Remove Credential Remove Cybersecurity Remove Multifactor Authentication
article thumbnail

Data Breaches 101: What They Are And How To Prevent Them

VISTA InfoSec

This guide makes sensitive cybersecurity concepts approachable to enable smarter decisions in securing your systems against catastrophe. They take advantage of vulnerable software, stolen credentials, tricked employees, business partner access, unencrypted transfers, and even insider threats to penetrate networks.

article thumbnail

Chatbot Company Sued By Delta Over Data Breach

PYMNTS

did not have basic cybersecurity safeguards while it ran a service powered by artificial intelligence (AI) on the carrier’s website last year and in 2017, The Wall Street Journal reported. According to the news outlet, hackers changed the source code of the chatbot via compromised credentials. Delta Airlines Inc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deepfakes Threaten To Become The New BEC Scam

PYMNTS

This multifactor authentication strategy can be as easy as walking down the hall to meet face-to-face with the chief financial officer, yet with teams still working remote, the process has migrated to the phone or video chat. One seemingly real enquiry to change bank account details can — and often does — mean millions of dollars lost.

article thumbnail

Timehop Discloses Data Breach That Impacts 21M Users

PYMNTS

EST, when an access credential to its cloud computing environment was compromised. That cloud computing account had not been protected by multifactor authentication, Timehop said in the blog, noting that it has taken steps (including multifactor authentication) to secure authorization and access controls on all accounts.

article thumbnail

B2B APIs Bring Connectivity, Security To The Cloud

PYMNTS

This also allows hackers to bypass in-app authentication procedures because it can be easier to steal API keys — the credentials developers use to build apps that harness APIs — than contend with apps’ biometric or two-factor authentication (2FA) processes.”. Cloud Havens and Changing Keys.

API 52
article thumbnail

Hacker Tracker: Call Center Scams, Password Reuse Dangers

PYMNTS

Chad Schamberger, director of engineering at VirtualArmour , joined this week’s Hacker Tracker to share his insights on some of the biggest news impacting the cybersecurity space. All the while, people who continue to reuse passwords are potentially making the job of fraudsters much easier than it has to be. Fraud On The Line.

Scams 53
article thumbnail

Deep Dive: How FIs Can Upgrade Authentication Measures To Foil Fraudsters? Open Banking Attacks

PYMNTS

FIs may need to provide data to FinTech startups without dedicated cybersecurity teams, for example, which could then be more easily compromised by hackers who will steal sensitive bank customer data. MFA requires customers to prove their identities by providing at least two types of credentials.