{"id":327,"date":"2005-08-02T00:00:00","date_gmt":"2005-08-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/08\/02\/fighting-the-new-face-of-fraud\/"},"modified":"2021-12-30T11:37:02","modified_gmt":"2021-12-30T11:37:02","slug":"fighting-the-new-face-of-fraud","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/08\/02\/fighting-the-new-face-of-fraud\/","title":{"rendered":"Fighting The New Face of Fraud"},"content":{"rendered":"<p>Banking fraud is as old as the industry itself, and it continues to be one of the largest expenses faced by many financial institutions, according to Virginia Garcia, research director for Needham, Mass.-based TowerGroup.  Garcia estimates that 30 percent to 50 percent of the industry&#8217;s $55 billion in annual operating losses is attributable to fraud.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;There are a couple of drivers that are convincing the banks to start rethinking some of their fraud management strategies,&#8221; Garcia says.<\/p>\n<p>While some &#8220;new&#8221; fraud simply relies on technology to commit old types of fraud in different or faster ways &#8211; for example, the use of e-mail rather than traditional mail to commit &#8220;Nigerian banking fraud&#8221; &#8211; new technology-enabled scams also are emerging.  One method that banks are adopting to battle such fraud is multiple-layer authentication, according to Bill Harris, chairman of PassMark Security in Redwood City, Calif.  &#8220;The banking industry has spent the past year-and-a-half determining what is the biggest problem &#8211; keylogging, phishing, e-mail or something else,&#8221; he says.   &#8220;Traditional authentication methods aren&#8217;t enough,&#8221; he asserts.<\/p>\n<p>As a result, banks are using a greater array of information and multifactor analysis to lock down systems when fraud schemes are detected, Harris adds.  User names and passwords should be supported in Internet banking transactions with new and better ways of authenticating genuine customers and identifying fraud artists trying to take over bank accounts, according to the summer update on identity theft from the Federal Deposit Insurance Corp.  The extra security for online accounts often takes the form of multifactor authentication, which is used in addition to traditional passwords.  The added security layers often include tokens issued to customers that generate new, random passwords every 60 seconds; software that can identify the computer from which a user is attempting to access an online account; or contacting customers by phone to make sure they legitimately are attempting to access their accounts.<\/p>\n<p>In bust-out schemes, perpetrators wait until the victims have built up a significant credit profile with their banks, then use stolen ID information to &#8220;bust out&#8221; with an auto loan or some other type of credit and leave town, explains Garcia.<\/p>\n<p>http:\/\/www.securitypipeline.com\/167100429;jsessionid=U0KPRT5ITUVFWQSNDBCCKHSCJUMEKJVN<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-327","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/327\/revisions"}],"predecessor-version":[{"id":2814,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/327\/revisions\/2814"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}