travel communities retail insurance gaming finance gambling play angle-up angle-down shield-2 circuits calc endquote database stopwatch tasks data-analysis connection-chart lock-nodules shield vibrate swipe pin padlock fingerprint bluetooth arrow-right auth-1 auth-2 fraud trust weekly monthly daily location clock-3 calendar ticket vimeo coffee net office travel piggy bicycle home map comment medal timer chat glasses add chevron-right chevron-left rss download email-square clock-2 date date-2 monitor copy-file file folder video cash-square angle-left phone-square id-square edit-square gleam-square check pin like2 target quote-open network-square clock-square flag-square config-square map-marker-square map-marker-2 browser-square global-square plug-square pen-square mail-square mail portfolio-square user-square angle-down-circle users note2 key credit-square credit angle-up-circle gleam user-group id edit phone angle-right close-circle close facebook google-plus linkedin loupe menu twitter youtube user-group-square Skip to Content

How to protect yourself after the Equifax data breach

Fraud Protection expert Dwayne Melancon is the VP of Product at iovation. He says it’s a good idea to freeze your credit immediately. “Regardless of whether you’re affected or not, I recommend freezing your credit report. So you can either go to each of the three credit bureaus individually, or you can go to a aggregator. There are a lot of services like Lifelock or Identity Guard that will do that work for you. They’ll work with all three credit bureaus and freeze your credit.”

Identity Verification Becomes Trickier in Wake of Equifax Breach

While financial firms and other companies targeted by cyber-criminals and fraudsters have begun moving away from using such “knowledge-based factors” to verify their customers, most companies are not so sophisticated, Dwayne Melancon, vice president of product for fraud-prevention firm iovation, told eWEEK. “Companies that are relying on knowledge-based assessments—they may need to add additional factors,” he said. “They need extra safeguards— some which will be burdensome, such as proof using documentation—others could use some sort of device-based check.”

Gaming the system for a better experience

I play a lot of video games and one of the things I’ve noticed is that when you first start playing, the game often keeps you from venturing into places where you’re likely to fail... That got me thinking: is there an equivalent model we can use for providing more access in our corporate or application environments? Using a combination of authentication and access privileges, it seems we ought to be able to create an environment in which we start them off with less complicated capabilities in our systems and software, then gradually “unlock achievements” for them as they demonstrate competency within our world.

How Portland software companies are turning a European threat into an opportunity

iovation, whose software is used for online fraud detection, in January hired Weston to spearhead GDPR efforts and tap his expertise as a privacy expert based in the United Kingdom. The company has a working group of managers tackling GDPR. So far, Weston said the company hasn’t introduced any major product changes but other elements of the business have been impacted. “Behaviorally, the way the data is handled — who it’s shared with and how long it’s kept — all that has come under scrutiny,” he said. “It’s good practice for anyone. I have been fortunate the executive team realized the challenges and opportunities ahead.”

How To Stay Cybersecure This Summer Vacation

Ahhhhh, summer. It’s officially here. The sun is shining, the birds are chirping and would-be fraudsters are eager to launch their latest cyberattacks against relaxed, unsuspecting vacationers. Their newest tools can compromise your identity faster than your email can send an “Out of Office” response. Whether you’re hitting the same old beach town or taking a cycling tour of Provence, follow these Top Five steps to stay cyber secure while soaking up the sun.

Five Steps Businesses Can Take To Make Two-Factor Authentication Better And More Secure

The best way to combat the shortcomings of SMS based 2FA isn’t to just move where that authentication code is received—some 2FA alternatives provide codes generated standalone apps, which would require compromising a device itself to access—but to change how login attempts are authenticated. "The world that we're going into is going to require multiple factors,” Thelander said. “It's going to require layers of authentication that can be delivered at a point and time based on the level of risk of what a user is trying to do and the level of risk that is detected."

11 places you should never use a debit card

In fact, the number of debit and credit cards that were exposed to hacking efforts at U.S. ATMs and stores jumped 70% in 2016, according to a report from data analytics and credit scoring company, Fair Isaac Corporation (FICO).In addition, what’s known as “card-not-present” fraud — fraudulent transactions that occur when the card isn’t physically present — is expected to cost merchants and retailers $7.2 billion by 2020, according to a report by iovation, a provider of digital intelligence for fraud prevention.

Page 1 of 4

Your browser is out-of-date!

Update your browser to view this website correctly. Update my browser now

×