_Experts-Finance

Snake Oil or Silver Bullet? Blockchains Are Neither

Countering claims that blockchain is “pure hype and snake oil," Simon Harman, Project Lead at Loki, discusses the current reality of the blockchain sector. Addressing the failure of some projects to deliver on their promises, as well as the cause of both criticism and praise for a technology which was on everybody's radar in 2017/18, he suggests that this new industry holds a great deal of promise based on the hard work of sensible, sustainable development.

Digital Transformation Adds Cyber Risks To Financial Services

As banks innovate to meet the changing demands of connected consumers, they are also increasing their attack surface, potentially making highly sought-after user data more accessible to cybercriminals. To mitigate these threats, financial services firms have to be aware of the risks that come with new capabilities and adjust their security architecture accordingly.

Cloud-Based Malware Weather Forecast for Financial Firms

Cyber attacks against financial institutions have been increasing in the past few years. But despite the apparent benefits that cloud computing can offer the financial industry, security concerns remain a roadblock when dealing with such sensitive data and strict regulations.

The Cost Of A Cybersecurity Breach For Financial Institutions

The number of data breaches have increased exponentially over the past few years, with a record 1,579 breaches in the U.S. alone during 2017 – and financial services firms fall victim to cybersecurity attacks 300 times more than other businesses. Here's how resolution services can mitigate customer complaints and help retain them.

Two Is Usually Better Than One, But With 2FA It Might Not Be

A new strain of mobile malware, known as FakeBank, has been discovered by security researchers from Trend Micro. The new malware has been found in several SMS/MMS management software apps and is designed to steal banking information and funds. How do you detect these fraudulent transactions before they create a financial nightmare consumers and companies?

Cryptocurrency Mining Is Booming, And So Is Its Malware

The cryptocurrency boom is underway. The talk of the town isn’t only about Bitcoin, the most popular form of digital cash. The value of some altcoins, including Monero (XMR), is steadily reaching new heights as well, adding more fuel to the furnace of the overall hysteria.

Let’s Take A Look At Some Recent Cryptocurrency Scams

Although Bitcoin price dropped substantially this month, cryptocurrencies still attract myriads of swindlers like honey attracts bees. As new waves of users rush into crypto, there will certainly be scammers waiting for them.

Bitcoin’s Fork And Its Security Implications – Part 2

In the previous article I reviewed the Segregated Witness (SegWit), a Bitcoin soft fork developed to scale Bitcoin by trimming transaction data that was stored in the block and segregating it in another structure, freeing up space for more transactions. I finished the article promising a follow-up article on SegWit2X, which was scheduled to be released in November 2017.

Bitcoin’s Fork And Its Security Implications

On August 1st Bitcoin was split into Bitcoin (BTC) and the clonecoin Bitcoin Cash (BCH). The means of this split was both a source code “hard fork,” creating an incompatible and independent crypto currency, in conjunction with a clone of the entire blockchain. Everyone who had bitcoins (BTC) before the fork has the same number of coins in bitcoin cash (BCH). In this article, I’ll explain the security and risks related to this split by discussing the motives, technical differences, and the consequences to the eco-system.

Blockchain Technology For Better Cybersecurity?

Blockchain technology offers a more secure and reliable way of improving cybersecurity in organizations. This article discusses how blockchain-enhanced cybersecurity can help protect organizations from ransomware attacks like WannaCry and Petya.

Cybersecurity Tips For Financial Services Firms

There are some key things that a financial services firm needs to care about when it comes to security: Ashwin Krishnan offers his expert advice to help financial services firms develop their information security practice.

Your Blockchain Might Be Dead - and Alive - on Arrival

Government and business leaders in every corner are experimenting with blockchain solutions. But these projects face the risk of becoming dead-on-arrival if their designers fail to prepare for the looming threat of quantum computers.

Good Bots, Bad Bots, and Humans. Can You Tell Who Is Who?

Good Bots. Bad Bots. Can you tell those apart from the ‘normal’ traffic generated by the humans using your network? Sean Martin works with the team at Distil Networks to identify 10 ways to spot bad bots on your network?

Ho, Ho, Ho! PCI DSS Compliance…Just in Time for the Holidays

The Payment Card Industry Security Standards Council has updated its data security standard. PCI DSS 3.2 went into effect November 1, which means many organizations are now scrambling to come into compliance--while also preparing for the busiest time of the year.

Looking for a Needle in a Stack of Needles: Anti-Money Laundering and How to Fix It

Money laundering is increasingly sophisticated and insidious. But we actually have access to all of the information we need to make AML more effective. In this Experts Corner, Simon Moss, CEO of Pneuron Corporation, explores the options to combat this serious crime.

Putting SpyEye Developers Behind Bars

Thanks in part to research and testimony by Flashpoint, two hackers responsible for developing malware that infected over 50 million computers have been sentenced to prison. Expert Lance James from Flashpoint walks us through the history of arrests that likely halted what could have been the most prolific and undetectable botnets distributed to date.

The Anatomy of a Banker Malware - Unraveling Marcher

Mobile malware has already compromised sensitive military and business related information. Enterprises should take this threat seriously and close any gaps in mobile security to avoid breaches of sensitive information.

Expert Oren Koriat walks us through the Marcher banking malware.