Close panel

Close panel

Close panel

Close panel

Security

Today

28 Oct 2019

23 Oct 2019

Data available in physical format represent an important source of information for cybercriminals – things like passwords written on paper or cards, as well as information susceptible to theft that moves through social networks and computers. Here are some of the different social engineering techniques designed to extract information available in non-digital format.

09 Oct 2019

This type of cyberattack –targeted at companies’ employees – has been increasing steadily during the last year. The ‘CEO fraud’ can affect any type of company, from small family businesses to large multinationals and it is essential to understand how it works in order protect companies from it.

12 Sep 2019

Crooks have tapped into a goldmine by getting personal data over the phone. This scam, known as vishing, is a new method of social engineering, which is rooted in the psychological manipulation of its victims.

09 Sep 2019

Internet shopping is more and more common: grocery shopping, movie tickets, airline travel, and more. Shopping online has become habitual day-to-day practice, though occasionally potential buyers leave themselves open to fraud or data theft. The following cybersecurity tips serve to reduce the risks associated with card payments on the Internet.

03 Sep 2019

This summer, approximately 400 children and teens between the ages of 9 and 17 enjoyed BBVA’s cybersafe Fridays. The bank held a series of different workshops to raise awareness and educate employee families about how to use technology and social networks safely.

30 Aug 2019

After coming back from summer vacation, the back-to-school shopping preparations get underway. We frequently choose to buy school materials online in order to save time and money. Consequently, we should familiarize ourselves with security measures to be sure we are making our back-to-school purchases with trusted ecommerce sites and protecting our personal data.

23 Aug 2019

14 Aug 2019

Although ransomware attacks (holding a victim’s data ransom) and phishing have recently become more and more frequent, distributed denial of service (DDoS) attacks continue to top of the lists of those techniques most used by cybercriminals.

29 Jul 2019

04 Jul 2019

In the business world, the CISO or Chief Information Security Officer is the person responsible for ensuring and upgrading information security within the organization. At home, we can apply many of the basic principles that are foundation of the CISO role to protect and preserve our family’s private information. No matter how daunting the task may seem at first, it is really not that hard to achieve this goal without being an expert on the subject.

21 Jun 2019

Any company can fall victim to this kind of crime in which criminals trick an employee authorized to give bank payment orders into performing a transaction for them. Financial institutions like BBVA never request sensitive information, such as passwords or personal data, by email or outside of the secure environment on Net Cash and BBVA.es. For organizations, the key to preventing this kind of fraud is to reinforce control systems and  exercise great caution.

27 May 2019

BBVA Group has developed a platform to facilitate mobile payments across all the countries in its footprint. The platform developed by BBVA connects to Visa and Mastercard directly from each country’s application and provides the data required to process digital transactions from a smartphone.

08 May 2019

This new payment method replaces sensitive debit or credit card data with a unique identification code called a ‘token,’ which is used during a digital transaction. Online transactions are therefore more secure because the customer’s actual card data no longer needs to be provided. BBVA has already committed to helping its customers adopt this new payment approach.

27 Mar 2019

A group of 12 leading regional and digital financial institutions have joined together as investors and members in KY3P®, a company dedicated to working with the financial industry to standardize best practices for managing third-party risk and optimizing the processes by which financial institutions assess and monitor inherent risk in engaging suppliers and entering into third-party relationships.

As technological innovation continues, customer expectations evolve at a similarly rapid pace.  In navigating this dynamic landscape, financial institutions are increasingly seeking assistance from outside, third party providers, a strategy that itself poses inherent risks, like cybersecurity challenges and the potential for digital-related fraud.  Greater attention and scrutiny from regulators naturally results from this developing risk paradigm.

01 Mar 2019

The sidecar pattern shows itself as a very powerful tool in the new world of containers and can be found in several use cases. In this post we focus in analyzing some of the most interesting use cases from an IT security perspective.

26 Feb 2019

The European Commission (EC) is convening institutions, businesses, and regulators today and tomorrow in BBVA’s headquarters in Madrid with the aim of promoting security and privacy measures that will stimulate greater use of cloud services and the free flow of data in Europe’s digital single market (DSM). BBVA is hosting the event and is an active member of the EC working group, which is seeking to standardize security certification for cloud providers and establish a code of conduct that will facilitate data portability and the ability to switch providers.

18 Feb 2019

21 Dec 2018

It’s the holiday season, which means many of us are hitting our favorite stores or shopping online with plastic in hand. With all this activity, it only makes sense that credit and debit card fraud tends to increase during this time of year.

30 Nov 2018

29 Nov 2018

27 Nov 2018

Flora Egea is BBVA’s Data Protection Officer (DPO). She has a critical assignment in her hands: to ensure that BBVA complies with Europe’s GDPR (General Data Protection Regulation), which has revolutionized the way companies handle personal data. On the six month anniversary of its implementation, she believes the legislation has raised awareness among the general public about the need to protect their personal data, but there is still work to be done. In her opinion, GDPR is a positive step and positions Europe as a world leader given its unique treatment of data as a fundamental right.

The problem of data integrity verification is a classic topic that has been well-studied in the last decades. Many database or log systems run on untrusted servers or are subject to malicious attacks from insiders and, therefore, vulnerable to tampering. With the advent of cloud computing and the possibility of dealing with outsourced data, such situation has been aggravated. This problem is an essential challenge for financial institutions where preserving the correctness of customer data and transactions is crucial in terms of legal compliance and reputation.

22 Nov 2018

12 Nov 2018

29 Oct 2018

23 Oct 2018

22 Oct 2018

In an online world, scammers are using new tricks and forms of deception to get what they want from their victims. Although the tools may have changed, today’s scams are not much different from the old-school “pigeon drop” scam in which a victim is persuaded to give the scammer money with the promise of receiving a much larger sum. In this new scenario, cybersecurity training is essential to protect the private data of both individuals and professionals.

21 Oct 2018

20 Oct 2018

In an online world, scammers are using new tricks and forms of deception to get what they want from their victims. Although the tools may have changed, today’s scams are not much different from the old-school “pigeon drop” scam in which a victim is persuaded to give the scammer money with the promise of receiving a much larger sum. In this new scenario, cybersecurity training is essential to protect the private data of both individuals and professionals.

19 Oct 2018

18 Oct 2018

17 Oct 2018

In an online world, scammers are using new tricks and forms of deception to get what they want from their victims. Although the tools may have changed, today’s scams are not much different from the old-school “pigeon drop” scam in which a victim is persuaded to give the scammer money with the promise of receiving a much larger sum. In this new scenario, cybersecurity training is essential to protect the private data of both individuals and professionals.

03 Sep 2018

Summer has come to an end, and the usual back-to-school season gets underway. It’s the time of the year to prepare school supplies, and it can also be a good time to take stock of our digital habits to be sure to start the year safely on the right foot:

06 Aug 2018

01 Aug 2018

What does rooting or jailbreaking a mobile device mean? Both verbs refer to the same action of removing the limitations that mobile device manufacturers impose to limit user access to the devices’ resources, thus becoming some sort of superuser. Root however is used when the action is performed on android devices, and jailbreak on iOS devices.

13 Jun 2018

05 Jun 2018

Moviegoers can remember a time when they’d watch a sci-fi, spy or crime picture in the theaters, complete with a scene that shows a main character gaining access to a top-secret area with finger print identification. We’re looking at you, Ocean’s Eleven.

01 Jun 2018

25 May 2018

Video

texto foto

Watch Video

Video

At BBVA we always say that, the more you know, the better you can make decisions. Personal data offer us very valuable opportunities to provide better services for our customers and come up with new ways to put our customers at the center of our business. That is why protecting this data is a critical matter that concerns us all, as customers, and, especially, as employees of a digital company like ours. In order to better protect people, starting on the 25 th of May 2018, the new European Data Protection Regulation will go into effect.

21 May 2018

Throughout history, there have been several versions of the family and different models of relating with one another. The latest version is the family 2.0.

16 May 2018

New modes of communication have transformed the way news is delivered. Thanks to the Internet, access to information has never been so fast. Each minute more than 3.5 million Google searches are made, Facebook is accessed 900,000 times, and 156 million emails are sent. The compulsion to be informed every minute of the day has provoked a surge in so-called “fake news.”

11 May 2018

16 Apr 2018

Malware, or malicious software, covers different programs which, when run in devices, cause different types of damage and complications such as interrupting their operations, disrupting how they work, stealing information and displaying unwanted advertising.

27 Mar 2018

That surfing on the internet means leaving a trail of personal information is nothing new. Browsers gather preferences and habits thanks to the cookies installed in computers when surfing.

12 Mar 2018

07 Mar 2018

There is no greater source of pride in the world than to see our children get ahead in life. Their achievements, their charms… It can be marvelous to share each moment of their progress with family members, friends and work colleagues. But is it a good idea to do so on social networks? Is this the right place to share this information?

02 Mar 2018

Fair-trade coffee, quality guarantee, ecological tomatoes… consumers read the labels on the things they eat. But is there any way of checking that what they say is correct? In order to do so, you would need a register of the processes to which the product has been submitted, something blockchain can do.