Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Mastercard announces launch of new biometric card that combines chip technology with fingerprints [Read More]
Company confirms cybercriminals used malware to steal payment card data from nearly 40 Shoney’s restaurants [Read More]
A Lithuanian man has been indicted in the United States for convincing two U.S.-based Internet companies into wiring over $100 million to bank accounts he controlled as part of an email fraud scheme. [Read More]
Cybercriminals have been stealing payment card data from Magento stores by hijacking a payments extension [Read More]
Cybercrime group tracked by FireEye as FIN7 targets personnel involved in SEC filings. At least 11 US organizations targeted [Read More]
Company run by known spammers inadvertently leaked sensitive information about its operations, including 1.4 billion user records [Read More]
Implementation bug allowed an attacker to create 370,000 Zcoins and make a profit of over $400,000 [Read More]
Russian-speaking black hat breaches the systems of more than 60 universities and US government agencies [Read More]
Amnesty International has analyzed a sophisticated phishing campaign targeting human rights activists in Qatar and Nepal [Read More]
RSA improves several products and launches new services as it unveils its Business-Driven Security offering [Read More]

FEATURES, INSIGHTS // Fraud & Identity Theft

rss icon

Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Torsten George's picture
While effective at curbing “petty crimes” such as credit skimming / cloning, EMV does not address more sophisticated cyber-attacks that target backend systems which contain card holders’ most sensitive information.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Mark Hatton's picture
They always say in the investment world that cash is king. We are now seeing that in terms of cyber as well. Stealing cash, it’s even better than stealing money.
Gant Redmon's picture
When it comes to cybercrime, the police really can’t and aren’t going to protect residents of your town. The same goes for all towns and cities. Unless you’re talking a high six-figure theft, it's unlikely an officer will be assigned to your case.
Gant Redmon's picture
The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.
Alan Wlasuk's picture
No more fertile ground for security breaches exists in the United States than our colleges and universities. A higher education student database is an identity thief’s dream come true.
Idan Aharoni's picture
Cooperation in the underground economy could enable a fraudster in Russia who masters the art of phishing to team up with another fraudster who already has the infrastructure of cashing out compromised online banking accounts of US banks.
Noa Bar-Yosef's picture
Companies are increasingly seeing the benefits of using social technologies both for internal and external purposes. What is the security impact of this trend? What should security teams think about?