Remove Authentication Remove Banking Remove Programming
article thumbnail

Arvest Bank reskills IT to support its banking core refresh

CIO Business Intelligence

When Arvest, a regional bank operating in Arkansas, Kansas, Missouri and Oklahoma, hired Laura Merling as chief transformation and operations officer in 2021, one of the first things she changed was its digital transformation plan. We wanted to be the leading community-focused bank serving commercial and small businesses.”

Banking 244
article thumbnail

Mastercard takes on UPI with new biometric payment passkey in India

CIO Business Intelligence

The new service will initially pilot in India with some of the country’s largest payment players, including payment aggregators such as Juspay, Razorpay, and PayU, along with major online merchants like bigbasket and leading banks such as Axis Bank, Mastercard said in a statement.

Banking 306
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Trojan source code leak poised to spur new online banking attacks

Network World

The source code for a new Trojan program that targets banking services has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users. The Trojan is called Nuclear Bot and first appeared for sale on underground cybercrime forums in early December for $2,500.

Banking 150
article thumbnail

The ultimate in convenient banking: make payments by thinking

Trends in the Living Networks

In my presentation at yesterday’s media launch of ANZ’s Banking on Australia program , I spoke about new ways of making payments using biometrics. The technology could be utilized for organizations requiring very high assurance of a person’s identity including federal/state/local government and financial institutions.

Banking 156
article thumbnail

3 ways to deter phishing attacks in 2023

CIO Business Intelligence

Vishing: Voice over IP (VoIP) and Plain Old Telephone Services (POTS) are also susceptible to phishing attacks – attackers use speech synthesis software and automated calls to solicit victims to share bank details and login credentials. Deploy email authentication standards on enterprise email servers to check and verify inbound emails.

Training 352
article thumbnail

Document Security is More than Just Password-Protection

CIO Business Intelligence

From embedding malware or a phishing link in a document to manipulated or outright forged documents and other types of cyber fraud, the increase in document-related attacks cannot be ignored, especially if your company handles tax forms, business filings, or bank statements–the three types of most frequently manipulated documents.

Security 316
article thumbnail

What it takes to win your first CIO role

CIO Business Intelligence

Primed by a rotational program that cycled through varied assignments to build a technology-plus-business foundation, Brown was able to develop a robust process orientation in addition to skills in communications, large-scale change management, even a Master Black Belt Six Sigma certification.

Banking 325