August 14, 2018 - Frederik Mennes
overlay attacks

The growth of mobile technology and the increased importance of cybersecurity have dominated news cycles in the past year. At the same time, one of the biggest threats we’re seeing against mobile are overlay attacks – combining social engineering with inherent security weaknesses found in mobile apps, these attacks take advantage of users to trick them into sharing sensitive data…. Read more


multifactor authentication

It’s remarkable just how many significant security breaches could have been prevented if only multifactor authentication technology had been deployed. A lack of strong authentication is the reason behind the recent breach of the popular mobile app Timehop, which lets users see social media posts from the same date in previous years. The breach exposed the credentials, phone numbers and… Read more


Chili's and Macy's teach very different lessons about breach response

Each new day seems to bring a revelation of another data breach. They happen with such frequency now that they have become commonplace and the media and their readers seem to be losing interest. However, two recent breaches warrant additional attention as a learning opportunity for the remarkable contrast in how each was handled by the companies that suffered them:… Read more


Online Sports Betting

On May 14, 2018, the Supreme Court of the United States (SCOTUS) ruled in favor of New Jersey’s case to repeal the Professional and Amateur Sports Protection Act (PASPA), thereby paving the way towards legalizing online sports betting in the U.S.  PASPA had prohibited all states other than those with existing legislation—Nevada, Oregon, Delaware, and Montana—from legalizing online sports betting. The… Read more


Diving into Summer Vacation Security Risks

We are in the middle of the holiday season, and while it may be the most enjoyable part of the year, it’s definitely not the safest. We all take our technology gear with us on vacation, the kids enjoy their devices and professionals today worry about completely disconnecting from their work responsibilities. Here’s the problem, security threats don’t stop just… Read more


fake Fortnite app

Earlier this month IT news organizations around the globe reported that Epic Games’ popular Fortnite app game was being counterfeited and malicious actors were, in fact, lacing the imposter apps with malware. We’re only human, and people unwittingly let their guard down in anticipation of something they’re passionate about, or when they think they might be getting a bargain or… Read more


PSD2: Creating a Secure Execution Environment for Mobile Banking Apps

The revised Payment Services Directive, also known as PSD2, pays a lot of attention to the security of mobile banking apps, mobile payment apps, mobile wallets, and other apps that offer payment functionality. The most important requirements related to mobile app security are present in Article 9 of the final Regulatory Technical Standards (RTS) on Strong Customer Authentication (SCA) and… Read more


New iOS 12 Feature Risks Exposing Users to Online Banking Fraud

Security Code AutoFill is a new feature for iPhones in iOS 12. It is supposed to improve the usability of two-factor authentication, but could expose users to online banking fraud by removing the human validation aspect of the transaction signing/authentication process. Two-factor authentication (2FA), which is often referred to as two-step verification, is an essential element of many security systems,… Read more


Matthias Valcke

Finding the best fraud detection and prevention solution for your organization can be challenging. Requirements from internal stakeholders and vendor fact sheets can give an overwhelming impression that your solution needs to have it all and then some. In reality, your choice should simply tick all the boxes on your must-have list and cover your business use cases. It should… Read more


Julie Conroy

When it comes to fraud, financial institutions (FIs) find themselves trying to address competing priorities. On the one hand, the need for strong authentication and security continues to rise. Fraud and hacking attempts become more sophisticated each year, and new laws and regulations require stronger customer authentication security – potentially adding more friction to the customer experience. However, consumers have… Read more