (GDP) which is equivalent to the fifth largest economy in the world according to the United Nations. (more…)
The EU (European Union) PSD2 (Payment Services Directive 2), which will apply from January 2018, aims in particular at ensuring that all payment services offered electronically are carried out in a secure manner, adopting technologies able to guarantee the safe authentication of the user and to reduce, to the maximum extent possible, the risk of fraud. (more…)
One year after EMV implementation in the US market, we have only seen less than 35% merchant penetration. (more…)
Courtesy of its billion-dollar acquisition of security innovator Trusteer in 2013, IBM willadd behavioral biometric analysis to its digital banking fraud prevention solution, IBM Security Trusteer Pinpoint Detect, the company announced on Thursday. “Given enough time and resources, cyber criminals can defeat passwords and security questions,” VP of Strategy for IBM Security, Ravi Srinivasan said. With the addition of behavioral biometric technology, IBM’s security solution will be that much more effective against fraudsters using stolen credentials to get unauthorized access to bank accounts. (more…)
VocaLink, the global payment partner to banks, corporates and governments, today launched “The Millennial Influence”, a report examining the payments behavior of millennials (i.e. those aged between 18-35) in the United States. (more…)
Banking customers can now securely access their financial information in real-time and safely conduct almost any financial transaction with popular Virtual Personal Assistants (VPAs), using only the sound of their voice. (more…)
By David Z. Morris for Fortune
Yesterday’s attack on the internet domain directory Dyn, which took major sites like Twitter and Paypal offline, was historic in scale. But the motivation for the attack may seem opaque, since no valuable information seems to have been stolen. A group called New World Hackers is claiming credit, but giving conflicting accounts of their motives—and security experts have called them “impostors.”
So why else might someone have done it? This class of hack, known as a distributed denial of service (DDoS) attack, has been around for a while. And while many DDoS attacks are indeed motivated by politics, revenge, or pettytrolling, there’s frequently money involved.
For instance, DDoS attacks are often used as leverage for blackmail. Once a hacking group has a reputation for being able to field a large and dangerous botnet to knock servers offline, they can demand huge ‘protection’ payments from businesses afraid of facing their wrath. In fact, they don’t even have to do the hacking in the first place—in one recent case, someone posing as a notorious cabal merely emailedblackmail messages and managed to pocket tens of thousands of dollars before they were exposed.
In the current case, there are rumors that Dyn was a target of extortion attempts before the attack. And the hackers behind what may be the biggest DDoS attack in history could demand a pretty penny to leave other companies alone. A wave of impostors will likely give it a shot, too.
There’s another, even darker money-driven application of DDoS attacks—industrial sabotage. Companies seeking to undermine their competition can hire hackers to take the other guys offline. DDoS services are often contracted through so-called “booter” portals where anyone can hire a hacker’s botnet in increments as small as 15 minutes. Researchers found last year that three of the most prominent booter services at the time had over 6,000 subscribers in total, and had launched over 600,000 attacks. (And despite the criminal reputation of Bitcoin, by far the largest method used to pay for DDoS-for-hire was Paypal.)
But it’s unlikely that this was some sort of hit called in by a competitor of Dyn—that tactic seems to primarily appeal to already-shady dealers, including online gambling operations.
For more on security, watch our video.
Finally, DDoS attacks can serve as a kind of smokescreen for more directly lucrative crimes. While a security team is struggling to deal with an army of zombie DVRspummeling their system, attackers can grab passwords, credit card numbers, or identity information.
In weighing possible explanations for Friday’s attack, it’s important to note the massive scale of the thing. Even if their claims of responsibility aren’t credible, New World Hackers’ description of about 1.2 terabits of data per secondthrown at Dyn’s servers is both vaguely plausible and utterly mind-boggling. That’s around twice as powerful as the huge 620 gigabit per second attack that knocked out a single website, Krebs on Security, last month. Dyn has also described the attack as sophisticated, arriving in three separate waves that targeted different parts of their systems.
That kind of operation could have been pulled off by a gang of kids doing it for kicks—and maybe that’s the scarier scenario. But such a massive undertaking suggests bigger, and possibly more lucrative, motivations.
First appeared at Fortune
By Ron Miller for TechCrunch
DocuSign built a $3 billion valuation by providing a simple way to execute an electronic signature. That has worked well as far as it goes, but in order to separate from the growing pack of competitor companies, it announced today that it’s allowing users to add a payment to be collected digitally at signing. (more…)
By Ken Yeung for VentureBeat
On the surface, starting an ecommerce business seems pretty straightforward. However, merchants face a litany of issues to deal with, including fraud. For small businesses, fraud protection can be an expensive service that gives little information to make corrective actions. Stripe has spent years developing and fine-tuning its in-house fraud detection service, and today, it’s making that available to its customers. (more…)
Today LexisNexis Risk Solutions releases its comprehensive Millennial Study: Privacy vs. Customer Experience report, which charts the digital consumer preferences and behaviors of Millennials in seven global markets—the U.S., U.K., Germany, Hong Kong, Malaysia, Mexico and Brazil. (more…)
By Paul Thomas for Finextra
The Money20/20 agenda is always packed; the event inspires insightful discussion, debate and collaboration every year. And this year promises to be no exception. I’m especially looking forward to chewing over these three topical trends in Las Vegas: (more…)
Public sector bill payment services provider, allpay has chosen Eckoh to secure customer payments made over the telephone. (more…)