Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Company confirms cybercriminals used malware to steal payment card data from nearly 40 Shoney’s restaurants [Read More]
A Lithuanian man has been indicted in the United States for convincing two U.S.-based Internet companies into wiring over $100 million to bank accounts he controlled as part of an email fraud scheme. [Read More]
Cybercriminals have been stealing payment card data from Magento stores by hijacking a payments extension [Read More]
Cybercrime group tracked by FireEye as FIN7 targets personnel involved in SEC filings. At least 11 US organizations targeted [Read More]
Company run by known spammers inadvertently leaked sensitive information about its operations, including 1.4 billion user records [Read More]
Implementation bug allowed an attacker to create 370,000 Zcoins and make a profit of over $400,000 [Read More]
Russian-speaking black hat breaches the systems of more than 60 universities and US government agencies [Read More]
Amnesty International has analyzed a sophisticated phishing campaign targeting human rights activists in Qatar and Nepal [Read More]
RSA improves several products and launches new services as it unveils its Business-Driven Security offering [Read More]
Turkish citizen accused of being the leader of a cybercrime gang that stole $55 million from banks worldwide sentenced to 8 years in US prison [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Noa Bar-Yosef's picture
Companies are increasingly seeing the benefits of using social technologies both for internal and external purposes. What is the security impact of this trend? What should security teams think about?
Idan Aharoni's picture
To maximize profits, fraudsters need to do a lot of learning. They can either learn techniques of areas they haven't focused on yet, learn better techniques in the field they already specialize in, or learn new cover stories to improve the techniques they already use.
Idan Aharoni's picture
The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.
Idan Aharoni's picture
A bank that will fail to give fraud departments the power to make the necessary changes to its internal processes, may end up in a situation where everyone knows how and why fraudsters are stealing money from their bank – yet nothing can be done to stop it.
Robert Vamosi's picture
Some newer POS systems in the US have built-in authentication systems designed to protect merchants against the addition of fraudulent PIN pads. Should PCI now require retail businesses to upgrade to newer and better technology?
Idan Aharoni's picture
Unlike real-world dumpster diving, "electronic dumpster diving" can enable cybercriminals to access all the documents currently held by the user, not just those that were thrown away.
Noa Bar-Yosef's picture
Second column in a series describing the hottest commodities found in underground markets. We continue to explore the trending “commodities” in these markets and how to protect from your data being exchanged in these markets.
Christopher Justice's picture
To mitigate data security risks at the Point of Sale (POS), retailers are building and implementing technical control systems to monitor data traffic and tokenizing and encrypting data, to increase security. But often times, simple preventative solutions are taken for granted and get lost in all of the rhetoric.
Idan Aharoni's picture
While fraudsters may be equal in terms of rank, when it comes to sophistication – they are not. Much like in the hacking community, the higher the sophistication level of individuals, the lesser they are in numbers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!