Archive Links

Consumer Archive
CU System Archive
Market Archive
Products Archive
Washington Archive

News Now

CU System
Newest report shows fraud trends
MADISON, Wis. (6/19/09)--The recently released May 2009 Online Fraud report from RSA Security Inc.’s Anti-Fraud Command Center provides information for credit unions and others about the latest fraud trends and forecasts for the next 12 to 18 months. These include:
* Muling--the evolution of recruitment scams directed towards unsuspecting individuals to aid in the monetization of stolen goods; * Evolving supply chains, including fraud-as-a-service, which helps online criminals commit fraud; * Significant increase in attacks against the enterprise; * Evolution in crimeware and attack vectors including: a rise in use of the latest crimeware delivery method; fast-flux botnets (a network of compromised computers); improvements in both Trojan functionality and infrastructure; and consolidation of “traditional” phishing and malware attacks.
The number of phishing attacks in April dropped 7% from March attacks, the report said. In the next 12 to 18 months, RSA said it expects to see an increase in enterprise fraud in which online criminals can gain access to sensitive corporate data such as intellectual property and business plans. To stay ahead of the fraudsters, RSA recommends that companies deploy a layered approach to security, which has three core elements:
* Understand the threat landscape--Organizations must understand the threats that are targeting their business and the relative risks they pose. By doing so, organizations can mitigate the risks of online fraud or even prevent it from occurring at all. * Use multi-factor authentication to protect the login--Username and password authentication is not enough to protect access to sensitive data today. Multi-factor authentication--including two-factor and risk-based authentication--are critical to preventing unauthorized access to a user’s sensitive and personal data. * Monitor transactions and activities that occur post-login--Going beyond authentication solutions that can challenge users to assure their identity login, organizations should consider implementing a transaction-monitoring solution that analyzes and challenges high-risk transactions after login has occurred. Transaction monitoring can help identify suspicious post-login activities and mark them for further review.
For more information, see the RSA website.
Other Resources

RSS print
News Now LiveWire
St. Louis treasurer taps #creditunion to serve unbanked #NewsNow http://t.co/lWtcezJOej
23 hours ago
.@CUNAMutualGroup has committed $35K to @trustdotcoop over the next year to suppor the future of #creditunions.
1 Day ago
.@madison_mag gets the cooperative scoop from @SummitDoMore's @kimsponem http://t.co/RxSCeSegie
1 Day ago
.@VantageWestCU emeritus chairman Whittaker inducted into @DCUC_HQ Hall of Fame http://t.co/dpeP4ME49U
1 Day ago
Australian newspaper covers Gen Y tips from @ServusCU at @WOCCU conference http://t.co/xqmLfZVwaI
1 Day ago