Endpoint
12/11/2012
02:11 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Chubb Cyber Endorsement Addresses Increase In Bank Account Takeover Frauds

Endorsement expands the definition of fraudulent communications

WARREN, N.J., Dec. 11, 2012 /PRNewswire/ -- The Chubb Group of Insurance Companies is helping to protect community banks from a more than three-fold increase in fraudulent online commercial transactions.

An endorsement to the ForeFront Security by Chubb Community Bank Bond expands the definition of fraudulent communications. Fidelity bonds, which help indemnify banks against losses resulting from a broad range of dishonest and fraudulent acts, typically require a bank to authenticate customer fund transfer instructions via a telephone callback. Chubb's new Cyber Fraud Endorsement also allows a bank to authentic commercial customer instructions through text messaging, email or other methods.

According to the American Bankers Association, the number of account takeover attempts reported at the 100 financial services firms it surveyed increased from 87 in 2009 to 314 in 2011.

"This survey points to an alarming trend that is prompting banks to look for the type of protection afforded by Chubb's Cyber Fraud Endorsement," said George Allport, vice president and worldwide fidelity manager for Chubb. "Although regulations may not hold banks responsible for commercial customer's losses due to fraudulent transfer instructions, businesses frequently sue their bank to make them whole. Chubb's endorsement helps indemnify community banks from defense costs and direct damages arising out of such a lawsuit."

The member insurers of the Chubb Group of Insurance Companies form a multi-billion dollar organization providing property and casualty insurance for personal and commercial customers worldwide through 8,500 independent agents and brokers. Chubb's global network includes branches throughout North America, Europe, Latin America, Asia and Australia. For more information, visit www.chubb.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web