trends-fintech

ThreatMetrix Quarterly Fintech Cybercrime Report 2017

Fintech Cybercrime Report 2017

ThreatMetrix has released its latest quarterly cybercrime report based on cybercrime attacks from October to December 2016, detailing trends across financial services and eCommerce, with a global study of traffic patterns and emerging threats.

Financial Services Key Trends

  • FFIEC mobile banking payment and guidance is forcing US financial institutions to better manage risk, while PSD2 has European financial service providers agitated. Furthermore, insider threats are notorious in many prominent financial service breaches.
  • Mobile usage for banking login and transacting is increasing rapidly with 55% of financial services transactions coming from mobile devices.
  • 80 million attacks were detected using stolen or fake credentials.
  • A 250% growth of financial service mobile transactions was noted year-on-year.
  • Banks are embracing mobile growth, and 55% of financial services transactions are mobile; Many banks are offering full-service apps, however, rejection rates for transactions are high.

eCommerce Key Trends for 2016

  • A higher volume of cross-border transactions is noted with the global village economy gaining strength and popularity. A severe disadvantage is an increase in online fraud.
  • With a 51% increase in transactions blocked year-on-year and twice as many transactions rejected as processed, systems are working overtime to protect users from threats.
  • Up to 90% of some retailers’ traffic is attributed to Bot attacks.
  • 75 million transactions were rejected this quarter with rejections of 11% of account creations, 6.4% of account logins, and 5.1% of payments.

The Threat Landscape

  • The US, UK, Germany, France and Brazil feature in the top five attacking nations, but emerging economies such as India, Qatar, Morocco, and Tunisia are showing strong attack growth too.
  • Strong attacking economies tend to attack similar economies.
  • In the last quarter, identity spoofing persisted in FinTech with a slow but steady growth in device spoofing and a slight decline in IP spoofing and Bots.
  • Digital mobility of global connected users increased with a quarter of transactions cross-border.
  • Device spoofing remains a top threat.
  • Mobile transaction grew globally by 130% year-on-year with highlights in both developing and developed countries.

Keeping the digital world safe and secure is an increasingly difficult job; security experts are relying on holistic approaches to digital identities to differentiate fraudsters from legitimate customers, and pulling in innovative applications of behavioral analytics and machine learning to better identify high-risk behavior.

By Jennifer Klostermann

Jennifer Klostermann

Jennifer Klostermann is an experienced writer with a Bachelor of Arts degree majoring in writing and performance arts. She has studied further in both the design and mechanical engineering fields, and worked in a variety of areas including market research, business and IT management, and engineering. An avid technophile, Jen is intrigued by all the latest innovations and trending advances, and is happiest immersed in technology.

CONTRIBUTORS

Financial Management Finds a Welcome Home in the Cloud

Financial Management Finds a Welcome Home in the Cloud

Cloud Based Financial Management The most cautious person in any organization is likely to be the CFO. After all, they’re ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

The Multi-cloud Landscape The digital universe is expanding rapidly, and cloud computing is building the foundation for almost infinite use ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...
10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent ...
Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Multi-Instance vs. Multi-Tenant Architecture  The cloud is part of everything we do. It’s always there backing up our data, pictures, ...

NEWS

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system in attack: FireEye

Hackers shut down infrastructure safety system (Reuters) - Hackers likely working for a nation-state recently penetrated the safety system of ...
email as a service

Google Data Analysis, Artificial Intelligence and Predicting Vaccine Scares

Social media trends can predict tipping points in vaccine scares Analyzing trends on Twitter and Google can help predict vaccine ...