Information security technology management News
July 01, 2015
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
June 28, 2012
McAfee and Guardian Analytics released the findings of an investigation into a global online bank fraud ring that takes the old techniques up a notch.
April 01, 2011
Advanced features can reduce the threat of wire fraud. New rule sets can be shared among banks and credit unions.
December 20, 2010
Authentication technology helps thwart online banking fraud but determined criminals can circumvent it.
Information security technology management Get Started
Bring yourself up to speed with our introductory content
A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display. Continue Reading
Out-of-band authentication is a type of two-factor authentication that requires a secondary verification method through a separate communication channel along with the typical ID and password. Out-of-band authentication is often used in financial ... Continue Reading
A transaction authentication number (TAN) is a type of single-use password used for an online banking transaction in conjunction with a standard ID and password. TANs are often in a list made by a financial institution and sent to the owner of the ... Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Information security technology management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
How does mobile microfinancing service M-Pesa allow users to make transactions without a bank account? Expert Michael Cobb explains how it works and M-Pesa security measures. Continue Reading
The mobile payment market is experiencing tremendous growth. Get ready to think about cyberthreats, changing operations and opportunity. Continue Reading
In this special presentation, Mike Rothman details today's top Web application threats and pragmatic methods to integrate security into the Web application development process. Continue Reading
Manage Information security technology management
Learn to apply best practices and optimize your operations.
With cyberattacks a growing concern for many companies, the CFO must take a leadership role in securing organizational and customer data. Here's how to start. Continue Reading
A report from Adallom highlights the lack of SaaS security in enterprises, but expert Dave Shackleford has ways to take back the cloud and lessen the risks, such as enhanced cloud app security. Continue Reading
Outsourcing is necessary in the financial industry, but establishing secure partner communications can be difficult. Learn some best practices for implementing identity management federation. Continue Reading
Problem Solve Information security technology management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Online banking credentials are one of the most lucrative bits of information available to steal. Expert Nick Lewis advises how to keep cutting-edge Trojans off company machines. Continue Reading
What particular risks does the OddJob Trojan pose to the security of financial transactions over the Web? Expert Nick Lewis explains. Continue Reading
Financial transactions are some of the most high-risk activities performed online. Expert Nick Lewis gives advice to financial firms on how they can prevent online transaction fraud. Continue Reading