Remove Authentication Remove Compromise Remove Credential
article thumbnail

Cyber Threats Surge in India’s Financial Sector

Fintech News

These chatbots leverage AI with natural language processing (NLP) capabilities to engage potential victims in seemingly benign conversations, subtly extracting credentials or sensitive data over time. The surge of deepfakes The rise of AI has also led to a surge in deepfake attacks. Losses are projected to reach INR 700 billion (US$8.3

Deepfake 121
article thumbnail

Finastra Confirms Breach Amid Hacker’s 400GB Data Theft Claim

Fintech News

The company confirmed the incident to TechCrunch following a hacker’s claim of compromising Finastra ‘s internal file-transfer platform and subsequent attempts to sell the stolen data. Currently, Finastra is unable to disclose the number of affected customers or the precise nature of the compromised data.

Breach 117
article thumbnail

Understanding the Cyber Risks in Video Communication

VISTA InfoSec

However, this convenience comes with significant cyber risks that can compromise sensitive information and privacy. For instance, an attacker might send an email that appears to be from a trusted video communication platform, prompting you to click on a link to verify your account or update credentials.

Risk 277
article thumbnail

Understanding POS Security: Protecting Your Business and Customer Data

VISTA InfoSec

When used, these devices will collect payment details without the merchant’s knowledge, compromising customer data security. Encourage the use of Two-Factor Authentication (2FA) Decades of experience show that passwords only provide a small amount of security.

PCI DSS 277
article thumbnail

How tokenisation has reshaped the future of payments

The Payments Association

The evolution represents more than enhanced security protocols, it constitutes a complete reimaging of payment credential architecture. Manual card entry, inconsistent authentication requirements and consumer hesitancy about storing payment information often create a labyrinthine checkout process.

article thumbnail

Tokenisation 2.0: Are we ready for the next generation of payment security?

The Payments Association

Antony Lane, sales account manager at G+D , corroborates this, stating G+D increasingly uses tokenisation to improve in-app provisioning, simplify lifecycle credential management, and personalise user journeys across devices and channels. As a result, tokenisation is becoming essential for maintaining trust and fluidity.

article thumbnail

Strengthening Cyber Defenses with Multi-Factor Authentication

VISTA InfoSec

Mutli-Factor Authentication (MFA) isn’t a new concept. What Is Multi-Factor Authentication? Let’s start with another simple definition – multi-factor authentication is any authentication method where more than one criterion has to be satisfied before access is granted to digital assets.