Mitek, Experian Partner on Mobile Account Opening Solution
Newest First  |  Oldest First  |  Threaded View
Greg MacSweeney
Greg MacSweeney,
User Rank: Author
10/10/2013 | 9:41:35 AM
re: Mitek, Experian Partner on Mobile Account Opening Solution
Another tool on many newer smartphones that banks should utilize is speech-to-text capabilities. This allows users to speak, rather than type, information into fields a mobile application. While you wouldn't want to be walking down the street reciting your SSN for everyone to hear, speech-to-text can be useful in many ways, especially for filling out forms.
Becca L
Becca L,
User Rank: Author
10/9/2013 | 2:19:41 PM
re: Mitek, Experian Partner on Mobile Account Opening Solution
I met with Mitek at Finovate, and they said many people try to open bank accounts on mobile each day. But mobile isn't really conducive to filling out a lot of information (tiny key pad, several fields, etc) so there was a high drop off rate. Banks are losing potential customers each day because of that frustration! This is really a sensible solution to filling out forms. Bryan is right that mobile account opening is the future, and technology like this is going to spur it along.
Zarna Patel
Zarna Patel,
User Rank: Apprentice
10/8/2013 | 4:06:09 PM
re: Mitek, Experian Partner on Mobile Account Opening Solution
Which makes me wonder if there is going to be a shift from needing bank tellers to needing 24/7 mobile banking support. I think there definitely will be, but the next question would be if it will occur quick enough or whether bank tellers will be retrained for digital support.
User Rank: Author
10/8/2013 | 11:58:16 AM
re: Mitek, Experian Partner on Mobile Account Opening Solution
We're not far off from the day where account opening can be done entirely on the mobile channel.

Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.