Could Emoji Passcodes be Safer for Online Bank Users?

We tell users to choose unique, complicated passwords that contain a gallimaufry of bizarre characters – and they tell us they’re impossible to remember, especially when they need to remember different passwords for the many different websites out there.

Read the full article.

This article brought to you by:

Mobile Banking Security Concerns on the Rise for Financial Institutions

It’s been almost a year since what some analysts consider the first successful major threat to mobile banking, known as Svpeng, hit the United States. Spreading via a text message campaign, the Svpeng malware went after Android phones. While Svpeng didn’t steal mobile banking credentials, it did detect the presence of certain mobile banking apps and then locked those phones for ransom.

The result is troubling for those in the financial industry, who see more and more traffic headed to mobile banking and mobile payment systems.

The ubiquity of mobile phones is changing the way consumers access financial services. And yet, despite the rapid growth, a significant percentage of consumers aren’t making the leap. Why? Security.

It’s going to be an interesting year for mobile financial services. Tripwire is helping you prepare for the challenges.

Read the full article.

This post brought to you by:

Takeaways From the 2015 Verizon Data Breach Investigations Report (DBIR)

Verizon’s annual Data Breach Investigations Report (DBIR), published since 2008, has become one of the most anticipated information security industry reports. Think of it as the Data Breach Bible, as it dissects thousands of confirmed data breaches and security incidents from around the globe into emergent and shifting trends, providing us with insightful guidance to apply to our own security practices. This year’s publication compiled the data of nearly 80,000 security incidents and more than 2,000 data compromises from 61 countries. The contributions from dozens of forensic firms, service providers, government agencies and international Computer Security Information Response Teams (CSIRT) help provide detailed findings based on 2014 incident and breach data.

Some of the items presented include:

  • Victim Demographics
  • Breach Trends
  • Indicators of Compromise
  • Phishing
  • Vulnerabilities
  • and more...

Tripwire has done a fantastic job at summarizing a number of the key findings for us.

Read the full article.

trip_banner

This post brought to you by: