Banking Security


From Bank Account to Bank Account: Transferring Money via Social Media

From Bank Account to Bank Account: Transferring Money via Social Media

Banks already using Facebook and Twitter to allow customers to transfer funds.

Cyberattack against JPMorgan Chase Affects 76 Million Households

Cyberattack against JPMorgan Chase Affects 76 Million Households

The attack also affected an estimated seven million businesses.

Jimmy John’s Shops Hit by Data Breach

Jimmy John’s Shops Hit by Data Breach

Over 200 restaurants were affected

Securing Your Bank

Securing Your Bank's Email with 4-Layer Protection

Sending a wrong email can lead to massive privacy breaches which could inflict penalties or fines, or even loss of revenue.

Security Fears Restricting Mobile Commerce in the US

Almost half of consumers would never use mobile payment and banking apps due to fears about the level of security on their devices, with suspicions highest in the over 55 age group.

7 Things Security Professionals Can Learn from Robin Williams

7 Things Security Professionals Can Learn from Robin Williams

Movie quotes offer great insights and knowledge to enhance the security industry.

Hackers steal 1.2 billion Usernames and Passwords

Hackers Steal 1.2 Billion Usernames and Passwords

Russian hackers stole 1.2 billion passwords resulting in the largest collection of stolen internet information.



33 P.F. Chang Restaurants Affected in Data Breach

33 P.F. Chang Restaurants Affected in Data Breach

A security breach in June might have led to customer data theft.

New York Reveals Bitcoin License Rules

New York Reveals Bitcoin License Rules

State’s department of financial services unveiled a set of draft rules for “BitLicenses,” which apply for all virtual currencies.

mBank Poland Deploys HID Globals MultiFactor Authentication Solution for Banking

Token includes touchpad for secure PIN entry that can fit in customers’ wallets easily, making it highly portable and allows access to their Internet bank accounts anytime, anywhere.

World Cup 2014 Phishing Scam

World Cup 2014 Phishing Scam

Petition floating around Facebook supporting Lewis Alberto Suarez Diaz (the biter) scamming people out of their personal data.

Skimmers Getting More Difficult to Detect

Skimmers Getting More Difficult to Detect

Miniature devices planted on ATMs or at gas stations to steal credit and debit card data almost impossible to see.

Biometrics at the ATM: You Can Bank On It

Biometrics at the ATM: You Can Bank On It

Banks worldwide are putting biometrics at the front end using fingerprint authentication.

Banking on a Solid IP Video Foundation

Banking on a Solid IP Video Foundation

IP video technology gives the fastest return on investment by taking immediate advantage of existing network IP infrastructure.

How Banks Can Prepare for Emergencies While Meeting Compliance

How Banks Can Prepare for Emergencies While Meeting Compliance

Actively engaging employees and implementing the proper tools to address emergency preparedness in a cost effective and efficient manner.

Thieves Dig 50 Foot Tunnel to Steal ATM

Thieves Dig 50 Foot Tunnel to Steal ATM

Thieves fling dirt and soil to get to their pot of gold in Manchester, UK.

Keeping assets well protected

Keeping Assets Well Protected

There are tens of thousands of bank branches and financial services locations throughout the world. The business environment itself is complex, as it combines elements of high-end commercial services with a frontline, retail component.

Four IC Realtime ELITE Series Surveillance Cameras Receive UL Listing

Four IC Realtime ELITE Series Surveillance Cameras Receive UL Listing

UL Listing is a significant selling-point when dealing with school districts, financial institutions, hospitals, government and code-restrictive counties.

Stop Being “Reasonable” - Rationalize Your Security Efforts

Stop Being “Reasonable” - Rationalize Your Security Efforts

Communities that measure, watch and continue to learn are more aware during times of crisis, so reasonable security efforts should include anti-virus and email security that is used effectively.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”