How fraudsters bypass customer identity verification using deepfakes
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
14 articles
Fraudsters are using AI-generated digital clones to bypass Know Your Customer (KYC) procedures and open money laundering accounts.
You’ve interacted with scammers or visited a phishing site. What steps should you take to avoid being hacked?
We investigate why chip cards are no panacea, and what precautions should be taken when making a payment.
At RSA Conference 2021, representatives of international financial institutions spoke about the fight against money mules and launderers.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
Two schemes whereby a victim receives money — and neither one is good news.
Facebook wants to be your financial service and wants your banking data. But do you want Facebook to have it?
ATMs will soon use fingerprint readers and iris sensors to identify customers. But is biometric authentication as secure as advertised?
How are criminals able to hack ATMs and get away with money? Here are four videos that show how ATMs can be vulnerable.
The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.
88% of companies are willing to pay extra in order to work with a bank that has a strong security policy and a good security track record, new survey by Kaspersky Lab shows.
What’s wrong with ATMs’ security and what should the banks do about it
The latest research by Kaspersky Lab and B2B International shows that 33% of financial services organizations don’t offer customers a secure channel for all of their online payments, despite the fact that most have noticed a significant rise in customers making online financial transactions.
Kaspersky Lab’s recent research demonstrates that cyber-stealing is a very profitable and well-organized crime.