article thumbnail

MAS Chief: Singapore Must Choose Security Over Convenience in Fight Against Scams

Fintech News

The tool helps prevent unauthorised digital transfers even if a customer’s banking access is compromised. MAS is also working with banks to strengthen user authentication for higher-risk online transactions. This includes monitoring for rapid fund outflows that may indicate suspicious activity.

Scams 90
article thumbnail

Jack Henry Selects AI Agents From boost.ai to Automate Call Volumes

The Fintech Times

By implementing boost.ai’s solution, Jack Henry hopes to automate user authentication, among other repetitive tasks, freeing up valuable time for human agents. “We’re unwavering in our commitment to technology that is safe for our enterprise clients and their users.

Volume 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Understanding the Cyber Risks in Video Communication

VISTA InfoSec

However, this convenience comes with significant cyber risks that can compromise sensitive information and privacy. Malware and Ransomware Malware and ransomware are significant threats in the realm of video communication, with attackers leveraging these tools to compromise devices and networks.

Risk 277
article thumbnail

SpyCloud On Making Payments Smarter And Safer

PYMNTS

It’s much more straightforward for a criminal to compromise someone’s payment account that could be linked to a credit card than for them to try to steal or gain access to use that credit card,” Endler said, adding that the tools that make these attacks possible are “accessible to people who don’t necessarily have a lot of technical acumen.”. “The

article thumbnail

The Future Is Secure For Smart Devices

PYMNTS

The biggest concern among IoT adopters is creating strong user authentications (43 percent). One common IoT security mistake is providing devices with default login credentials, which becomes a problem because fraudsters can compromise all of them by stealing just one device’s login. This enthusiasm isn’t unbridled, however.

article thumbnail

BioCatch Secures Patent For Remote Hackers

PYMNTS

Today’s cybercriminals are extremely savvy and patient, and have developed methods that kick into gear after a user authenticates themselves and is logged in,” said Turgeman. . “Given the pace of continued cyberattacks, it is clear that current cybersecurity methods are insufficient.

article thumbnail

Person Present: The Future Of Card Not Present Identity Verification

PYMNTS

Identity verification and user authentication are hot spaces right now, and only getting hotter as merchants, financial institutions (FIs) and consumers demand more foolproof protection against fraudsters. Too many have been compromised, and many people are saying this old-fashioned static identifier isn’t enough anymore.