Cyber criminals are waiting for banks to have online technical difficulties and then step in to target bank customers who complain about technical problems online. Using fake Twitter accounts that look just like the banks, they trick customers into handing over their banking credentials. Robert Capps, VP of Business Development at NuData Security commented below.
Robert Capps, VP of Business Development at NuData Security:
“While phishing schemes that are used to steal user login credentials and personally identifiable information (PII) aren’t particularly new, using social media to impersonate the customer care function at an online institution during a system outage, is a unique twist on an old scheme. And, one that wouldn’t immediately raise the alarm of consumers that may be at an elevated level of concern over cybercrime and identity theft. Particularly troubling about this type of attack vector, is the fact that in many cases, unlike in credit card theft, customers are often held directly responsible for any losses to their account.”
Robert explains, “Banks (and any other organization that conducts business online) need to take a more nuanced approach to authentication, and evaluate as much contextual information about interactions as possible, to determine if it really is the right user. Passive biometrics and behavioral analytics technology seems to be a perfect fit to restore consumer trust in online channels, while adding real security to the login process, and without adding friction that drives consumers away. Systems that can passively collect and analyze live customer data in real-time will have distinct advantages over systems that result in customer loss due to friction.”
ISBuzz Team embodies the collaborative efforts of the dedicated staff at Information Security Buzz, converging a wide range of skills and viewpoints to present a unified, engaging voice in the information security realm. This entity isn't tied to a single individual; instead, it's a dynamic embodiment of a team diligently working behind the scenes to keep you updated and secure. When you read a post from ISBuzz Team, you're receiving the most relevant and actionable insights, curated and crafted by professionals tuned in to the pulse of the cybersecurity world. ISBuzz Team - your reliable compass in the fast-evolving landscape of information security
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.