Fraudsters have rendered traditional authentication factors — something you know, something you have and something you are — ineffective.
Belgium-based bug bounty hunter Arne Swinnen exploited holes in the phone verification services offered by Instagram, Google and Microsoft.
At the SXSW conference, Yahoo announced it will implement on-demand passwords and data encryption for its Yahoo Mail in order to improve security.
Even as authentication techniques become more advanced, there are different ways cybercriminals can bypass two-factor authentication (2FA).
As the mainstream media continues to cover bitcoin exchange as a popular Web currency, cyber criminals are increasingly doing the same to launder money.
A firm can face a malware breach if its risk engine does not see every stage of an attack, as one bank recently discovered.
Sometimes, credential theft isn't flagged by banks' typical risk engines and can only be detected by malware prevention tools such as Trusteer Pinpoint.
Two online banking fraud schemes, which defeat banks' one-time password (OTP) authorization systems, show how personal data is vulnerable through mobile.
The use of real-time phishing to bypass two-step authentication is on the rise, and online banking customers should be on guard.